@inproceedings{ABGR-datalog10, address = {Oxford, UK}, month = mar, year = 2011, volume = 6702, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {de Moor, Oege and Gottlob, Georg and Furche, Tim and Sellers, Andrew Jon}, acronym = {{D}atalog'10}, booktitle = {{R}evised {S}elected {P}apers of the 1st {I}nternational {W}orkshop {D}atalog {R}eloaded ({D}atalog'10)}, author = {Abiteboul, Serge and Bienvenu, Meghyn and Galland, Alban and Rousset, Marie-{\relax Ch}ristine}, title = {Distributed {D}atalog Revisited}, pages = {252-261}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGR-datalog10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGR-datalog10.pdf}, doi = {10.1007/978-3-642-24206-9_15} }
@article{bbdfh-pe10, publisher = {Elsevier Science Publishers}, journal = {Performance Evaluation}, author = {Baarir, Souheib and Beccuti, Marco and Dutheillet, Claude and Franceschinis, Giuliana and Haddad, Serge}, title = {Lumping partially symmetrical stochastic models}, volume = 76, nunmber = 1, month = jan, pages = {21-44}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bbdfh-pe10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bbdfh-pe10.pdf}, doi = {10.1016/j.peva.2010.09.002}, abstract = {The performance and dependability evaluation of complex systems by means of dynamic stochastic models (e.g. Markov chains) may be impaired by the combinatorial explosion of their state space. Among the possible methods to cope with this problem, symmetry-based ones can be applied to systems including several similar components. Often however these systems are only partially symmetric: their behavior is in general symmetric except for some local situation when the similar components need to be differentiated.\par In this paper two methods to efficiently analyze partially symmetrical models are presented in a general setting and the requirements for their efficient implementation are discussed. Some case studies are presented to show the methods' effectiveness and their applicative interest.} }
@article{JKV-icomp10, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Jacquemard, Florent and Klay, Francis and Vacher, Camille}, title = {Rigid Tree Automata}, volume = {209}, number = 3, pages = {486-512}, year = 2011, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-icomp11.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-icomp11.pdf}, doi = {10.1016/j.ic.2010.11.015}, abstract = {We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a restriction on the computation of RTA on trees: RTA can test for equality in subtrees reaching the same rigid state. RTA are able to perform local and global tests of equality between subtrees, non-linear tree pattern matching, and restricted disequality tests as well. Properties like determinism, pumping lemma, boolean closure, and several decision problems are studied in detail. In particular, the emptiness problem is shown decidable in linear time for RTA whereas membership of a given tree to the language of a given RTA is NP-complete. Our main result is the decidability of whether a given tree belongs to the rewrite closure of a RTA language under a restricted family of term rewriting systems, whereas this closure is not a RTA language. This result, one of the first on rewrite closure of languages of tree automata with constraints, is enabling the extension of model checking procedures based on finite tree automata techniques. Finally, a comparison of RTA with several classes of tree automata with local and global equality tests, and with dag automata is also provided.} }
@article{AFFM-rsl10, publisher = {Cambridge University Press}, journal = {Review of Symbolic Logic}, author = {Areces, Carlos and Figueira, Diego and Figueira, Santiago and Mera, Sergio}, title = {The Expressive Power of Memory Logics}, year = {2011}, month = jun, volume = 4, number = 2, pages = {290 - 318 }, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFFM-rsl10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFFM-rsl10.pdf}, doi = {10.1017/S1755020310000389}, abstract = {We investigate the expressive power of \emph{memory logics}. These are modal logics extended with the possibility to store (or remove) the current node of evaluation in (or from) a \emph{memory}, and to perform membership tests on the current memory. From this perspective, the hybrid logic \(\mathcal{HL}(\downarrow)\), for example, can be thought of as a particular case of a memory logic where the memory is an indexed list of elements of the domain.\par This work focuses in the case where the memory is a set, and we can test whether the current node belongs to the set or not. We prove that, in terms of expressive power, the memory logics we discuss here lie between the basic modal logic \(\mathcal{K}\) and \(\mathcal{HL}(\downarrow)\). We show that the satisfiability problem of most of the logics we cover is undecidable. The only logic with a decidable satisfiability problem is obtained by imposing strong constraints on which elements can be memorized.} }
