@techreport{Averroes-4.2.2,
  author = {Duflot, Marie and Fribourg, Laurent and 
                 H{\'e}rault, {\relax Th}omas and 
                 Lassaigne, Richard and 
                 Magniette, Fr{\'e}d{\'e}ric and 
                 Messika, St{\'e}phane and 
                 Peyronnet, Sylvain and Picaronny, Claudine},
  title = {Probabilistic Model Checking of the {CSMA/CD} Protocol
                 Using {PRISM} and {APMC}},
  year = {2004},
  month = jun,
  type = {Contract Report},
  number = {(Lot 4.2 fourniture 2)},
  institution = {projet RNTL Averroes},
  oldhowpublished = {Lot 4.2 fourniture 2, du projet RNTL Averroes},
  note = {22~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Averroes-4.2.2.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Averroes-4.2.2.ps}
}
@inproceedings{B04sasyft,
  address = {Orl{\'e}ans, France},
  howpublished = {LIFO Technical Report 2004-11, Laboratoire d'Informatique Fondamentale d'Orl{\'e}ans, 
		France},
  month = jun,
  year = 2004,
  editor = {Anantharaman, Siva},
  acronym = {{SASYFT}'04},
  booktitle = {{P}roceedings of the {W}orkshop on {S}ecurity
           of {S}ystems: {F}ormalism and {T}ools
           ({SASYFT}'04)},
  author = {Baudet, Mathieu},
  title = {Random Polynomial-Time Attacks and {D}olev-{Y}ao
                 Models},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/B04sasyft.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/B04sasyft.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/B04sasyft.pdf},
  preliminary-version-of = {Baudet05jalc},
  abstract = {For several decades two different 
	communities have been working on the formal security of 
	cryptographic protocols. Many efforts have been made 
	recently to take benefit of both approaches, in brief: the 
	comprehensiveness of computational models and the 
	automatizability of formal methods. The purpose of this 
	paper is to investigate an original approach to relate the 
	two views, that is: to extend existing Dolev-Yao models to 
	account for random polynomial-time (Las Vegas) 
	computability. This is done first by noticing that 
	Dolev-Yao models can be seen as transition systems, 
	possibly infinite. We then extend these transition systems 
	with computation times and probabilities. The extended 
	models can account for normal Dolev-Yao transitions as 
	well as nonstandard operations such as inverting a one-way 
	function. Our main contribution consists of showing that 
	under sufficient realistic assumptions the extended models 
	are equivalent to standard Dolev-Yao models as far as 
	security is concerned. Thus our work enlarges the scope of 
	existing decision procedures.}
}
@misc{bouyer-movep2004,
  author = {Bouyer, Patricia},
  title = {Timed Automata~--- {F}rom Theory to Implementation},
  year = 2004,
  month = dec,
  note = {27~pages},
  howpublished = {Invited tutorial, 6th {W}inter {S}chool on
		{M}odelling and {V}erifying {P}arallel {P}rocesses
		({MOVEP}'04), Brussels, Belgium}
}
@misc{gastin-movep2004,
  author = {Gastin, Paul},
  title = {Basics of model checking},
  year = 2004,
  month = dec,
  nonote = {-- pages},
  howpublished = {Invited tutorial, 6th {W}inter {S}chool on
		{M}odelling and {V}erifying {P}arallel {P}rocesses
		({MOVEP}'04), Brussels, Belgium}
}
@misc{bouyer-epit32,
  author = {Bouyer, Patricia},
  title = {Timed Models for Concurrent Systems},
  year = 2004,
  month = apr,
  howpublished = {Invited lecture, 32nd {S}pring {S}chool on 
		{T}heoretical {C}omputer {S}cience ({C}oncurrency {T}heory), 
		Luminy, France}
}
@misc{gastin-epit32,
  author = {Gastin, Paul},
  title = {Specifications for distributed systems},
  year = 2004,
  month = apr,
  howpublished = {Invited lecture, 32nd {S}pring {S}chool on 
		{T}heoretical {C}omputer {S}cience ({C}oncurrency {T}heory), 
		Luminy, France}
}
@misc{bouyer-qest04,
  author = {Bouyer, Patricia},
  title = {Timed Automata~--- {F}rom Theory to Implementation},
  year = 2004,
  month = sep,
  howpublished = {Invited tutorial, 1st International Conference on the 
		Quantitative Evaluation of System (QEST'04), 
		Twente, The Netherlands}
}
@inproceedings{BBL-hscc2004,
  address = {Philadelphia, Pennsylvania, USA},
  month = mar,
  year = 2004,
  volume = 2993,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Alur, Rajeev and Pappas, George J.},
  acronym = {{HSCC}'04},
  booktitle = {{P}roceedings of the 7th {I}nternational {C}onference
               on {H}ybrid {S}ystems: {C}omputation and {C}ontrol
               ({HSCC}'04)},
  author = {Bouyer, Patricia and Brinksma, Ed and 
                 Larsen, Kim G.},
  title = {Staying Alive As Cheaply As Possible},
  pages = {203-218},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-hscc04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-hscc04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBL-hscc04.ps},
  abstract = {This paper is concerned with the 
	derivation of infinite schedules for timed automata 
	that are in some sense optimal. To cover a wide class 
	of optimality criteria we start out by introducing an 
	extension of the (priced) timed automata model that 
	includes both costs and rewards as separate modelling 
	features. A precise definition is then given of what 
	constitutes optimal infinite behaviours for this class 
	of models. We subsequently show that the derivation of 
	optimal non-terminating schedules for such 
	double-priced timed automata is computable. This is 
	done by a reduction of the problem to the determination 
	of optimal mean-cycles in finite graphs with weighted 
	edges. This reduction is obtained by introducing the 
	so-called corner-point abstraction, a powerful 
	abstraction technique of which we show that it 
	preserves optimal schedules. }
}
@inproceedings{BBLP-tacas04,
  address = {Barcelona, Spain},
  month = mar,
  year = 2004,
  volume = 2988,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Jensen, Kurt and Podelski, Andreas},
  acronym = {{TACAS}'04},
  booktitle = {{P}roceedings of the 10th {I}nternational 
               {C}onference on {T}ools and {A}lgorithms for
               {C}onstruction and {A}nalysis of {S}ystems
               ({TACAS}'04)},
  author = {Behrmann, Gerd and Bouyer, Patricia and 
                 Larsen, Kim G. and Pel{\'a}nek, Radek},
  title = {Lower and Upper Bounds in Zone Based Abstractions of
                 Timed Automata},
  pages = {312-326},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBLP-tacas04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBLP-tacas04.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBLP-tacas04.pdf},
  abstract = {Timed automata have an infinite 
	semantics. For verification purposes, one usually 
	uses zone based abstractions w.r.t.~the maximal 
	constants to which clocks of the timed automaton are 
	compared. We show that by distinguishing maximal 
	lower and upper bounds, significantly coarser 
	abstractions can be obtained. We show soundness and 
	completeness of the new abstractions 
	w.r.t.~reachability. We demonstrate how information 
	about lower and upper bounds can be used to optimise 
	the algorithm for bringing a difference bound matrix 
	into normal form. Finally, we experimentally 
	demonstrate that the new techniques dramatically 
	increases the scalability of the real-time model 
	checker~{\scshape Uppaal}. }
}
@article{BBP-IJPR04,
  publisher = {Taylor \& Francis},
  journal = {International Journal of Production Research},
  author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and 
                  Antoine Petit},
  title = {Analysing the {PGM} Protocol with {U}ppaal},
  volume = {42},
  number = {14},
  pages = {2773-2791},
  year = {2004},
  month = jul,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBP-IJPR04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBP-IJPR04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBP-IJPR04.ps},
  abstract = {Pragmatic General Multicast (PGM) 
	is a reliable multicast protocol, designed to 
	minimize both the probability of negative 
	acknowledgements~(NAK) implosion and the load 
	of the network due to retransmissions of lost 
	packets. This protocol was presented to the 
	Internet Engineering Task Force as an open 
	reference specification.\par
	    In this paper, we focus on the main 
	reliability property which PGM intends to 
	guarantee: a receiver either receives all data 
	packets from transmissions and repairs or is 
	able to detect unrecoverable data packet loss. 
