Publications : 2007
-
[BG07]
-
E. Bursztein and J. Goubault-Larrecq.
A Logical Framework for Evaluating Network Resilience Against
Faults and Attacks.
In Proceedings of the 12th Asian Computing Science
Conference (ASIAN'07), volume 4846 of Lecture Notes in Computer Science,
pages 212--227, Doha, Qatar, December 2007. Springer.
doi:
10.1007/978-3-540-76929-3_20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABG07]
-
S. Akshay, B. Bollig, and P. Gastin.
Automata and Logics for Timed Message Sequence Charts.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 290--302, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_24.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CS07]
-
P. Chambart and Ph. Schnoebelen.
Post Embedding Problem is not Primitive Recursive, with
Applications to Channel Systems.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 265--276, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_22.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CDD07]
-
V. Cortier, J. Delaitre, and S. Delaune.
Safely Composing Security Protocols.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 352--363, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBB+07]
-
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and
M. Größer.
Probabilistic and Topological Semantics for Timed Automata.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 179--191, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKM07]
-
B. Bollig, D. Kuske, and I. Meinecke.
Propositional Dynamic Logic for Message-Passing Systems.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 303--315, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_25.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DKR07]
-
S. Delaune, S. Kremer, and M. D. Ryan.
Symbolic Bisimulation for the Applied Pi-Calculus.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 133--145, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBS07]
-
C. Baier, N. Bertrand, and Ph. Schnoebelen.
Verifying nondeterministic probabilistic channel systems against
ω-regular linear-time properties.
ACM Transactions on Computational Logic, 9(1), December 2007.
doi:
10.1145/1297658.1297663.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Car07]
-
J.-L. Carré.
Réécriture, confluence.
Course notes, Préparation à l'agrégation, ENS Cachan,
France, December 2007.
[ BibTex ]
-
[Bur07a]
-
E. Bursztein.
NetQi v1rc1.
Available at http://www.netqi.org/, December 2007.
Written in C and Java (about 10000 lines).
[ BibTex |
Web page ]
-
[Gas07a]
-
R. Gascon.
Spécification et vérification de propriétés
quantitatives sur des automates à contraintes.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2007.
[ BibTex |
Web page |
PS |
PDF ]
-
[GPT07]
-
J. Goubault-Larrecq, C. Palamidessi, and A. Troina.
A Probabilistic Applied Pi-Calculus.
In Proceedings of the 5th Asian Symposium on Programming
Languages and Systems (APLAS'07), volume 4807 of Lecture Notes in
Computer Science, pages 175--290, Singapore, November-December 2007.
Springer.
doi:
10.1007/978-3-540-76637-7_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GK07]
-
P. Gastin and D. Kuske.
Uniform satisfiability in PSPACE for local temporal logics
over Mazurkiewicz traces.
Fundamenta Informaticae, 80(1-3):169--197, November 2007.
[ BibTex |
Web page |
PDF ]
-
[CDG+07]
-
H. Comon-Lundh, M. Dauchet, R. Gilleron, C. Löding,
F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi.
Tree Automata Techniques and Applications.
November 2007.
[ BibTex |
Web page ]
-
[Gas07b]
-
P. Gastin.
Algorithmique.
Course notes, Magistère STIC, ENS Cachan, France, November
2007.
[ BibTex ]
-
[Bur07b]
-
E. Bursztein.
Time has something to tell us about network address
translation.
In Proceedings of the 12th Nordic Workshop on Secure IT
Systems (NordSec'07), Reykjavik, Iceland, October 2007.
[ BibTex |
Web page |
PDF ]
-
[JR07]
-
F. Jacquemard and M. Rusinowitch.
Rewrite Closure of Hedge-Automata Languages.
Research Report LSV-07-31, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2007.
22 pages.
[ BibTex |
Web page |
PDF ]
-
[HIRV07]
-
P. Habermehl, R. Iosif, A. Rogalewicz, and T. Vojnar.
Proving Termination of Tree Manipulating Programs.
In Proceedings of the 5th International Symposium on
Automated Technology for Verification and Analysis (ATVA'07),
volume 4762 of Lecture Notes in Computer Science, pages 145--161, Tokyo,
Japan, October 2007. Springer.
doi:
10.1007/978-3-540-75596-8_12.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DR07]
-
S. Demri and A. Rabinovich.
The complexity of temporal logic with until and since over
ordinals.