@inproceedings{CSV-vmcai11, address = {Austin, Texas, USA}, month = jan, year = 2011, volume = 6538, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jhala, Ranjit and Schmidt, David}, acronym = {{VMCAI}'11}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'11)}, author = {Chadha, Rohit and Sistla, A. Prasad and Viswanathan, Mahesh}, title = {Probabilistic {B}{\"u}chi automata with non-extremal acceptance thresholds}, pages = {103-117}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-vmcai11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-vmcai11.pdf}, doi = {10.1007/978-3-642-18275-4_9}, abstract = {This paper investigates the power of Probabilistic B{\"u}chi Automata~(PBA) when the threshold probability of acceptance is non-extremal, i.e., is a value strictly between 0 and 1. Many practical randomized algorithms are designed to work under non-extremal threshold probabilities and thus it is important to study power of PBAs for such cases.\par The paper presents a number of surprising expressiveness and decidability results for PBAs when the threshold probability is non-extremal. Some of these results sharply contrast with the results for extremal threshold probabilities. The paper also presents results for Hierarchical PBAs and for an interesting subclass of them called simple PBAs.} }
@incollection{DR-lgtcs10, month = jan, year = 2011, publisher = {Cambridge University Press}, booktitle = {Lectures in Game Theory for Computer Scientists}, editor = {Apt, Krzysztof R. and Gr{\"a}del, Erich}, author = {Doyen, Laurent and Raskin, Jean-Fran{\c{c}}ois}, title = {Games with Imperfect Information: Theory and Algorithms}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-lgtcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-lgtcs10.pdf}, ps = {DR-lgtcs10.ps} }
@article{GLK-mscs10, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean and Keimel, Klaus}, title = {{C}hoquet-{K}endall-{M}atheron Theorems for Non-{H}ausdorff Spaces}, volume = 21, number = 3, pages = {511-561}, month = jun, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf}, doi = {10.1017/S0960129510000617}, abstract = {We establish Choquet-Kendall-Matheron theorems on non-Hausdorff topological spaces. This typical result of random set theory is profitably recast in purely topological terms, using intuitions and tools from domain theory. We obtain three variants of the theorem, each one characterizing distributions, in the form of continuous valuations, over relevant powerdomains of demonic, resp. angelic, resp. erratic non-determinism.} }
@article{BCL-jlli10, publisher = {Kluwer Academic Publishers}, journal = {Journal of Logic, Language and Information}, author = {Bouyer, Patricia and Cassez, Franck and Laroussinie, Fran{\c{c}}ois}, title = {Timed Modal Logics for Real-Time Systems: Specification, Verification and Control}, volume = 20, number = 2, pages = {169-203}, year = 2011, month = apr, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCL-jlli10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCL-jlli10.pdf}, doi = {10.1007/s10849-010-9127-4}, abstract = {In this paper, a timed modal logic~\(L_{c}\) is presented for the specification and verification of real-time systems. Several important results for~\(L_{c}\) are discussed. First we address the model checking problem and we show that it is an EXPTIME-complete problem. Secondly we consider expressiveness and we explain how to express strong timed bisimilarity and how to build characteristic formulas for timed automata. We also propose a compositional algorithm for~\(L_{c}\) model checking. Finally we consider several control problems for which \(L_{c}\) can be used to check controllability.} }