	\par
	    We first propose a modelization of (a 
	simplified version of) PGM via a network of 
	timed automata. Using Uppaal model-checker, we 
	then study the validity of the reliability 
	property above, which turns out not to be 
	always verified but to depend on the values of 
	several parameters that we underscore.}
}
@inproceedings{BBS-afadl2004,
  address = {Besan{\c{c}}on, France},
  month = jun,
  year = 2004,
  editor = {Julliand, Jacques},
  acronym = {{AFADL}'04},
  booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles
               dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels
               ({AFADL}'04)},
  author = {Ben{ }Gaid, Mongi and B{\'e}rard, B{\'e}atrice and 
                  De{~}Smet, Olivier},
  title = {Mod{\'e}lisation et v{\'e}rification d'un 
                  {\'e}vaporateur en {Uppaal}},
  pages = {223-238},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-afadl04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBS-afadl04.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-afadl04.pdf}
}
@inproceedings{BDF-afadl2004,
  address = {Besan{\c{c}}on, France},
  month = jun,
  year = 2004,
  editor = {Julliand, Jacques},
  acronym = {{AFADL}'04},
  booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles
               dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels
               ({AFADL}'04)},
  author = {Bardin, S{\'e}bastien and 
                  Darlot, {\relax Ch}ristophe and Finkel, Alain},
  title = {{FAST}: un model-checker pour syst{\`e}mes {\`a}
                 compteurs},
  pages = {377-380},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDF-afadl04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDF-afadl04.ps},
  abstract = {FAST est un outil pour la 
	v\'erification de propri\'et\'es de s\^uret\'e 
	pour des syst\`emes \`a compteurs. 
	L'originalit\'e de l'outil tient dans 
	l'utilisation de repr\'esentations symboliques 
	pour repr\'esenter des ensembles infinis et de 
	techniques d'acc\'el\'eration pour augmenter 
	les chances de convergence. FAST a \'et\'e 
	appliqu\'e avec succ\`es \`a un grand nombre de 
	cas non triviaux.}
}
@article{BDFP04,
  publisher = {Elsevier Science Publishers},
  journal = {Theoretical Computer Science},
  author = {Bouyer, Patricia and Dufourd, Catherine and 
                  Fleury, Emmanuel and Petit, Antoine},
  title = {Updatable Timed Automata},
  volume = {321},
  number = {2-3},
  pages = {291-345},
  year = {2004},
  month = aug,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/uta-BDFP04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/uta-BDFP04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/uta-BDFP04.ps},
  doi = {10.1016/j.tcs.2004.04.003},
  abstract = {We investigate extensions of Alur and 
	Dill's timed automata, based on the possibility to 
	update the clocks in a more elaborate way than simply 
	reset them to zero. We call these automata updatable 
	timed automata. They form an undecidable class of 
	models, in the sense that emptiness checking is not 
	decidable. However, using an extension of the region 
	graph construction, we exhibit interesting decidable 
	subclasses. In a surprising way, decidability depends 
	on the nature of the clock constraints which are 
	used, diagonal-free or not, whereas these constraints 
	play identical roles in timed automata. We thus 
	describe in a quite precise way the thin frontier 
	between decidable and undecidable classes of 
	updatable timed automata. \par 
	We also study the 
	expressive power of updatable timed automata. It 
	turns out that any updatable automaton belonging to 
	some decidable subclass can be effectively 
	transformed into an equivalent timed automaton 
	without updates but with silent transitions. The 
	transformation suffers from an enormous combinatorics 
	blow-up which seems unavoidable. Therefore, updatable 
	timed automata appear to be a concise model for 
	representing and analyzing large classes of timed 
	systems. }
}
@inproceedings{BF-atva04,
  address = {Taipei, Taiwan},
  month = oct # {-} # nov,
  year = {2004},
  volume = {3299},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Wang, Farn},
  acronym = {{ATVA}'04},
  booktitle = {{P}roceedings of the 2nd {I}nternational
               {S}ymposium on {A}utomated {T}echnology
               for {V}erification and {A}nalysis
               ({ATVA}'04)},
  author = {Bardin, S{\'e}bastien and Finkel, Alain},
  title = {Composition of accelerations to verify infinite
                 heterogeneous systems},
  pages = {248-262},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BF-atva04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BF-atva04.ps},
  abstract = {Symbolic representations and 
	acceleration algorithms are emerging methods to 
	extend model-checking to infinite state space 
	systems. However until now, there is no general 
	theory of acceleration, and designing 
	acceleration algorithms for new data types is a 
	complex task. On the other hand, protocols 
	rarely manipulate new data types, rather new 
	combinations of well-studied data types. For 
	this reason, in this paper we focus on the 
	automatic construction of symbolic 
	representations and acceleration algorithms 
	from existing ones.}
}
@inproceedings{BFL-tacas04,
  address = {Barcelona, Spain},
  month = mar,
  year = 2004,
  volume = 2988,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Jensen, Kurt and Podelski, Andreas},
  acronym = {{TACAS}'04},
  booktitle = {{P}roceedings of the 10th {I}nternational 
               {C}onference on {T}ools and {A}lgorithms for
               {C}onstruction and {A}nalysis of {S}ystems
               ({TACAS}'04)},
  author = {Bardin, S{\'e}bastien and Finkel, Alain and 
                 Leroux, J{\'e}r{\^o}me},
  title = {{FAST}er Acceleration of Counter Automata in
                 Practice},
  pages = {576-590},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFL-tacas04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFL-tacas04.ps},
  abstract = {We compute reachability sets of 
	counter automata. Even if the reachability set 
	is not necessarily recursive, we use symbolic 
	representation and acceleration to increase 
	convergence. For functions defined by 
	translations over a polyhedral domain, we give 
	a new acceleration algorithm which is 
	polynomial in the size of the function and 
	exponential in its dimension, while the more 
	generic algorithm is exponential in both the 
	size of the function and its dimension. This 
	algorithm has been implemented in the tool 
	FAST. We apply it to a complex industrial 
	protocol, the TTP membership algorithm. This 
	protocol has been widely studied. For the first 
	time, the protocol is automatically proved to 
	be correct for \(1\)~fault and \(N\)~stations, 
	and using abstraction we prove the correctness 
	for \(2\)~faults and \(N\)~stations also.}
}
@inproceedings{BFN-avis2004,
  address = {Barcelona, Spain},
  month = apr,
  year = 2004,
  editor = {Bharadwaj, Ramesh},
  acronym = {{AVIS}'04},
  booktitle = {{P}roceedings of the 3rd {I}nternational
               {W}orkshop on {A}utomated {V}erification
               of {I}nfinite-{S}tate {S}ystems
               ({AVIS}'04)},
  author = {Bardin, S{\'e}bastien and Finkel, Alain and 
                 Nowak, David},
  title = {Toward Symbolic Verification of Programs Handling
                 Pointers},
  nopages = {},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFN-avis2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFN-avis2004.ps},
  abstract = {We aim at checking safety 
	properties on systems with pointers which are 
	naturally infinite state systems. In this 
	paper, we introduce Symbolic Memory States, a 
	new symbolic representation well suited to the 
	verification of systems with pointers. We show 
	SMS enjoys all the good properties needed to 
	check safety properties, such as closure under 
	union, canonicity of the representation and 
	decidable inclusion. We also introduce pointer 
	automata, a model for programs using dynamic 
	allocation of memory. We define the properties 
	we want to check in this model and we give 
	undecidability results. The verification part 
	is still work in progress.}
}
@inproceedings{BP-coast04,
  address = {Besan{\c{c}}on, France},
  month = jun,
  year = 2004,
  editor = {Julliand, Jacques},
  acronym = {{AFADL}'04},
  booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles
               dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels
               ({AFADL}'04)},
  author = {Bardin, S{\'e}bastien and Petrucci, Laure},
  title = {{COAST}: des r{\'e}seaux de {P}etri {\`a} la
                 planification assist{\'e}e},
  pages = {285-298},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-afadl04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-afadl04.ps},
  abstract = {COAST est un outil d'assistance 
	\`a la planification militaire. Son 
	architecture distribu\'ee comprend un serveur 
	constitu\'e d'un moteur d'analyse de r\'eseaux 