In Proceedings of the 14th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'07),
volume 4790 of Lecture Notes in Artificial Intelligence, pages 531--545,
Yerevan, Armenia, October 2007. Springer.
doi:
10.1007/978-3-540-75560-9_38.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLL07]
-
S. Delaune, H. Lin, and Ch. Lynch.
Protocol verification via rigidashflexible resolution.
In Proceedings of the 14th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'07),
volume 4790 of Lecture Notes in Artificial Intelligence, pages 242--256,
Yerevan, Armenia, October 2007. Springer.
doi:
10.1007/978-3-540-75560-9_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD07]
-
V. Cortier and S. Delaune.
Deciding Knowledge in Security Protocols for Monoidal Equational
Theories.
In Proceedings of the 14th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'07),
volume 4790 of Lecture Notes in Artificial Intelligence, pages 196--210,
Yerevan, Armenia, October 2007. Springer.
doi:
10.1007/978-3-540-75560-9_16.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CDP07]
-
F. Chevalier, D. D'Souza, and P. Prabhakar.
Counter-free Input Determined Timed Automata.
In Proceedings of the 5th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763
of Lecture Notes in Computer Science, pages 82--97, Salzburg, Austria,
October 2007. Springer.
doi:
10.1007/978-3-540-75454-1_8.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BM07b]
-
P. Bouyer and N. Markey.
Costs are Expensive!
In Proceedings of the 5th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763
of Lecture Notes in Computer Science, pages 53--68, Salzburg, Austria,
October 2007. Springer.
doi:
10.1007/978-3-540-75454-1_6.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Laf07d]
-
P. Lafourcade.
Rapport final d'activité à 11 mois,
contrat CNRS/DGA référence : 06 60 019 00 470 75 01
<< Utilisation et exploitation des théories équationnelles dans
l'analyse des protocoles cryptographiques >>.
Contract report, DGA, October 2007.
6 pages.
[ BibTex |
Web page |
PS ]
-
[BGP07]
-
B. Bérard, P. Gastin, and A. Petit.
Timed substitutions for regular signal-event languages.
Formal Methods in System Design, 31(2):101--134, October 2007.
doi:
10.1007/s10703-007-0034-5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBBR07]
-
P. Bouyer, Th. Brihaye, V. Bruyère, and J.-F.
Raskin.
On the optimal reachability problem on weighted timed automata.
Formal Methods in System Design, 31(2):135--175, October 2007.
doi:
10.1007/s10703-007-0035-4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Pro07]
-
A. ProNoBis.
ProNoBis: Probability and Nondeterminism, Bisimulations and
Security -- Rapport Final, October 2007.
[ BibTex |
Web page |
PDF ]
-
[GL07]
-
J. Goubault-Larrecq.
Pronobis: Probability and nondeterminism, bisimulations and
security.
Rapport final ARC ProNoBis, October 2007.
[ BibTex ]
-
[Cha07]
-
P. Chambart.
Canaux fiables et non-fiables : frontières de la
décidabilité.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2007.
[ BibTex |
Web page |
PDF ]
-
[Da 07]
-
A. Da Costa.
Propriétés de jeux multi-agents.
Rapport de Master, Master de Logique Mathématique et
Fondements de l'Informatique, Paris, France, September 2007.
[ BibTex |
Web page |
PDF ]
-
[Vil07]
-
J. Villard.
Logique spatiale pour le pi-calcul appliqué.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2007.
[ BibTex |
Web page |
PDF ]
-
[Vac07]
-
C. Vacher.
Accessibilité inverse dans les automates d'arbres à
mémoire d'ordre supérieur.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2007.
[ BibTex |
Web page |
PDF ]
-
[CL07]
-
C. Cremers and P. Lafourcade.
Comparing State Spaces in Automatic Security Protocol
Verification.
In Pre-proceedings of the 7th International Workshop on
Automated Verification of Critical Systems (AVoCS'07), Oxford, UK,
September 2007.