@article{AGM-jcss11, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Abiteboul, Serge and Gottlob, Georg and Manna, Marco}, title = {Distributed {XML} design}, volume = 77, number = 6, pages = {936-964}, month = nov, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGM-jcss11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGM-jcss11.pdf}, doi = {10.1016/j.jcss.2011.02.003}, abstract = {A distributed XML document is an XML document that spans several machines. We assume that a distribution design of the document tree is given, consisting of an \emph{XML kernel-document} \(T_{[\mathbf{f}_{1},...,\mathbf{f}_{n}]}\) where some leaves are {"}docking points{"} for external resources providing XML subtrees (\(\mathbf{f}_{1},...,\mathbf{f}_{n}\) standing, e.g., for Web services or peers at remote locations). The top-down design problem consists in, given a \emph{type} (a~schema document that may vary from a DTD to a tree automaton) for the distributed document, {"}propagating{"} locally this type into a collection of types, that we call \emph{typing}, while preserving desirable properties. We also consider the bottom-up design which consists in, given a type for each external resource, exhibiting a global type that is enforced by the local types, again with natural desirable properties. In the article, we lay out the fundamentals of a theory of distributed XML design, analyze problems concerning typing issues in this setting, and study their complexity.} }
@article{ACKNS-tods11, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Abiteboul, Serge and Chan, T.-H. Hubert and Kharlamov, Evgeny and Nutt, Werner and Senellart, Pierre}, title = {Capturing continuous data and answering aggregate queries in probabilistic~{XML}}, volume = {36}, number = {4:25}, month = dec, year = 2011, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACKNS-tods11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACKNS-tods11.pdf}, doi = {10.1145/2043652.2043658}, abstract = {Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database models have been proposed, both in the relational and in the semi-structured setting. The latter is particularly well adapted to the management of uncertain data coming from a variety of automatic processes. An important problem, in the context of probabilistic XML databases, is that of answering aggregate queries (count, sum, avg, etc.), which has received limited attention so~far. In a model unifying the various (discrete) semi-structured probabilistic models studied up to now, we present algorithms to compute the distribution of the aggregation values (exploiting some regularity properties of the aggregate functions) and probabilistic moments (especially expectation and variance) of this distribution. We also prove the intractability of some of these problems and investigate approximation techniques. We finally extend the discrete model to a continuous one, in order to take into account continuous data values, such as measurements from sensor networks, and extend our algorithms and complexity results to the continuous case.} }
@inproceedings{SGA-iswc11, address = {Bonn, Germany}, month = oct, year = 2011, volume = 7031, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aroyo, Lora and Welty, Chris and Alani, Harith and Taylor, Jamie and Bernstein, Abraham and Kagal, Lalana and Fridman{ }Noy,Natasha and Blomqvist, Eva}, acronym = {{ISWC}'11}, booktitle = {{P}roceedings of the 10th {I}nternational {S}emantic {W}eb {C}onference ({ISWC}'11)}, author = {Suchanek, Fabian M. and Gross{-}Amblard, David and Abiteboul, Serge}, title = {Watermarking for Ontologies}, pages = {697-713}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SGA-iswc11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SGA-iswc11.pdf}, doi = {10.1007/978-3-642-25073-6_44}, abstract = {In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.} }
@inproceedings{AGP-webdb11, address = {Athens, Greece}, month = jun, year = 2011, editor = {Marian, Am{\'e}lie and Vassalos, Vasilis}, acronym = {({W}eb{DB}'11)}, booktitle = {{P}roceedings of the 14th {I}nternational {W}orkshop on the {W}eb and {D}atabases ({W}eb{DB}'11)}, author = {Abiteboul, Serge and Galland, Alban and Polyzotis, Neoklis}, title = {Web information management with access control}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGP-webdb11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGP-webdb11.pdf}, abstract = {We investigate the problem of sharing private information on the Web, where the information is hosted on different machines that may use different access control and distribution schemes. We introduce a distributed knowledge-base model, termed WebdamExchange, that comprises logical statements for specifying data, access control, distribution and knowledge about other peers. The statements can be communicated, replicated, queried, and updated, while keeping track of time and provenance. This unified base allows applications to reason declaratively about what data is accessible, where it resides, and how to retrieve it securely.} }