	de Petri tandis que l'interface graphique 
	fournie par le client permet de masquer 
	l'utilisation des m\'ethodes formelles. Les 
	synchronisations entre t\^aches \`a planifier 
	sont un aspect essentiel de COAST. Dans cet 
	article, apr\`es une pr\'esentation 
	g\'en\'erale de la probl\'ematique et de 
	l'outil, nous d\'ecrivons les synchronisations, 
	montrons comment elles sont mod\'elis\'ees et 
	implant\'ees.}
}
@inproceedings{BP-pnml2004,
  address = {Bologna, Italy},
  month = jun,
  year = {2004},
  editor = {Kindler, Ekkart},
  booktitle = {{P}roceedings of the {W}orkshop on
           {I}nterchange {F}ormat for {P}etri {N}ets},
  author = {Bardin, S{\'e}bastien and Petrucci, Laure},
  title = {From {PNML} to Counter Systems for Accelerating
                 {P}etri Nets with~{FAST}},
  pages = {26-40},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-pnml04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-pnml04.ps},
  abstract = {We use the tool FAST to check 
	parameterized safety properties on Petri nets 
	with a large or infinite state space. Although 
	this tool is not dedicated to Petri nets, it 
	can be used for these as place\slash transition 
	nets (and some of their extensions) are 
	subcases of FAST input model. The originality 
	of the tool lies in the use of acceleration 
	techniques in order to compute the exact 
	reachability set for infinite systems.\par

	In this paper, we present the automatic 
	transformation of Petri nets written in PNML 
	(Petri Net Markup Language) into counter 
	systems. Then, FAST provides a simple but very 
	powerful language to express complex properties 
	and check these.}
}
@inproceedings{BCFL-fsttcs04,
  address = {Chennai, India},
  month = dec,
  year = 2004,
  volume = 3328,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Lodaya, Kamal and Mahajan, Meena},
  acronym = {{FSTTCS}'04},
  booktitle = {{P}roceedings of the 24th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'04)},
  author = {Bouyer, Patricia and Cassez, Franck and 
                 Fleury, Emmanuel and 
                 Larsen, Kim G.},
  title = {Optimal Strategies in Priced Timed Game Automata},
  pages = {148-160},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFL-fsttcs04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/
                  BCFL-fsttcs04.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFL-fsttcs04.pdf},
  abstract = {Priced timed (game) automata extend 
	timed (game) automata with costs on both locations 
	and transitions. In this paper we focus on 
	reachability priced timed game automata and prove 
	that the optimal cost for winning such a game is 
	computable under conditions concerning the 
	non-zenoness of cost. Under stronger conditions 
	(strictness of constraints) we prove that in case an 
	optimal strategy exists, we can compute a 
	state-based winning optimal strategy.}
}
@inproceedings{BerSch-avis2004,
  address = {Barcelona, Spain},
  month = apr,
  year = 2004,
  editor = {Bharadwaj, Ramesh},
  acronym = {{AVIS}'04},
  booktitle = {{P}roceedings of the 3rd {I}nternational
               {W}orkshop on {A}utomated {V}erification
               of {I}nfinite-{S}tate {S}ystems
               ({AVIS}'04)},
  author = {Bertrand, Nathalie and 
                  Schnoebelen, {\relax Ph}ilippe},
  title = {Verifying Nondeterministic Channel Systems With
                 Probabilistic Message Losses},
  nopages = {},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerSch-avis04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerSch-avis04.pdf},
  abstract = {Lossy channel systems (LCS's) are 
	systems of finite state automata that communicate 
	via unreliable unbounded fifo channels. In order to 
	circumvent the undecidability of model checking for 
	nondeterministic LCS's, probabilistic models have 
	been introduced, where it can be decided whether a 
	linear-time property holds almost surely. However, 
	such fully probabilistic systems are not a faithful 
	model of nondeterministic protocols.\par
	We study a hybrid model for LCS's where losses of 
	messages are seen as faults occurring with some 
	given probability, and where the internal behavior 
	of the system remains nondeterministic. Thus the 
	semantics is in terms of infinite-state reactive 
	Markov chains (equivalently, Markovian decision 
	processes). A similar model was introduced in the 
	second part of (Bertrand \& Schnoebelen, 
	FOSSACS'2003, LNCS 2620, pp.~120-135): we continue 
	this work and give a complete picture of the 
	decidability of qualitative model checking for 
	MSO-definable properties and some relevant 
	subcases.}
}
@book{CASL-LNCS,
  author = {Bidoit, Michel and Mosses, Peter D.},
  title = {{CASL} User Manual~--- Introduction to Using the 
                 Common
                 Algebraic Specification Language},
  volume = {2900},
  series = {Lecture Notes in Computer Science},
  year = {2004},
  publisher = {Springer},
  isbn10 = {3-540-20766-X},
  isbn = {978-3-540-20766-5},
  doi = {10.1007/b11968},
  url = {http://www.springer.com/978-3-540-20766-X},
  oldurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-20766-X}
}
@mastersthesis{Chevalier-dea,
  author = {Chevalier, Fabrice},
  title = {D{\'e}tection d'erreurs dans les syst{\`e}mes
                 temporis{\'e}s},
  year = {2004},
  month = sep,
  type = {Rapport de {DEA}},
  school = {{DEA} Algorithmique, Paris, France},
  note = {59~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FC-dea2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FC-dea2004.ps}
}
@article{ComonCortier04scp,
  publisher = {Elsevier Science Publishers},
  journal = {Science of Computer Programming},
  author = {Comon{-}Lundh, Hubert  and Cortier, V{\'e}ronique},
  title = {Security Properties: {T}wo Agents are Sufficient},
  volume = {50},
  number = {1-3},
  pages = {51-71},
  year = {2004},
  month = mar,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortier-step2.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortier-step2.ps}
}
@inproceedings{DCMM-hscc2004,
  address = {Philadelphia, Pennsylvania, USA},
  month = mar,
  year = 2004,
  volume = 2993,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Alur, Rajeev and Pappas, George J.},
  acronym = {{HSCC}'04},
  booktitle = {{P}roceedings of the 7th {I}nternational {C}onference
               on {H}ybrid {S}ystems: {C}omputation and {C}ontrol
               ({HSCC}'04)},
  author = {Davoren, Jennifer M. and Coulthard, Vaughan and 
                 Markey, Nicolas and
                 Moor, {\relax Th}omas},
  title = {Non-deterministic Temporal Logics for General Flow
                 Systems},
  pages = {280-295},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HSCC04-DCMM.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HSCC04-DCMM.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HSCC04-DCMM.pdf},
  abstract = {In this paper, we use the constructs of branching temporal logic to
	formalize reasoning about a class of general flow systems, including 
	discrete-time transition systems, continuous-time differential
	inclusions, 
	and hybrid-time
	systems such as hybrid automata. We introduce Full General Flow Logic, 
	GFL\(^*\),
	which has essentially the same syntax as the well-known Full Computation Tree
	Logic, CTL\(^*\), 
	but generalizes the semantics to general flow systems over arbitrary
	time-lines. We propose an axiomatic proof system for GFL\(^*\) and establish its
	soundness w.r.t. the general flow semantics.}
}
@inproceedings{DDMR-formats2004,
  address = {Grenoble, France},
  month = sep,
  year = 2004,
  volume = {3253},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Lakhnech, Yassine and Yovine, Sergio},
  acronym = {{FORMATS}'04/{FTRTFT}'04},
  booktitle = {{P}roceedings of the {J}oint {C}onferences
               {F}ormal {M}odelling and {A}nalysis of {T}imed
               {S}ystems ({FORMATS}'04) and
               {F}ormal {T}echniques in {R}eal-{T}ime and
               {F}ault-{T}olerant {S}ystems ({FTRTFT}'04)},
  author = {De{~}Wulf, Martin and Doyen, Laurent and 
                 Markey, Nicolas and 
                 Raskin, Jean-Fran{\c{c}}ois},
  title = {Robustness and Implementability of Timed Automata},
  pages = {118-133},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDMR-formats2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DDMR-formats2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDMR-formats2004.pdf},
  abstract = {In a former paper, we defined a new semantics for timed
	automata, the Almost ASAP semantics, which is parameterized by
	\(\Delta\)
	to cope with the reaction delay of the controller. We showed that this
	semantics is implementable provided there exists a strictly positive value
	for the parameter \(\Delta\) for which the strategy is correct. In this paper, we
	define the implementability problem to be the question of existence of
	such a \(\Delta\). We show that this question is closely related to a notion of