[ BibTex |
Web page |
PDF ]
-
[AMNK07]
-
S. Akshay, M. Mukund, and K. Narayan Kumar.
Checking Coverage for Infinite Collections of Timed Scenarios.
In Proceedings of the 18th International Conference on
Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in
Computer Science, pages 181--196, Lisbon, Portugal, September 2007. Springer.
doi:
10.1007/978-3-540-74407-8_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD07]
-
M. Arnaud, V. Cortier, and S. Delaune.
Combining algorithms for deciding knowledge in security
protocols.
In Proceedings of the 6th International Symposium on
Frontiers of Combining Systems (FroCoS'07), volume 4720 of Lecture
Notes in Artificial Intelligence, pages 103--117, Liverpool, UK, September
2007. Springer.
doi:
10.1007/978-3-540-74621-8_7.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[KM07]
-
S. Kremer and L. Mazaré.
Adaptive Soundness of Static Equivalence.
In Proceedings of the 12th European Symposium on Research in
Computer Security (ESORICS'07), volume 4734 of Lecture Notes in
Computer Science, pages 610--625, Dresden, Germany, September 2007. Springer.
doi:
10.1007/978-3-540-74835-9_40.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLMO07]
-
Th. Brihaye, F. Laroussinie, N. Markey, and
G. Oreiby.
Timed Concurrent Game Structures.
In Proceedings of the 18th International Conference on
Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in
Computer Science, pages 445--459, Lisbon, Portugal, September 2007. Springer.
doi:
10.1007/978-3-540-74407-8_30.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Gou07c]
-
J. Goubault-Larrecq.
Continuous Previsions.
In Proceedings of the 16th Annual EACSL Conference on
Computer Science Logic (CSL'07), volume 4646 of Lecture Notes in
Computer Science, pages 542--557, Lausanne, Switzerland, September 2007.
Springer.
doi:
10.1007/978-3-540-74915-8_40.
[ BibTex |
DOI |
Web page |
PDF ]
-
[OBRS07]
-
A. Ourghanlian, M. Bozga, A. Roglewicz, and A. Sangnier.
Projet RNTL Averiles -- Fourniture F1.6 :
Expérimentation, September 2007.
16 pages.
[ BibTex |
Web page |
PDF ]
-
[LLV07]
-
LIAFA, LSV, and Verimag.
Projet RNTL Averiles -- Fourniture F1.4 : Prototypes
d'outil, September 2007.
3 pages.
[ BibTex |
Web page |
PDF ]
-
[LCE+07c]
-
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag.
Projet RNTL Averiles -- Fourniture F1.3 : Algorithmes de
vérification, September 2007.
19 pages.
[ BibTex |
Web page |
PDF ]
-
[LCE+07b]
-
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag.
Projet RNTL Averiles -- Fourniture F1.2 : Extraction de
modèles, September 2007.
19 pages.
[ BibTex |
Web page |
PDF ]
-
[LCE+07a]
-
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag.
Projet RNTL Averiles -- Fourniture F1.1 : Modèles,
September 2007.
6 pages.
[ BibTex |
Web page |
PDF ]
-
[LCE+07d]
-
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag.
Rapport à mi-parcours du projet RNTL Averiles (analyse
et vérification de logiciels embarqués avec structures de mémoire
dynamique, September 2007.
4 pages.
[ BibTex |
Web page |
PDF ]
-
[BHJS07]
-
A. Bouajjani, P. Habermehl, Y. Jurski, and M. Sighireanu.
Rewriting Systems with Data -- A Framework for Reasoning About
Systems with Unbounded Structures over Infinite Data Domains.
In Proceedings of the 16th International Symposium on
Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture
Notes in Computer Science, pages 1--22, Budapest, Hungary, August 2007.
Springer.
doi:
10.1007/978-3-540-74240-1_1.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BGMNK07]
-
P. Bhateja, P. Gastin, M. Mukund, and K. Narayan Kumar.
Local testing of message sequence charts is difficult.
In Proceedings of the 16th International Symposium on
Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture
Notes in Computer Science, pages 76--87, Budapest, Hungary, August 2007.
Springer.
doi:
10.1007/978-3-540-74240-1_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[L+07]
-
F. Laroussinie et al.
Projet DOTS (ANR-06-SETI-003) : Rapport à 6 mois,
August 2007.