@inproceedings{ABKT-icde11, editor = {Abiteboul, Serge and B{\"o}hm, Klemens and Koch, Christoph and Tan, Kian-Lee}, author = {Abiteboul, Serge and B{\"o}hm, Klemens and Koch, Christoph and Tan, Kian-Lee}, title = {{P}roceedings of the 27th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'11)}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'11)}, year = 2011, month = apr, publisher = {{IEEE} Computer Society Press}, address = {Hannover, Germany}, doi = {10.1109/ICDE.2011.5767975}, url = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?punumber=5765035} }
@inproceedings{ACK-icdt11, address = {Uppsala, Sweden}, month = mar, year = 2011, publisher = {ACM Press}, editor = {Milo, Tova}, acronym = {{ICDT}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'11)}, author = {Abiteboul, Serge and ten~Cate, Balder and Katsis, Yannis}, title = {On the equivalence of distributed systems with queries and communication}, pages = {126-137}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACK-icdt11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACK-icdt11.pdf}, doi = {10.1145/1938551.1938570}, abstract = {Distributed data management systems consist of peers that store, exchange and process data in order to collaboratively achieve a common goal, such as evaluate some query. We study the equivalence of such systems. We model a distributed system by a collection of Active XML documents, i.e., trees augmented with function calls for performing tasks such as sending, receiving and querying data. As our model is quite general, the equivalence problem turns out to be undecidable. However, we exhibit several restrictions of the model, for which equivalence can be effectively decided. We also study the computational complexity of the equivalence problem, and present an axiomatization of equivalence, in the form of a set of equivalence-preserving rewrite rules allowing us to optimize a system by rewriting it into an equivalent, but possibly more efficient system.} }
@inproceedings{ABV-icdt11, address = {Uppsala, Sweden}, month = mar, year = 2011, publisher = {ACM Press}, editor = {Milo, Tova}, acronym = {{ICDT}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'11)}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Comparing workflow specification languages: a~matter of views}, pages = {78-89}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt11.pdf}, doi = {10.1145/1938551.1938564}, abstract = {We address the problem of comparing the expressiveness of workflow specification formalisms using a notion of view of a workflow. Views allow to compare widely different workflow systems by mapping them to a common representation capturing the observables relevant to the comparison. Using this framework, we compare the expressiveness of several workflow specification mechanisms, including automata, temporal constraints, and pre-and-post conditions, with XML and relational databases as underlying data models. One surprising result shows the considerable power of static constraints to simulate apparently much richer workflow control mechanisms.} }
@inproceedings{DMS-iwigp11, address = {Saarbr{\"u}cken, Germany}, month = mar, year = 2011, volume = 50, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Reich, Johannes and Finkbeiner, Bernd}, acronym = {{iWIGP}'11}, booktitle = {{P}roceedings of the {I}nternational {W}orkshop on {I}nteractions, {G}ames and {P}rotocols ({iWIGP}'11)}, author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa}, title = {Synchronizing Objectives for {M}arkov Decision Processes}, pages = {61-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-iwigp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-iwigp11.pdf} }
@inproceedings{CD-memics11, address = {Lednice, Czech Republic }, month = oct, year = 2011, volume = 7119, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bouda, Jan and {\v{C}}ern{\'a}, Ivana and Sekanina, Luk{\'a}{\v{s}} and Vojnar, Tom{\'a}{\v{s}}}, acronym = {{MEMICS}'11}, booktitle = {{P}roceedings of the 7th {A}nnual {D}octoral {W}orkshop on {M}athematical and {E}ngineering {M}ethods in {C}omputer {S}cience ({MEMICS}'11)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Games and Markov Decision Processes with Mean-payoff Parity and Energy Parity Objectives}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-memics11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-memics11.pdf}, abstract = {The analysis of games and probabilistic systems with quantitative objectives (such as mean-payoff and energy objectives) and \(\omega\)-regular objectives (such as parity objectives) provide the mathematical foundation for performance analysis and verification of various classes of systems. In this talk, we will present a survey of both classical results and recent results about mean-payoff, energy, and parity objectives. We will discuss about how to solve their combinations, their inter-relationship, and mention interesting open problems.} }