	robustness for timed automata defined in [Pur98] and prove that the
	implementability problem is decidable.}
}
@article{DFP-DISTCOMP,
  publisher = {Springer},
  journal = {Distributed Computing},
  author = {Duflot, Marie and Fribourg, Laurent and 
                  Picaronny, Claudine},
  title = {Randomized Dining Philosophers Without Fairness
                 Assumption},
  volume = {17},
  number = {1},
  pages = {65-76},
  year = {2004},
  month = feb,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-DISCOMP.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-DISCOMP.ps},
  doi = {10.1007/s00446-003-0102-z}
}
@article{icomp-DG2004,
  publisher = {Elsevier Science Publishers},
  journal = {Information and Computation},
  author = {Diekert, Volker and Gastin, Paul},
  title = {Local temporal logic is expressively complete for 
		 cograph dependence alphabets},
  volume = {195},
  number = {1-2},
  pages = {30-52},
  year = 2004,
  month = nov,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG04-icomp.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DG04-icomp.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG04-icomp.pdf},
  doi = {10.1016/j.ic.2004.08.001},
  abstract = {Recently, local logics for Mazurkiewicz 
	traces are of increasing interest. This is mainly 
	due to the fact that the satisfiability problem has 
	the same complexity as in the word case. If we focus 
	on a purely local interpretation of formulae at 
	vertices (or events) of a trace, then the 
	satisfiability problem of linear temporal logics 
	over traces turns out to be PSPACE-complete. But 
	now the difficult problem is to obtain expressive 
	completeness results with respect to first order 
	logic. \par

	The main result of the paper shows such an 
	expressive completeness result, if the underlying 
	dependence alphabet is a cograph, \emph{i.e.} 
	if all 
	traces are series parallel posets. Moreover, we show 
	that this is the best we can expect in our setting: 
	If the dependence alphabet is not a cograph, then we 
	cannot express all first order properties.}
}
@inproceedings{Dem-fossacs2004,
  address = {Barcelona, Spain},
  month = mar,
  year = 2004,
  volume = 2987,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Walukiewicz, Igor},
  acronym = {{FoSSaCS}'04},
  booktitle = {{P}roceedings of the 7th {I}nternational 
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'04)},
  author = {Demri, St{\'e}phane},
  title = {{LTL} over Integer Periodicity Constraints},
  pages = {121-135},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-fossacs04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Demri-fossacs04.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-fossacs04.pdf}
}
@misc{FAST-v1.5,
  author = {Bardin, S{\'e}bastien and Darlot, {\relax Ch}ristophe and
		 Finkel, Alain and Leroux, J{\'e}r{\^o}me and Van{~}Begin, Laurent},
  futureauthor = {Il en manque ? Plus maintenant...},
  title = {{FAST}~v1.5: {F}ast {A}cceleration of {S}ymbolic
                 {T}ransition Systems},
  year = {2004},
  month = jun,
  howpublished = {Available at \url{http://www.lsv.ens-cachan.fr/fast/}},
  url = {http://www.lsv.ens-cachan.fr/fast/}
}
@inproceedings{FL-cav04,
  address = {Boston, Massachusetts, USA},
  month = jul,
  year = 2004,
  volume = 3114,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Alur, Rajeev and Peled, Doron A.},
  acronym = {{CAV}'04},
  booktitle = {{P}roceedings of the 16th
               {I}nternational {C}onference on 
               {C}omputer {A}ided {V}erification
               ({CAV}'04)},
  author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me},
  title = {Image Computation in Infinite State Model Checking},
  pages = {361-371},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-cav04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-cav04.ps}
}
@inproceedings{FL-spin04,
  address = {Barcelona, Spain},
  month = apr,
  year = 2004,
  volume = 2989,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Graf, Susanne and Mounier, Laurent},
  acronym = {{SPIN}'04},
  booktitle = {{P}roceedings of the 11th {I}nternational
               {SPIN} {W}orkshop on {M}odel {C}hecking {S}oftware
               ({SPIN}'04)},
  author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me},
  title = {Polynomial Time Image Computation With
                 Interval-Definable Counters Systems},
  pages = {182-197},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-spin04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-spin04.ps}
}
@inproceedings{FMP-disc04,
  address = {Amsterdam, The Netherlands},
  month = oct,
  year = 2004,
  volume = 3274,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Guerraoui, Rachid},
  acronym = {{DISC}'04},
  booktitle = {{P}roceedings of the 18th {I}nternational
               {S}ymposium on {D}istributed {C}omputing
               ({DISC}'04)},
  author = {Fribourg, Laurent and Messika, St{\'e}phane and 
                  Picaronny, Claudine},
  title = {Coupling and Self-Stabilization},
  pages = {201-215},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FMP-disc04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FMP-disc04.pdf}
}
@article{FMP-wstsPN-icomp,
  publisher = {Elsevier Science Publishers},
  journal = {Information and Computation},
  author = {Finkel, Alain and McKenzie, Pierre and Picaronny, Claudine},
  title = {A Well-Structured Framework for Analysing {P}etri Net
                 Extensions},
  volume = {195},
  number = {1-2},
  pages = {1-29},
  year = {2004},
  month = nov,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FMP-wstsPN-icomp.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FMP-wstsPN-icomp.ps},
  doi = {10.1016/j.ic.2004.01.005}
}
@inproceedings{GLNZ-csl2004,
  address = {Karpacz, Poland},
  month = sep,
  year = 2004,
  volume = {3210},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Marcinkowski, Jerzy and Tarlecki, Andrzej},
  acronym = {{CSL}'04},
  booktitle = {{P}roceedings the 18th {I}nternational
               {W}orkshop on {C}omputer {S}cience {L}ogic
               ({CSL}'04)},
  author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir 
                 and Nowak, David and
                 Zhang, Yu},
  title = {Complete Lax Logical Relations for Cryptographic
                 Lambda-Calculi},
  pages = {400-414},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLNZ-csl04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLNZ-csl04.ps}
}
@inproceedings{KucSch2004,
  address = {London, UK},
  month = aug,
  year = 2004,
  volume = 3170,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko},
  acronym = {{CONCUR}'04},
  booktitle = {{P}roceedings of the 15th 
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'04)},
  author = {Ku{\v c}era, Anton{\'\i}n and 
                  Schnoebelen, {\relax Ph}ilippe},
  title = {A General Approach to Comparing Infinite-State Systems
                 with Their Finite-State Specifications},
  pages = {372-386},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KS-concur2004.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KS-concur2004.pdf},
  doi = {10.1007/978-3-540-28644-8_24},
  abstract = {We introduce a generic family of behavioral relations for 
which the
problem of comparing an arbitrary transition system to some
finite-state specification can be reduced to a model checking problem
against simple modal formulae. As an application, we derive
decidability of several regular equivalence problems for well-known
families of infinite-state systems.}
}
@inproceedings{LMS-concur2004,
  address = {London, UK},
  month = aug,
  year = 2004,
  volume = 3170,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko},
  acronym = {{CONCUR}'04},
  booktitle = {{P}roceedings of the 15th 
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'04)},
  author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and
                 Schnoebelen, {\relax Ph}ilippe},
  title = {Model Checking Timed Automata with One or Two Clocks},
  pages = {387-401},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-concur2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMS-concur2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-concur2004.pdf},
  doi = {10.1007/978-3-540-28644-8_25},
  abstract = {In this paper, we study model checking of timed automata
	(TAs), and more precisely we aim at finding efficient model checking
	for subclasses of TAs. For this, we consider model checking TCTL and
	TCTL, over TAs with one clock or two clocks.\par
	First we show that the reachability problem is NLOGSPACE-complete
	for one clock TAs (i.e. as complex as reachability in classical graphs)
	and we give a polynomial time algorithm for model checking TCTL,
	over this class of TAs. Secondly we show that model checking becomes
	PSPACE-complete for full TCTL over one clock TAs. We also show that
	model checking CTL (without any timing constraint) over two clock TAs
	is PSPACE-complete and that reachability is NP-hard.}
}
@inproceedings{LS-concur04,