7 pages.
[ BibTex ]
-
[GO07]
-
P. Gastin and D. Oddoux.
LTL2BA v1.1, August 2007.
Written in C++ (about 4000 lines).
[ BibTex |
Web page ]
-
[Laf07a]
-
P. Lafourcade.
Intruder Deduction for the Equational Theory of
phExclusive-or with Commutative and Distributive Encryption.
In Proceedings of the 1st International Workshop on Security
and Rewriting Techniques (SecReT'06), volume 171 of Electronic Notes in
Theoretical Computer Science, pages 37--57, Venice, Italy, July 2007.
Elsevier Science Publishers.
doi:
10.1016/j.entcs.2007.02.054.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BJ07b]
-
A. Bouhoula and F. Jacquemard.
Verifying Regular Trace Properties of Security Protocols with
Explicit Destructors and Implicit Induction.
In Proceedings of the Joint Workshop on Foundations of
Computer Security and Automated Reasoning for Security Protocol
Analysis (FCS-ARSPA'07), pages 27--44, Wroclaw, Poland, July 2007.
[ BibTex |
Web page |
PDF ]
-
[BE07]
-
C. Braunstein and E. Encrenaz.
Using CTL formulae as component abstraction in a design and
verification flow.
In Proceedings of the 7th International Conference on
Application of Concurrency to System Design (ACSD'07), pages
80--89, Bratislava, Slovak Republik, July 2007. IEEE Computer Society
Press.
doi:
10.1109/ACSD.2007.76.
[ BibTex |
DOI |
Web page |
PDF ]
-
[NT07]
-
M. Nesi and R. Treinen, editors.
Preliminary Proceedings of the 2nd International
Workshop on Security and Rewriting Techniques (SecReT'07), Paris,
France, July 2007.
[ BibTex ]
-
[GM07]
-
P. Gastin and P. Moro.
Minimal counter-example generation for SPIN.
In Proceedings of the 14th International SPIN Workshop on
Model Checking Software (SPIN'07), volume 4595 of Lecture Notes in
Computer Science, pages 24--38, Berlin, Germany, July 2007. Springer.
doi:
10.1007/978-3-540-73370-6_4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Gou07b]
-
J. Goubault-Larrecq.
Continuous Capacities on Continuous State Spaces.
In Proceedings of the 34th International Colloquium on
Automata, Languages and Programming (ICALP'07), volume 4596 of
Lecture Notes in Computer Science, pages 764--776, Wroclaw, Poland, July
2007. Springer.
doi:
10.1007/978-3-540-73420-8_66.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHPR07]
-
Th. Brihaye, Th. A. Henzinger, V. Prabhu,
and J.-F. Raskin.
Minimum-Time Reachability in Timed Games.
In Proceedings of the 34th International Colloquium on
Automata, Languages and Programming (ICALP'07), volume 4596 of
Lecture Notes in Computer Science, pages 825--837, Wroclaw, Poland, July
2007. Springer.
doi:
10.1007/978-3-540-73420-8_71.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CDS07]
-
V. Cortier, S. Delaune, and G. Steel.
A Formal Theory of Key Conjuring.
In Proceedings of the 20th IEEE Computer Security
Foundations Symposium (CSF'07), pages 79--93, Venice, Italy, July 2007.
IEEE Computer Society Press.
doi:
10.1109/CSF.2007.5.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Gou07d]
-
J. Goubault-Larrecq.
On Noetherian Spaces.
In Proceedings of the 22nd Annual IEEE Symposium on Logic
in Computer Science (LICS'07), pages 453--462, Wroclaw, Poland, July
2007. IEEE Computer Society Press.
doi:
10.1109/LICS.2007.34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMOW07]
-
P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell.
The Cost of Punctuality.
In Proceedings of the 22nd Annual IEEE Symposium on Logic
in Computer Science (LICS'07), pages 109--118, Wroclaw, Poland, July
2007. IEEE Computer Society Press.
doi:
10.1109/LICS.2007.49.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[SC07]
-
G. Steel and J. Courant.
A formal model for detecting parallel key search attacks.
In Proceedings of the 3rd Workshop on Formal and
Computational Cryptography (FCC'07), Venice, Italy, July 2007.