@inproceedings{BBDDR-atva11, address = {Taipei, Taiwan}, month = oct, year = {2011}, volume = 6996, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bultan, Tevfik and Hsiung, Pao-Ann}, acronym = {{ATVA}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'11)}, author = {Brihaye, {\relax Th}omas and Bruy{\`e}re, V{\'e}ronique and Doyen, Laurent and Ducobu, Marc and Raskin, Jean-Fran{\c{c}}ois}, title = {Antichain-based {QBF} Solving}, pages = {183-197}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBDDR-atva11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBDDR-atva11.pdf}, doi = {10.1007/978-3-642-24372-1_14} }
@article{BCDGR-fmsd2011, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Brim, Lubos and Chaloupka, Jakub and Doyen, Laurent and Gentilini, Raffaella and Raskin, Jean-Fran{\c{c}}ois}, title = {Faster algorithms for mean-payoff games}, year = {2011}, month = apr, volume = {38}, number = {2}, pages = {97-118}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCDGR-fmsd2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCDGR-fmsd2011.pdf}, doi = {10.1007/s10703-010-0105-x} }
@misc{JGL-tacl11, author = {Jean Goubault{-}Larrecq}, title = {A Few Pearls in the Theory of Quasi-Metric Spaces}, year = {2011}, month = jul, howpublished = {Invited talk, Fifth International Conference on Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July~2011} }
@article{BDMSS-tocl11, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Boja{\'n}czyk, Miko{\l}aj and David, Claire and Muscholl, Anca and Schwentick, {\relax Th}omas and Segoufin, Luc}, title = {Two-variable logic on data words}, volume = 12, number = {4:27}, nopages = {}, year = 2011, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDMSS-tocl11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDMSS-tocl11.pdf}, doi = {10.1145/1970398.1970403} }
@article{KS-lmcs11, journal = {Logical Methods in Computer Science}, author = {Kazana, Wojciech and Segoufin, Luc}, title = {First-order query evaluation on structures of bounded degree}, volume = 7, number = {2:20}, year = 2011, month = jun, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-lmcs11.pdf}, doi = {10.2168/LMCS-7(2:20)2011} }
@article{PS-lmcs11, journal = {Logical Methods in Computer Science}, author = {Place, {\relax Th}omas and Segoufin, Luc}, title = {A decidable characterization of locally testable tree languages}, volume = 7, number = {4:03}, year = 2011, month = nov, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lmcs11.pdf}, doi = {10.2168/LMCS-7(4:3)2011} }
@inproceedings{AGLMP-icde11, address = {Hannover, Germany}, month = apr, year = 2011, publisher = {{IEEE} Computer Society Press}, editor = {Abiteboul, Serge and B{\"o}hm, Klemens and Koch, Christoph and Tan, Kian-Lee}, acronym = {{ICDE}'11}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'11)}, author = {Antoine, {\'E}milien and Galland, Alban and Lyngbaek, Kristian and Marian, Am{\'e}lie and Polyzotis, Neoklis}, title = {Social networking on top of the WebdamExchange system}, pages = {1300-1303}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGLMP-icde11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGLMP-icde11.pdf}, doi = {10.1109/ICDE.2011.5767939}, abstract = {The demonstration presents the WebdamExchange system, \emph{a~distributed knowledge base management system with access rights, localization and provenance}. This system is based on the exchange of logical statements that describe documents, collections, access rights, keys and localization information and updates of this data.\par We illustrate how the model can be used in a social-network context to help users keep control on their data on the web. In particular, we show how users within very different schemes of data-distribution (centralized, dht, unstructured P2P,~etc.) can still transparently collaborate while keeping a good control over their own data.} }