  address = {London, UK},
  month = aug,
  year = 2004,
  volume = 3170,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko},
  acronym = {{CONCUR}'04},
  booktitle = {{P}roceedings of the 15th 
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'04)},
  author = {Leroux, J{\'e}r{\^o}me and Sutre, Gr{\'e}goire},
  title = {On Flatness for 2-dimensional Vector Addition Systems
                 with States},
  pages = {402-416},
  nmnote = {Partially while J. Leroux was at LSV},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LS-concur04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LS-concur04.ps},
  doi = {10.1007/978-3-540-28644-8_26}
}
@techreport{LSV:04:10,
  author = {Baclet, Manuel and Pacalet, Renaud and 
                  Petit, Antoine},
  title = {Register Transfer Level Simulation},
  type = {Research Report},
  number = {LSV-04-10},
  year = {2004},
  month = may,
  institution = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  note = {15~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-10.rr.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/
		  rr-lsv-2004-10.rr.ps}
}
@techreport{LSV:04:11,
  author = {Baclet, Manuel and Chevallier, R{\'e}my},
  title = {Using {UPPAAL} to Verify an On-Chip Memory},
  type = {Research Report},
  number = {LSV-04-11},
  year = {2004},
  month = may,
  institution = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  note = {12~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-11.rr.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/
		  rr-lsv-2004-11.rr.ps}
}
@techreport{LSV:04:12,
  author = {Fribourg, Laurent and Messika, St{\'e}phane and 
                  Picaronny, Claudine},
  title = {Mixing Time of the Asymmetric Simple Exclusion Problem
                 on a Ring with Two Particles},
  type = {Research Report},
  number = {LSV-04-12},
  year = {2004},
  month = jun,
  institution = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  note = {15~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-12.rr.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/
		  rr-lsv-2004-12.rr.ps}
}
@inproceedings{Ler-atva04,
  address = {Taipei, Taiwan},
  month = oct # {-} # nov,
  year = {2004},
  volume = {3299},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Wang, Farn},
  acronym = {{ATVA}'04},
  booktitle = {{P}roceedings of the 2nd {I}nternational
               {S}ymposium on {A}utomated {T}echnology
               for {V}erification and {A}nalysis
               ({ATVA}'04)},
  author = {Leroux, J{\'e}r{\^o}me},
  title = {Disjunctive Invariants for Numerical Systems},
  pages = {93-107},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-atva04.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-atva04.ps}
}
@inproceedings{Ler-inf03,
  address = {Marseilles, France},
  month = aug,
  year = 2004,
  volume = 98,
  series = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier Science Publishers},
  editor = {Schnoebelen, {\relax Ph}ilippe},
  acronym = {{INFINITY}'03},
  booktitle = {{P}roceedings of the 5th {I}nternational 
               {W}orkshop on {V}erification of {I}nfinite
               {S}tate {S}ystems
               ({INFINITY}'03)},
  author = { Leroux, J{\'e}r{\^o}me},
  title = {The Affine Hull of a Binary Automaton is Computable in
                 Polynomial Time},
  pages = {89-104},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-inf03.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-inf03.ps}
}
@phdthesis{messika-these2004,
  author = {Messika, St{\'e}phane},
  title = {M{\'e}thodes probabilistes pour la v{\'e}rification des 
		  syst{\`e}mes distribu{\'e}s},
  year = 2004,
  month = dec,
  type = {Th{\`e}se de doctorat},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/messika-these.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/messika-these.pdf}
}
@inproceedings{MR-concur2004,
  address = {London, UK},
  month = aug,
  year = 2004,
  volume = 3170,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko},
  acronym = {{CONCUR}'04},
  booktitle = {{P}roceedings of the 15th 
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'04)},
  author = {Markey, Nicolas and Raskin, Jean-Fran{\c{c}}ois},
  title = {Model Checking Restricted Sets of Timed Paths},
  pages = {432-447},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MR-concur2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MR-concur2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MR-concur2004.pdf},
  doi = {10.1007/978-3-540-28644-8_28},
  abstract = {In this paper, we study the complexity of model-checking
	formulas of three important real-time logics (MTL, MITL, and TCTL)
	over restricted sets of timed paths. The classes of restricted sets of
	timed 
	paths that we consider are \textit{(i)} a single finite (or ultimately
	periodic) timed 
	path, \textit{(ii)} a infinite set of finite (or infinite) timed paths
	defined by a finite 
	(or ultimately periodic) path in a region graph, \textit{(iii)} a 
	infinite set of finite  
	(or infinite) timed paths defined by a finite (or ultimately periodic) path 
	in a zone graph.}
}
@inproceedings{MS-formats2004,
  address = {Grenoble, France},
  month = sep,
  year = 2004,
  volume = {3253},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Lakhnech, Yassine and Yovine, Sergio},
  acronym = {{FORMATS}'04/{FTRTFT}'04},
  booktitle = {{P}roceedings of the {J}oint {C}onferences
               {F}ormal {M}odelling and {A}nalysis of {T}imed
               {S}ystems ({FORMATS}'04) and
               {F}ormal {T}echniques in {R}eal-{T}ime and
               {F}ault-{T}olerant {S}ystems ({FTRTFT}'04)},
  author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe},
  title = {Symbolic Model Checking for Simply-Timed Systems},
  pages = {102-117},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-formats2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MS-formats2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-formats2004.pdf},
  abstract = {We describe OBDD-based symbolic model checking algorithms for
	simply-timed systems, i.e. finite state graphs where transitions 
	carry a duration. These durations can be arbitrary natural numbers. A
	simple and natural semantics for these systems opens the way for 
	improved efficiency. Our algorithms have been implemented in NuSMV
	and perform well in practice (on standard case studies).}
}
@inproceedings{MS-qest2004,
  address = {Enschede, The Netherlands},
  month = sep,
  year = 2004,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{QEST}'04},
  booktitle = {{P}roceedings of the 1st {I}nternational
               {C}onference on {Q}uantitative 
               {E}valuation of {S}ystems
               ({QEST}'04)},
  author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe},
  title = {{TSMV}: {A} Symbolic Model Checker for Quantitative
                 Analysis of Systems},
  pages = {330-331},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-qest2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MS-qest2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-qest2004.pdf},
  doi = {10.1109/QEST.2004.10028},
  abstract = {TSMV is an extension of NuSMV, the open-source
	symbolic model checker, aimed at dealing with timed versions
	of (models of) circuits, PLC controllers, protocols, etc. The
	underlying model is an extension of Kripke structures, where
	every transition carries an integer duration (possibly zero). This
	simple model supports efficient symbolic algorithms for RTCTL
	formulae.}
}
@inproceedings{Mar-afadl2004,
  address = {Besan{\c{c}}on, France},
  month = jun,
  year = 2004,
  editor = {Julliand, Jacques},
  acronym = {{AFADL}'04},
  booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles
               dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels
               ({AFADL}'04)},
  author = {Markey, Nicolas},
  title = {{TSMV}: model-checking symbolique de syst{\`e}mes
                 simplement temporis{\'e}s},
  pages = {349-352},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-afadl04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Mar-afadl04.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-afadl04.pdf}
}
@proceedings{PHS:INFINITY2003,
  title = {{P}roceedings of the 5th {I}nternational 
           {W}orkshop on {V}erification of {I}nfinite
           {S}tate {S}ystems
           ({INFINITY}'03)},
  booktitle = {{P}roceedings of the 5th {I}nternational 
               {W}orkshop on {V}erification of {I}nfinite
               {S}tate {S}ystems
               ({INFINITY}'03)},
  editor = {Schnoebelen, {\relax Ph}ilippe},
  volume = {98},
  series = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier Science Publishers},
  year = 2004,
  month = aug,
  doi = {10.1016/j.entcs.2003.10.001},
  address = {Marseilles, France},
  oldurl = {http://www.sciencedirect.com/science?_ob=IssueURL&
      _tockey=%23TOC%2313109%232004%23999019999%23512226%23FLP%23
      Volume_98,_(2_August_2004)%2BMProceedings_of_INFINITY_2003,
      _the_5th_International_Workshop_on_Verification_of_Infinite-State