[ BibTex |
Web page |
PDF ]
-
[Sch07]
-
Ph. Schnoebelen.
Model Checking Branching-Time Logics.
In Proceedings of the 14th International Symposium on
Temporal Representation and Reasoning (TIME'07), page 5, Alicante,
Spain, June 2007. IEEE Computer Society Press.
doi:
10.1109/TIME.2007.52.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BCD07b]
-
S. Bursuc, H. Comon-Lundh, and S. Delaune.
Deducibility Constraints, Equational Theory and Electronic
Money.
In Rewriting, Computation and Proof --- Essays Dedicated to
Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume
4600 of Lecture Notes in Computer Science, pages 196--212, Cachan, France,
June 2007. Springer.
doi:
10.1007/978-3-540-73147-4_10.
[ BibTex |
DOI |
Web page |
PS ]
-
[CKK07]
-
H. Comon-Lundh, C. Kirchner, and H. Kirchner, editors.
Rewriting, Computation and Proof --- Essays Dedicated to
Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of
Lecture Notes in Computer Science, Cachan, France, June 2007. Springer.
doi:
10.1007/978-3-540-73147-4.
[ BibTex |
DOI |
Web page ]
-
[Che07]
-
F. Chevalier.
Logiques pour les systèmes temporisés : contrôle et
expressivité.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2007.
[ BibTex |
Web page |
PS |
PDF ]
-
[Rey07b]
-
P.-A. Reynier.
Vérification de systèmes temporisés et
distribués : modèles, algorithmes et implémentabilité.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2007.
[ BibTex |
Web page |
PS |
PDF ]
-
[Dem07]
-
S. Demri.
Logiques pour la spécification et vérification.
Mémoire d'habilitation, Université Paris 7, Paris, France,
June 2007.
[ BibTex |
Web page |
PDF ]
-
[Enc07]
-
E. Encrenaz-Tiphène.
Contributions pour la conception et la vérification de
systèmes matériels embarqués.
Mémoire d'habilitation, Université Paris 6, Paris, France,
June 2007.
[ BibTex |
Web page |
PDF ]
-
[Boz07]
-
L. Bozzelli.
Complexity results on branching-time pushdown model checking.
Theoretical Computer Science, 379(1-2):286--297, June 2007.
doi:
10.1016/j.tcs.2007.03.049.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DG07a]
-
S. Demri and R. Gascon.
The Effects of Bounding Syntactic Resources on Presburger
LTL (Extended Abstract).
In Proceedings of the 14th International Symposium on
Temporal Representation and Reasoning (TIME'07), pages 94--104,
Alicante, Spain, June 2007. IEEE Computer Society Press.
doi:
10.1109/TIME.2007.63.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDL07b]
-
R. Brochenin, S. Demri, and É. Lozes.
Reasoning about sequences of memory states.
In Proceedings of the Symposium on Logical Foundations of
Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer
Science, pages 100--114, New York, New York, USA, June 2007. Springer.
doi:
10.1007/978-3-540-72734-7_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS07]
-
F. Laroussinie and J. Sproston.
State Explosion in Almost-Sure Probabilistic Reachability.
Information Processing Letters, 102(6):236--241, June 2007.
doi:
10.1016/j.ipl.2007.01.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BM07a]
-
B. Bollig and I. Meinecke.
Weighted Distributed Systems and Their Logics.
In Proceedings of the Symposium on Logical Foundations of
Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer
Science, pages 54--68, New York, New York, USA, June 2007. Springer.
doi:
10.1007/978-3-540-72734-7_5.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DDG07]
-
S. Demri, D. D'Souza, and R. Gascon.
Decidable Temporal Logic with Repeating Values.
In Proceedings of the Symposium on Logical Foundations of
Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer
Science, pages 180--194, New York, New York, USA, June 2007. Springer.
doi:
10.1007/978-3-540-72734-7_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBC07]
-
P. Bouyer, Th. Brihaye, and F. Chevalier.
Weighted O-Minimal Hybrid Systems are more Decidable than
Weighted Timed Automata!