@inproceedings{ABGA-pods11, address = {Athens, Greece}, month = jun, year = 2011, publisher = {ACM Press}, editor = {Lenzerini, Maurizio and Schwentick, {\relax Th}omas}, acronym = {{PODS}'11}, booktitle = {{P}roceedings of the 30th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'11)}, author = {Abiteboul, Serge and Bienvenu, Meghyn and Galland, Alban and Antoine, {\'E}milien}, title = {A rule-based language for Web data management}, pages = {293-304}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGA-pods11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGA-pods11.pdf}, doi = {10.1145/1989284.1989320}, abstract = {There is a new trend to use Datalog-style rule-based languages to specify modern distributed applications, notably on the Web. We introduce here such a language for a distributed data model where peers exchange messages (i.e.,~logical facts) as well as rules. The model is formally defined and its interest for distributed data management is illustrated through a variety of examples. A~contribution of our work is a study of the impact on expressiveness of {"}delegations{"} (the installation of rules by a peer in some other peer) and explicit timestamps. We also validate the semantics of our model by showing that under certain natural conditions, our semantics converges to the same semantics as the centralized system with the same rules. Indeed, we show this is even true when updates are considered.} }
@techreport{LSV-11-24, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Modeling and Verifying Ad~Hoc Routing Protocols}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = dec, type = {Research Report}, number = {LSV-11-24}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-24.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-24.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-24-v1.pdf, 20111220}, note = {66~pages}, abstract = {Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such networks, a central issue, ensured by routing protocols, is to find a route from one device to another. Those protocols use cryptographic mechanisms in order to prevent malicious nodes from compromising the discovered route.\par Our contribution is twofold. We first propose a calculus for modeling and reasoning about security protocols, including in particular secured routing protocols. Our calculus extends standard symbolic models to take into account the characteristics of routing protocols and to model wireless communication in a more accurate way. Our second main contribution is a decision procedure for analyzing routing protocols for any network topology. By using constraint solving techniques, we show that it is possible to automatically discover (in~NPTIME) whether there exists a network topology that would allow malicious nodes to mount an attack against the protocol, for a bounded number of sessions. We also provide a decision procedure for detecting attacks in case the network topology is given a priori. We demonstrate the usage and usefulness of our approach by analyzing protocols of the literature, such as SRP applied to DSR and SDMSR.} }
@phdthesis{bourhis-phd2011, author = {Bourhis, Pierre}, title = {On the dynamics of active documents for distributed data management}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bourhis-these.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bourhis-these.pdf} }
@phdthesis{arnaud-phd2011, author = {Arnaud, Mathilde}, title = {Formal verification of secured routing protocols}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/arnaud-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/arnaud-these11.pdf} }
@phdthesis{ciobaca-phd2011, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan}, title = {Automated Verification of Security Protocols with Appplications to Electronic Voting}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ciobaca-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ciobaca-these11.pdf} }
@techreport{lsv-11-23, author = {Lozes, {\'E}tienne and Villard, Jules}, title = {Sharing Contract-Obedient Endpoints}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = dec, type = {Research Report}, number = {LSV-11-23}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-23.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-23.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-23-v1.pdf, 20111207}, note = {42~pages}, abstract = {Most of the existing verification techniques for programs based on message passing suppose either that channel endpoints are used in a linear fashion, where at most one thread can be considered as the owner of an endpoint at any given time, or that endpoints may be used arbitrarily by any number of threads. The former approach forbids the sharing of channels, while the latter limits what is provable about programs, since no constraint is put on the usage of channels. In this paper, we propose a midpoint between these techniques by extending a previously published proof system based on separation logic to allow the sharing of endpoints. We identify two independent mechanisms for supporting sharing: the standard technique based on reasoning with permissions, and a new technique based on what we call ownership on demand. We formalize these two techniques in a proof system, illustrate them on several examples, and we extend Villard's semantics and soundness proofs to support sharing.} }