      _Systems,_a_satellite_workshop_of_CONCUR_2003%2BMMarseille,_France,
      _2_September_2003%2BMEdited_by_P._Schnoebelen&_auth=y&view=c&
      _acct=C000051058&_version=1&_urlVersion=0&
      _userid=1052425&md5=c6eb616ae1aec31a577ad19b058bc540}
}
@techreport{Prouve:rap1,
  author = {Bozga, Liana and Delaune, St{\'e}phanie and 
                 Klay, Francis  and
                 Treinen, Ralf},
  title = {Sp{\'e}cification du protocole de porte-monnaie
                 {\'e}lectronique},
  year = {2004},
  month = jun,
  type = {Technical Report},
  number = 1,
  institution = {projet RNTL PROUV{\'E}},
  oldhowpublished = {Rapport Technique 1 du projet RNTL PROUV\'E},
  note = {12~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap1.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap1.ps},
  abstract = {Cette \'etude de cas a pour but de contribuer \`a une 
	premi\`ere \'evaluation des besoins pour l'aspect description formelle 
	des protocoles cryptographiques. Cet aspect est un pr\'ealable oblig\'e 
	avant d'aborder des points tels que la s\'emantique et la 
	v\'erification.  Le r\'esultat de ce travail a guid\'e la d\'efinition de 
	la syntaxe du langage de sp\'ecification d\'evelopp\'e dans la t\^ache~1 du 
	projet~: <<~S\'emantique des protocoles et des propri\'et\'es~>>.\par
	Parmi la multitude de protocoles existants celui qui a \'et\'e \'etudi\'e 
	est un porte-monnaie \'electronique \`a cl\'e publique d\'evelopp\'e
	r\'ecemment par France T\'el\'ecom R\&D car il refl\`ete fid\`element les 
	ambitions du projet.  Ce protocole, sortant sans surprise du 
	spectre de tous les outils d\'evelopp\'es \`a l'heure actuelle, notre 
	travail a consist\'e \`a mod\'eliser au mieux le porte-monnaie 
	\'electronique dans un sous ensemble repr\'esentatif d'outils 
	existants. Cette \'etude met \'evidence, sur un cas r\'eel, les carences 
	et les faiblesses des outils actuels et permet ainsi d'affiner et 
	de valider les objectifs du projet. D'un autre c\^ot\'e, ce travail 
	montre que des lacunes importantes peuvent parfois \^etre 
	raisonnablement contourn\'ees modulo un codage adapt\'e.}
}
@techreport{Prouve:rap2,
  author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie 
                 and Lafourcade, Pascal},
  title = {A Survey of Algebraic Properties Used in Cryptographic
                 Protocols},
  year = {2004},
  month = jun,
  type = {Technical Report},
  number = 2,
  institution = {projet RNTL PROUV{\'E}},
  oldhowpublished = {Rapport Technique 2 du projet RNTL PROUV\'E},
  note = {19~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap2.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap2.ps},
  abstract = {Using the \emph{perfect encryption 
	assumption}, cryptographic primitives are often 
	represented by free function symbols. However some attacks 
	and even honest runs may use algebraic properties of the 
	operators like the exclusive or, the modular 
	exponentiation, the addition, etc.\par
	We give here a survey of protocols and attacks using such 
	algebraic properties.}
}
@techreport{Prouve:rap3,
  author = {Treinen, Ralf},
  title = {The {PROUV\'E} Specification Language},
  year = {2004},
  month = aug,
  number = 3,
  type = {Technical Report},
  institution = {Projet RNTL PROUV{\'E}},
  oldhowpublished = {Rapport Technique 3 du projet RNTL PROUV\'E},
  note = {10~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap3.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap3.ps}
}
@techreport{Prouve:rap4,
  author = {Bernat, Vincent and Comon{-}Lundh, Hubert and 
		  Cortier, V{\'e}ronique and Delaune, St{\'e}phanie and 
		  Jacquemard, Florent and Lafourcade, Pascal and 
		  Lakhnech, Yassine and Mazar{\'e}, Laurent},
  title = {Sufficient conditions on properties for an automated 
		  verification: theoretical report on the verification of 
		  protocols for an extended model of the intruder },
  year = {2004},
  month = dec,
  type = {Technical Report},
  number = 4,
  institution = {projet RNTL PROUV{\'E}},
  oldhowpublished = {Rapport Technique 4 du projet RNTL PROUV\'E},
  note = {33~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap4.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap4.ps},
  abstract = {Cryptographic protocols are 
	successfully analyzed using formal methods. 
	However, formal approaches usually consider 
	the encryption schemes as black boxes and 
	assume that an adversary cannot learn 
	anything from an encrypted message except 
	if he has the key. Such an assumption is 
	too strong in general since some attacks 
	exploit in a clever way the interaction 
	between protocol rules and properties of 
	cryptographic operators. Moreover, the 
	executability of some protocols relies 
	explicitly on some algebraic properties of 
	cryptographic primitives such as 
	commutative encryption. We first give an 
	overview of the existing methods in formal 
	approaches for analyzing cryptographic 
	protocols. Then we describe more precisely 
	the results obtained by the partners of the 
	RNTL project PROUV\'E.}
}
@mastersthesis{Ratti-dea,
  author = {Ratti, Benjamin},
  title = {Automates d'arbre d'ordre~deux},
  year = 2004,
  month = sep,
  type = {Rapport de {DEA}},
  school = {{DEA} Programmation, Paris, France},
  note = {45~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BRatti-dea2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BRatti-dea2004.ps}
}
@mastersthesis{Reynier-dea,
  author = {Reynier, Pierre-Alain},
  title = {Analyse en avant des automates temporis{\'e}s},
  year = {2004},
  month = sep,
  type = {Rapport de {DEA}},
  school = {{DEA} Algorithmique, Paris, France},
  note = {68~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PAR-dea2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PAR-dea2004.ps}
}
@incollection{Sch-voss,
  year = 2004,
  volume = 2925,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Baier, {\relax Ch}ristel and Haverkort, Boudewijn R.
            and Hermanns, Holger and Katoen, Joost-Pieter and
            Siegle, Markus and Vaandrager, Frits},
  acronym = {{V}alidation of {S}tochastic {S}ystems},
  booktitle = {{V}alidation of {S}tochastic {S}ystems: {A} {G}uide
               to {C}urrent {R}esearch},
  author = {Schnoebelen, {\relax Ph}ilippe},
  title = {The Verification of Probabilistic Lossy Channel
                 Systems},
  pages = {445-465},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-voss.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-voss.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-voss.pdf},
  abstract = {Lossy channel systems (LCS's) are 
	systems of finite state automata that 
	communicate via unreliable unbounded fifo 
	channels. Several probabilistic versions of 
	these systems have been proposed in recent 
	years, with the two aims of modeling more 
	faithfully the losses of messages, and 
	circumventing undecidabilities by some kind of 
	randomization. We survey these proposals and 
	the verification techniques they support.}
}
@inproceedings{bh-amast2004,
  address = {Stirling, UK},
  month = jul,
  year = 2004,
  volume = 3116,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Rattray, Charles and Maharaj, Savitri and Shankland, Carron},
  acronym = {{AMAST}'04},
  booktitle = {{P}roceedings of the 10th {I}nternational
               {C}onference on {A}lgebraic {M}ethodology and
               {S}oftware {T}echnology
               ({AMAST}'04)},
  author = {Bidoit, Michel and Hennicker, Rolf},
  title = {Glass Box and Black Box Views of State-Based System
                 Specifications},
  pages = {19},
  note = {Invited talk}
}
@inproceedings{bhkb-sefm2004,
  address = {Beijing, China},
  month = sep,
  year = 2004,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{SEFM}'04},
  booktitle = {{P}roceedings of the 2nd {IEEE} {I}nternational
               {C}onference on {S}oftware {E}ngineering and
               {F}ormal {M}ethods
               ({SEFM}'04)},
  author = {Bidoit, Michel and Hennicker, Rolf and 
                 Knapp, Alexander
                 and Baumeister, Hubert},
  title = {Glass-Box and Black-Box Views on Object-Oriented
                 Specifications},
  pages = {208-217},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bhkb-sefm2004.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bhkb-sefm2004.pdf},
  doi = {10.1109/SEFM.2004.10014}
}
@inproceedings{bj-strategies2004,
  address = {Cork, Ireland},
  month = jul,
  year = 2004,
  editor = {Bonacina, Maria Paola and 
            Boy{ }de{~}la{~}Tour, {\relax Th}ierry},
  acronym = {{STRATEGIES}'04},
  booktitle = {{P}roceedings of the 5th {W}orkshop
               on {S}trategies in {A}utomated {D}eduction
               ({STRATEGIES}'04)},
  author = {Bouhoula, Adel and Jacquemard, Florent},
  title = {Constrained Tree Grammars to Pilot Automated Proof 
                  by
                 Induction},
  pages = {64-78},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-strategies04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-strategies04.pdf}