In Proceedings of the Symposium on Logical Foundations of
Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer
Science, pages 69--83, New York, New York, USA, June 2007. Springer.
doi:
10.1007/978-3-540-72734-7_6.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[VG07]
-
K. N. Verma and J. Goubault-Larrecq.
Alternating Two-Way AC-Tree Automata.
Information and Computation, 205(6):817--869, June 2007.
doi:
10.1016/j.ic.2006.12.006.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DG07b]
-
M. Droste and P. Gastin.
Weighted automata and weighted logics.
Theoretical Computer Science, 380(1-2):69--86, June 2007.
doi:
10.1016/j.tcs.2007.02.055.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DK07]
-
S. Delaune and F. Klay.
Synthèse des expérimentations.
Technical Report 10, projet RNTL PROUVÉ, May 2007.
10 pages.
[ BibTex |
Web page |
PDF ]
-
[CDFP07]
-
N. Chamseddine, M. Duflot, L. Fribourg, and C. Picaronny.
Determinate Probabilistic Timed Automata as Markov Chains with
Parametric Costs.
Research Report LSV-07-21, Laboratoire Spécification et
Vérification, ENS Cachan, France, May 2007.
17 pages.
[ BibTex |
Web page |
PDF ]
-
[Bre07]
-
R. Bresciani.
The ZRTP Protocol --- Security Considerations.
Research Report LSV-07-20, Laboratoire Spécification et
Vérification, ENS Cachan, France, May 2007.
23 pages.
[ BibTex |
Web page |
PS |
PDF ]
-
[Gas07c]
-
P. Gastin.
Langages formels.
Course notes, Magistère STIC, ENS Cachan, France, May 2007.
[ BibTex ]
-
[Laf07c]
-
P. Lafourcade.
Rapport d'activités à 6 mois, contrat CNRS/DGA
référence : 06 60 019 00 470 75 01 << Utilisation et exploitation
des théories équationnelles dans l'analyse des protocoles
cryptographiques >>.
Contract report, DGA, April 2007.
5 pages.
[ BibTex |
Web page |
PS ]
-
[LLT07]
-
P. Lafourcade, D. Lugiez, and R. Treinen.
Intruder Deduction for the Equational Theory of Abelian Groups
with Distributive Encryption.
Information and Computation, 205(4):581--623, April 2007.
doi:
10.1016/j.ic.2006.10.008.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BDL07a]
-
R. Brochenin, S. Demri, and É. Lozes.
Reasoning about Sequences of Memory States.
In Proceedings of the 1st Workshop on Heap Analysis and
Verification (HAV'07), Braga, Portugal, March 2007.
[ BibTex |
Web page |
PDF ]
-
[Maz07]
-
L. Mazaré.
Computationally Sound Analysis of Protocols using Bilinear
Pairings.
In Preliminary Proceedings of the 7th International Workshop
on Issues in the Theory of Security (WITS'07), pages 6--21, Braga,
Portugal, March 2007.
[ BibTex |
Web page |
PDF ]
-
[BK07]
-
B. Bollig and D. Kuske.
Muller Message-Passing Automata and Logics.
In Preliminary Proceedings of the 1st International
Conference on Language and Automata Theory and Applications
(LATA'07), Tarragona, Spain, March-April 2007.
[ BibTex |
Web page |
PS |
PDF ]
-
[JLS07]
-
M. Jurdziński, F. Laroussinie, and J. Sproston.
Model Checking Probabilistic Timed Automata with One or Two
Clocks.
In Proceedings of the 13th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'07),
volume 4424 of Lecture Notes in Computer Science, pages 170--184, Braga,
Portugal, March 2007. Springer.
doi:
10.1007/978-3-540-71209-1_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDSS07]
-
D. D'Aprile, S. Donatelli, A. Sangnier, and J. Sproston.
From Time Petri Nets to Timed Automata: An Untimed Approach.
In Proceedings of the 13th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'07),
volume 4424 of Lecture Notes in Computer Science, pages 216--230, Braga,
Portugal, March 2007. Springer.
doi:
10.1007/978-3-540-71209-1_18.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BKKL07]
-
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker.
Replaying Play in and Play out: Synthesis of Design Models from
Scenarios by Learning.