@article{BCJST-ijis11, publisher = {Springer}, journal = {International Journal on Information Security}, author = {Backes, Michael and Cervesato, Iliano and Jaggard, Aaron and Scedrov, Andre and Tsay, Joe-Kai}, title = {Cryptographically sound security proofs for basic and public-key {K}erberos}, pages = {107-134}, volume = {10}, number = {2}, year = {2011}, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCJST-ijis11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCJST-ijis11.pdf}, doi = {10.1007/s10207-011-0125-6} }
@inproceedings{ILV-imacc11, address = {Oxford, UK}, month = dec, year = 2011, volume = {7089}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chen, Liqun}, acronym = {{IMACC}'11}, booktitle = {{P}roceedings of the 13th {IMA} {I}nternational {C}onference on {C}ryptography and {C}oding ({IMACC}'11)}, author = {Izabach{\`e}ne, Malika and Libert, Beno{\^\i}t and Vergnaud, Damien}, title = {Block-wise {P}-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes}, pages = {431-450}, doi = {10.1007/978-3-642-25516-8_26}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ILV-imacc11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ILV-imacc11.pdf}, abstract = {Anonymous credentials are protocols in which users obtain certificates from organizations and subsequently demonstrate their possession in such a way that transactions carried out by the same user cannot be linked. We present an anonymous credential scheme with non-interactive proofs of credential possession where credentials are associated with a number of attributes. Following recent results of Camenisch and Gro\ss{} (CCS~2008), the proof simultaneously convinces the verifier that certified attributes satisfy a certain predicate. Our construction relies on a new kind of P-signature, termed \emph{block-wise P-signature}, that allows a user to obtain a signature on a committed vector of messages and makes it possible to generate a short witness that serves as a proof that the signed vector satisfies the predicate. A~non-interactive anonymous credential is obtained by combining our \emph{block-wise} P-signature scheme with the Groth-Sahai proof system. It allows efficiently proving possession of a credential while simultaneously demonstrating that underlying attributes satisfy a predicate corresponding to the evaluation of inner products (and therefore disjunctions or polynomial evaluations). The security of our scheme is proved in the standard model under non-interactive assumptions.} }
@book{LPS-book11, author = {Luccio, Fabrizio and Pagli, Linda and Steel, Graham}, title = {Mathematical and Algorithmic Foundations of the Internet}, publisher = {CRC Press}, year = 2011, month = jul, url = {https://www.crcpress.com/9781439831380} }
@incollection{steel-crypt2011, author = {Steel, Graham}, title = {Formal Analysis of Security~{API}s}, booktitle = {Encyclopedia of Cryptography and Security}, edition = {2nd}, editor = {van Tilborg, Henk C. A. and Jajodia, Sushil}, year = {2011}, pages = {492-494}, publisher = {Springer}, doi = {10.1007/978-1-4419-5906-5_873} }
@inproceedings{JKS-frocos11, address = {Saarbr{\"u}cken, Germany}, month = oct, year = 2011, volume = 6989, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Tinelli, Cesare and Sofronie-Stokkermans, Viorica}, acronym = {{FroCoS}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {S}ymposium on {F}rontiers of {C}ombining {S}ystems ({FroCoS}'11)}, author = {Jacquemard, Florent and Kojima, Yoshiharu and Sakai, Masahiko}, title = {Controlled Term Rewriting}, pages = {179-194}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-frocos11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-frocos11.pdf}, doi = {}, abstract = {Motivated by the problem of verification of imperative tree transformation programs, we study the combination, called controlled term rewriting systems~(CTRS), of term rewriting rules with constraints selecting the possible rewrite positions. These constraints are specified, for each rewrite rule, by a selection automaton which defines a set of positions in a term based on tree automata computations.\par We show that reachability is PSPACE-complete for so-called monotonic CTRS, such that the size of every left-hand-side of every rewrite rule is larger or equal to the size of the corresponding right-hand-side, and also for the class of context-free non-collapsing CTRS, which transform CF tree language into CF tree languages.\par When allowing size-reducing rules, reachability becomes undecidable, even for flat CTRS (both sides of rewrite rules are of depth at most one) when restricting to words (i.e. function symbols have arity at most one), and for ground CTRS (rewrite rules have no variables).\par We also consider a restricted version of the control such that a position is selected if the sequence of symbols on the path from that position to the root of the tree belongs to a given regular language. This restriction enables decision results in the above cases.} }