}
@techreport{blueberries-TR1.3.2,
  author = {Baclet, Manuel and Chevallier, R{\'e}my},
  title = {Using {UPPAAL} to verify an on-chip memory},
  year = {2004},
  month = may,
  type = {Contract Report},
  number = {(Work Package~3.2 Fourniture~1)},
  institution = {projet T126 MEDEA+ Blueberries},
  oldhowpublished = {Fourniture 1 du Work Package 3.2 du projet T126 MEDEA+
                 Blueberries},
  note = {12~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-11.rr.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/
		  rr-lsv-2004-11.rr.ps}
}
@article{bouyer-fmsd-2004,
  publisher = {Kluwer Academic Publishers},
  journal = {Formal Methods in System Design},
  author = {Bouyer, Patricia},
  title = {Forward Analysis of Updatable Timed Automata},
  volume = {24},
  number = {3},
  pages = {281-320},
  year = {2004},
  month = may,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bou-FMSD2004.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bou-FMSD2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-FMSD2004.ps},
  doi = {10.1023/B:FORM.0000026093.21513.31},
  abstract = {Timed automata are a widely studied 
	model. Its decidability has been proved using the 
	so-called region automaton construction. This 
	construction provides a correct abstraction for 
	the behaviours of timed automata, but it suffers 
	from a state explosion and is thus not used in 
	practice. Instead, algorithms based on the notion 
	of zones are implemented using adapted data 
	structures like~DBMs. When we focus on forward 
	analysis algorithms, the exact computation of all 
	the successors of the initial configurations does 
	not always terminate. Thus, some abstractions are 
	often used to ensure termination, among which, a 
	widening operator on zones.\par
	In this paper, we study in detail this widening 
	operator and the corresponding forward analysis 
	algorithm. This algorithm is most used and 
	implemented in tools like KRONOS and UPPAAL. One 
	of our main results is that it is hopeless to 
	find a forward analysis algorithm for general 
	timed automata, that uses such a widening 
	operator, and which is correct. This goes really 
	against what one could think. We then study in 
	detail this algorithm in the more general 
	framework of updatable timed automata, a model 
	which has been introduced as a natural syntactic 
	extension of classical timed automata. We 
	describe subclasses of this model for which a 
	correct widening operator can be found. }
}
@inproceedings{bst-monterey,
  address = {Venice, Italy},
  year = 2004,
  volume = 2941,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Wirsing, Martin and Knapp, Alexander and
            Balsamo, Simonetta},
  acronym = {{RISSEF}'02},
  booktitle = {{R}evised {P}apers of the 9th {I}nternational
               {W}orkshop on {R}adical {I}nnovations of {S}oftware
               and {S}ystems {E}ngineering in the {F}uture
               ({RISSEF}'02)},
  author = {Bidoit, Michel and Sannella, Donald and 
                 Tarlecki, Andrzej},
  title = {Toward Component-Oriented Formal Software 
                 Development:
                 {A}n Algebraic Approach},
  pages = {75-90},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BST-monterey.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BST-monterey.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BST-monterey.pdf}
}
@inproceedings{comon04fossacs,
  address = {Barcelona, Spain},
  month = mar,
  year = 2004,
  volume = 2987,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Walukiewicz, Igor},
  acronym = {{FoSSaCS}'04},
  booktitle = {{P}roceedings of the 7th {I}nternational 
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'04)},
  author = {Comon{-}Lundh, Hubert },
  title = {Intruder Theories (Ongoing Work)},
  pages = {1-4},
  note = {Invited talk}
}
@incollection{couvreur-chap04,
  author = {Br{\'e}ant, F. and Couvreur, Jean-Michel and 
                 Gilliers, Fr{\'e}d{\'e}ric and
                 Kordon, Fabrice and Mounier, Isabelle and 
                 Paviot{-}Adet, Emmanuel and
                 Poitrenaud, Denis and 
                 Regep, Dan M. and Sutre, Gr{\'e}goire},
  title = {Modeling and Verifying Behavioral Aspects},
  chapter = {6},
  editor = {Kordon, Fabrice and Lemoine, Michel},
  booktitle = {Formal Methods for Embedded Distributed Systems: {H}ow
                 to Master the Complexity},
  pages = {171-211},
  year = {2004},
  month = jun,
  publisher = {Kluwer Academic Publishers}
}
@inproceedings{dj-ccs-2004,
  address = {Washington, D.C., USA},
  month = oct,
  year = 2004,
  publisher = {ACM Press},
  editor = {Atluri, Vijayalakshmi and Pfitzmann, Birgit and 
                  McDaniel, Patrick},
  acronym = {{CCS}'04},
  booktitle = {{P}roceedings of the 11th {ACM} {C}onference
               on {C}omputer and {C}ommunications {S}ecurity
               ({CCS}'04)},
  author = {Delaune, St{\'e}phanie and Jacquemard, Florent},
  title = {A Decision Procedure for the Verification of Security
                 Protocols with Explicit Destructors},
  pages = {278-287},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-ccs-2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-ccs-2004.ps},
  abstract = {We present a non-deterministic polynomial 
	time procedure to decide the problem of insecurity, in the 
	presence of a bounded number of sessions, for 
	cryptographic protocols containing explicit destructor 
	symbols, like decryption and projection. These operators 
	are axiomatized by an arbitrary convergent rewrite system 
	satisfying some syntactic restrictions. This approach, 
	with parameterized semantics, allows us to weaken the 
	security hypotheses for verification, \emph{i.e.} to 
	address a larger class of attacks than for models based on 
	free algebra. Our procedure is defined by an inference 
	system based on basic narrowing techniques for deciding 
	satisfiability of combinations of first-order equations 
	and intruder deduction constraints.}
}
@inproceedings{dj-csfw2004,
  address = {Asilomar, Pacific Grove, California, USA},
  month = jun,
  year = 2004,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{CSFW}'04},
  booktitle = {{P}roceedings of the 
               17th {IEEE} {C}omputer {S}ecurity {F}oundations
               {W}orkshop ({CSFW}'04)},
  author = {Delaune, St{\'e}phanie and Jacquemard, Florent},
  title = {A Theory of Dictionary Attacks and its Complexity},
  pages = {2-15},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-csfw2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-csfw2004.ps},
  abstract = {We consider the problem of automating 
	proofs of cryptographic protocols when some data, like 
	poorly chosen passwords, can be guessed by dictionary 
	attacks. First, we define a theory of these attacks: we 
	introduce an inference system modeling the guessing 
	capabilities of an intruder. This system extends the 
	classical Dolev-Yao rules. Using proof rewriting 
	techniques, we show a locality lemma for our inference 
	system which yields the PTIME-completeness of the 
	deduction problem.\par
	This result is lifted to the simultaneous solving of 
	intruder deduction constraints with variables. 
	Constraint solving is the basis of a NP algorithm for 
	the protocol insecurity problem in the presence of 
	dictionary attacks, assuming a bounded number of 
	sessions. This extends the classical NP-completeness 
	result for the Dolev-Yao model.\par
	We illustrate the procedure with examples of published 
	protocols. The model and decision algorithm have been 
	validated on some examples in a prototype 
	implementation.}
}
@inproceedings{dk-jdir-2004,
  address = {Lannion, France},
  month = nov,
  year = 2004,
  acronym = {{JDIR}'04},
  booktitle = {{A}ctes des 6{\`e}mes {J}ourn{\'e}es {D}octorales
               {I}nformatique et {R}{\'e}seau
               ({JDIR}'04)},
  author = {Delaune, St{\'e}phanie and Klay, Francis},
  title = {V{\'e}rification automatique appliqu{\'e}e {\`a} un 
		 protocole de commerce {\'e}lectronique},
  pages = {260-269},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DK-jdir-2004.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DK-jdir-2004.pdf},
  abstract = {Le domaine de la mod{\'e}lisation et de la 
	v{\'e}rification est une activit{\'e} d{\'e}licate et importante qui a 
	connu une v{\'e}ritable explosion dans les ann{\'e}es 1990. On 
	dispose {\`a} l'entr{\'e}e des ann{\'e}es 2000 de toute une gamme de 
	mod{\`e}les et de m{\'e}thodes plus ou moins avanc{\'e}s en ce qui 
	concerne l'expressivit{\'e} et l'automatisation.\par	
	Afin de d{\'e}finir les besoins et les priorit{\'e}s {\`a} mettre sur 
	les outils consacr{\'e}s {\`a} la v{\'e}rification de protocoles 
	cryptographiques qui seront d{\'e}velopp{\'e}s au sein du projet 
	RNTL PROUV{\'E}, nous proposons de travailler en situation 
	r{\'e}elle, sur des protocoles plut{\^o}t <<~durs~>>, en effectuant le 
	cycle suivant~: mod{\'e}lisation, formalisation puis validation 