In Proceedings of the 13th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'07),
volume 4424 of Lecture Notes in Computer Science, pages 435--450, Braga,
Portugal, March 2007. Springer.
doi:
10.1007/978-3-540-71209-1_33.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CJP07]
-
H. Comon-Lundh, F. Jacquemard, and N. Perrin.
Tree Automata with Memory, Visibility and Structural
Constraints.
In Proceedings of the 10th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages
168--182, Braga, Portugal, March 2007. Springer.
doi:
10.1007/978-3-540-71389-0_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LMO07]
-
F. Laroussinie, N. Markey, and G. Oreiby.
On the Expressiveness and Complexity of ATL.
In Proceedings of the 10th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages
243--257, Braga, Portugal, March 2007. Springer.
doi:
10.1007/978-3-540-71389-0_18.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BLM07]
-
P. Bouyer, K. G. Larsen, and N. Markey.
Model-Checking One-Clock Priced Timed Automata.
In Proceedings of the 10th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages
108--122, Braga, Portugal, March 2007. Springer.
doi:
10.1007/978-3-540-71389-0_9.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DD07]
-
S. Demri and D. D'Souza.
An automata-theoretic approach to constraint LTL.
Information and Computation, 205(3):380--415, March 2007.
doi:
10.1016/j.ic.2006.09.006.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BJ07a]
-
A. Bouhoula and F. Jacquemard.
Tree Automata, Implicit Induction and Explicit Destructors for
Security Protocol Verification.
Research Report LSV-07-10, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2007.
21 pages.
[ BibTex |
Web page |
PDF ]
-
[KL07]
-
B. Ksieżopolski and P. Lafourcade.
Attack and Revison of an Electronic Auction Protocol
using OFMC.
Technical Report 549, Department of Computer Science, ETH Zurich,
Switzerland, February 2007.
13 pages.
[ BibTex |
Web page |
PDF ]
-
[DN07]
-
S. Demri and D. Nowak.
Reasoning about transfinite sequences.
International Journal of Foundations of Computer Science,
18(1):87--112, February 2007.
doi:
10.1142/S0129054107004589.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BCD07a]
-
S. Bursuc, H. Comon-Lundh, and S. Delaune.
Associative-Commutative Deducibility Constraints.
In Proceedings of the 24th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'07), volume 4393 of Lecture Notes
in Computer Science, pages 634--645, Aachen, Germany, February 2007.
Springer.
doi:
10.1007/978-3-540-70918-3_54.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Laf07b]
-
P. Lafourcade.
Rapport d'activités à 3 mois, contrat CNRS/DGA
référence : 06 60 019 00 470 75 01 << Utilisation et exploitation
des théories équationnelles dans l'analyse des protocoles
cryptographiques >>.
Contract report, DGA, January 2007.
3 pages.
[ BibTex |
Web page |
PS ]
-
[Gou07a]
-
J. Goubault-Larrecq.
Believe It Or Not, GOI is a Model of Classical Linear Logic.
Research Report LSV-07-03, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2007.
18 pages.
[ BibTex |
Web page |
PDF ]
-
[DO07]
-
S. Demri and E. Orlowska.
Relative Nondeterministic Information Logic is
EXPTIME-complete.
Fundamenta Informaticae, 75(1-4):163--178, 2007.
[ BibTex |
Web page |
PDF ]
-
[Rey07a]
-
P.-A. Reynier.
Diagonal constraints handled efficiently in UPPAAL.
Research Report LSV-07-02, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2007.
4 pages.
[ BibTex |
Web page |
PS |
PDF ]
-
[Bau07]
-
M. Baudet.
Sécurité des protocoles cryptographiques : aspects
logiques et calculatoires.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2007.
[ BibTex |
Web page |
PS |
PDF ]
-
[DLN07]
-
S. Demri, R. Lazić, and D. Nowak.
On the freeze quantifier in constraint LTL: Decidability and
complexity.
Information and Computation, 205(1):2--24, January 2007.
doi:
10.1016/j.ic.2006.08.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Com07]
-
H. Comon-Lundh.
Soundness of abstract cryptography, 2007.
Course notes (part 1), Symposium on Cryptography and Information
Security (SCIS2008), Tokai, Japan.
[ BibTex |
Web page |
PDF ]
This file was generated by
bibtex2html 1.98.