	dans des outils existants. Ce travail est effectu{\'e} ici pour 
	un protocole de porte-monnaie {\'e}lectronique, d{\'e}velopp{\'e} 
	r{\'e}cemment par une {\'e}quipe de France T{\'e}l{\'e}com. }
}
@misc{dn-fms04,
  author = {Nowak, David},
  title = {Logical Relations for Monadic Types},
  year = 2004,
  month = may,
  howpublished = {Invited talk, {I}nternational
           {W}orkshop on {F}ormal {M}ethods
           and {S}ecurity ({IWFMS}'04), Nanjing, China}
}
@misc{evtgen-v1.0,
  author = {Olivain, Julien},
  title = {{EVTGEN} v1.0: {A} Programmable Generic Generator of
                 Event Sequences},
  year = {2004},
  month = jul,
  note = {Written in C (about 5000 lines)},
  note-fr = {{\'E}crit en~C (environ 5000 lignes)},
  url = {http://www.lsv.ens-cachan.fr/~olivain/evtgen/}
}
@misc{netentropy-v1.0,
  author = {Olivain, Julien},
  title = {Net-entropy v1.0: {A}n entropy checker for
	  	 ciphered network connections},
  year = {2004},
  month = sep,
  url = {http://www.lsv.ens-cachan.fr/~olivain/net-entropy/}
}
@inproceedings{GaLeZe04fsttcs,
  address = {Chennai, India},
  month = dec,
  year = 2004,
  volume = 3328,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Lodaya, Kamal and Mahajan, Meena},
  acronym = {{FSTTCS}'04},
  booktitle = {{P}roceedings of the 24th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'04)},
  author = {Gastin, Paul and Lerman, Benjamin and Zeitoun, Marc},
  title = {Distributed games with causal memory are decidable for
            series-parallel systems},
  pages = {275-286},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLZ-fsttcs04.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLZ-fsttcs04.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLZ-fsttcs04.ps},
  abstract = {This paper deals with distributed 
	control problems by means of distributed games 
	played on Mazurkiewicz traces. The main difference 
	with other notions of distributed games recently 
	introduced is that, instead of having a \emph{local} view, 
	strategies and controllers are able to use a more 
	accurate memory, based on their \emph{causal} view. Our 
	main result states that using the causal view makes 
	the control synthesis problem decidable for 
	series-parallel systems for \emph{all} recognizable winning 
	conditions on finite behaviors, while this problem 
	with local view was proved undecidable even for 
	reachability conditions.}
}
@phdthesis{jmc-hab-04,
  author = {Couvreur, Jean-Michel},
  title = {Contribution {\`a} l'algorithmique de la v{\'e}rification},
  year = {2004},
  month = jul,
  type = {M{\'e}moire d'habilitation},
  school = {Universit{\'e} de Bordeaux~I, Bordeaux, France},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jmc-habile.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jmc-habile.pdf}
}
@article{mar-ACTA2004,
  publisher = {Springer},
  journal = {Acta Informatica},
  author = {Markey, Nicolas},
  title = {Past is for Free: {O}n the Complexity of Verifying
                 Linear Temporal Properties with Past},
  volume = {40},
  number = {6-7},
  pages = {431-458},
  year = {2004},
  month = may,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-ACTA2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Mar-ACTA2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-ACTA2004.pdf},
  doi = {10.1007/s00236-003-0136-5},
  abstract = {We study the complexity of satisfiability 
	and model checking problems for fragments of 
	linear-time temporal logic with past (PLTL). 
	We consider many fragments of PLTL, obtained by restricting 
	the set of allowed temporal modalities, the use of negations or the
	nesting of future formulas into past formulas. Our results strengthen
	the widely accepted fact that {"}past is for free{"}, in the sense that 
	allowing symmetric past-time modalities does not bring additional 
	theoretical complexity. This result holds even for small fragments and
	even when nesting future formulas into past formulas.}
}
@inproceedings{mj-wmc2004,
  address = {Milano, Italy},
  month = jun,
  year = 2004,
  editor = {Paun, {\relax Gh}eorghe},
  acronym = {{WMC}'04},
  booktitle = {{P}roceedings of the 5th {W}orkshop
               on {M}embrane {C}omputing
               ({WMC}'04)},
  author = {Michel, Olivier and Jacquemard, Florent},
  title = {An Analysis of the {N}eedham-{S}chroeder Public-Key
                 Protocol with~{MGS}},
  pages = {295-315},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mj-wmc05.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mj-wmc05.pdf},
  phsnote = {est prevu un lncs avec certains papiers revises},
  nmnote = {C'est LNCS3365, mais le papier n'est pas selectionne}
}
@article{ms-IPL2004,
  publisher = {Elsevier Science Publishers},
  journal = {Information Processing Letters},
  author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe},
  title = {A {PTIME}-Complete Matching Problem for
                 {SLP}-Compressed Words},
  volume = {90},
  number = {1},
  pages = {3-6},
  year = {2004},
  month = jan,
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MarSch-IPL2004.pdf},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MarSch-IPL2004.ps},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MarSch-IPL2004.pdf},
  doi = {10.1016/j.ipl.2004.01.002},
  abstract = {SLP-compressed words are words 
	given by simple deterministic grammars called 
	{"}straight-line programs{"}. We prove that the 
	problem of deciding whether an SLP-compressed 
	word is recognized by a FSA is complete for 
	polynomial-time.}
}
@mastersthesis{robin-dea,
  author = {Robin, Agn{\`e}s},
  title = {Aux fronti{\`e}res de la d{\'e}cidabilit{\'e}...},
  year = {2004},
  month = jul,
  type = {Rapport de {DEA}},
  school = {{DEA} Algorithmique, Paris, France},
  note = {33~pages},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Robin-dea2004.ps},
  ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Robin-dea2004.ps}
}
@misc{rtaloop,
  author = {Treinen, Ralf},
  title = {{RTALOOP}: {T}he {RTA} List of Open Problems},
  year = {2004},
  howpublished = {Web site at \url{http://www.lsv.ens-cachan.fr/rtaloop/},
                 started 1997},
  note = {Size as of July 2004: 100 problems, 90 pages, 432
                 references},
  note-fr = {En juillet~2004: 100 probl{\`e}mes, 90~pages, 432
                 r{\'e}f{\'e}rences},
  url = {http://www.lsv.ens-cachan.fr/rtaloop/}
}
@misc{ssp,
  author = {Hugel, {\relax Th}omas},
  title = {{SSP}: {S}tochastic Shortest Paths},
  year = {2004},
  month = jul,
  note = {Written in Caml (about 500 lines)},
  note-fr = {{\'E}crit en Caml (environ 500 lignes)}
}
@misc{bouyer-fac04,
  author = {Bouyer, Patricia},
  title = {Automates temporis{\'e}s, de la th{\'e}orie {\`a} l'impl{\'e}mentation},
  year = {2004},
  month = mar,
  howpublished = {Invited talk,  Journ\'ees Formalisation des Activit?s
   Concurrentes (FAC'04), Toulouse, France}
}
@misc{Demri0304,
  author = {Demri, St{\'e}phane},
  title = {Complexit{\'e} algorithmique de variantes de {LTL} pour la v{\'e}rification},
  year = {2004},
  note = {Course notes, {DEA} Algorithmique, Paris, France},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-coursLTL.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-coursLTL.pdf}
}
@comment{{B-arxiv16,
  author =		Bollig, Benedikt, 
  affiliation = 	aff-LSVmexico,
  title =    		One-Counter Automata with Counter Visibility, 
  institution = 	Computing Research Repository, 
  number =    		1602.05940, 
  month = 		feb, 
  nmonth =     		2,
  year = 		2016, 
  type = 		RR, 
  axeLSV = 		mexico,
  NOcontrat = 		"",
  
  url =			http://arxiv.org/abs/1602.05940, 
  PDF =			"http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf",
  lsvdate-new =  	20160222,
  lsvdate-upd =  	20160222,
  lsvdate-pub =  	20160222,
  lsv-category = 	"rapl",
  wwwpublic =    	"public and ccsb",
  note = 		18~pages, 

  abstract = "In a one-counter automaton (OCA), one can read a letter
    from some finite alphabet, increment and decrement the counter by
    one, or test it for zero. It is well-known that universality and
    language inclusion for OCAs are undecidable. We consider here OCAs
    with counter visibility: Whenever the automaton produces a letter,
    it outputs the current counter value along with~it. Hence, its
    language is now a set of words over an infinite alphabet. We show
    that universality and inclusion for that model are in PSPACE, thus
    no harder than the corresponding problems for finite automata, which
    can actually be considered as a special case. In fact, we show that
    OCAs with counter visibility are effectively determinizable and
    closed under all boolean operations. As~a~strict generalization, we
    subsequently extend our model by registers. The general nonemptiness
    problem being undecidable, we impose a bound on the number of
    register comparisons and show that the corresponding nonemptiness
    problem is NP-complete.",
}}

This file was generated by bibtex2html 1.98.