@phdthesis{jacquemard-HDR11, author = {Jacquemard, Florent}, title = {Extended Tree Automata for the Verification of Infinite State Systems}, year = 2011, month = nov, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-fj11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-fj11.pdf} }
@article{CSV-lmcs11, journal = {Logical Methods in Computer Science}, author = {Chadha, Rohit and Sistla, A. Prasad and Viswanathan, Mahesh}, title = {Power of Randomization in Automata on Infinite Strings}, year = {2011}, month = sep, volume = {7}, number = {3:22}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-lmcs11.pdf}, doi = {10.2168/LMCS-7(3:22)2011}, abstract = {Probabilistic B{\"u}chi Automata~(PBA) are randomized, finite state automata that process input strings of infinite length. Based on the threshold chosen for the acceptance probability, different classes of languages can be defined. In this paper, we present a number of results that clarify the power of such machines and properties of the languages they define. The broad themes we focus on are as follows. We present results on the decidability and precise complexity of the emptiness, universality and language containment problems for such machines, thus answering questions central to the use of these models in formal verification. Next, we characterize the languages recognized by PBAs topologically, demonstrating that though general PBAs can recognize languages that are not regular, topologically the languages are as simple as \(\omega\)-regular languages. Finally, we introduce Hierarchical PBAs, which are syntactically restricted forms of PBAs that are tractable and capture exactly the class of \(\omega\)-regular languages.} }
@inproceedings{FRS-infinity11, address = {Taipei, Taiwan}, month = oct, year = 2011, volume = 73, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Chen, Yu-Fang and Wang, Chao}, acronym = {{INFINITY}'11}, booktitle = {{P}roceedings of the 13th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'11)}, author = {Fribourg, Laurent and Revol, Bertrand and Soulat, Romain}, title = {Synthesis of Switching Rules for Ensuring Reachability Properties of Sampled Linear Systems}, pages = {35-48}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FRS-infinity11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FRS-infinity11.pdf}, doi = {10.4204/EPTCS.73.6}, abstract = {We consider here systems with piecewise linear dynamics that are periodically sampled with a given period~\(\tau\). At each sampling time, the mode of the system, i.e., the parameters of the linear dynamics, can be switched, according to a switching rule. Such systems can be modelled as a special form of hybrid automata, called {"}switched systems{"}, that are automata with an \emph{infinite} real state space. The problem is to find a switching rule that guarantees the system to still be in a given area~\(V\) at the next sampling time, and so on indefinitely. In this paper, we will consider two approaches: the~\emph{indirect} one that abstracts the system under the form of a finite discrete event system, and the \emph{direct} one that works on the continuous state space.\par Our methods rely on previous works, but we specialize them to a simplified context (linearity, periodic switching instants, absence of control input), which is motivated by the features of a focused case study: a~DC-DC boost converter built by electronics laboratory SATIE (ENS~Cachan). Our enhanced methods allow us to treat successfully this real-life example.} }
@mastersthesis{kumardhar-master, author = {Kumar Dhar, Amit}, title = {Counter Systems with {P}resburger-definable Reachability Sets: Decidability and Complexity}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2011}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/akd11-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/akd11-m2.pdf} }
@inproceedings{BD-frocos11, address = {Saarbr{\"u}cken, Germany}, month = oct, year = 2011, volume = 6989, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Tinelli, Cesare and Sofronie-Stokkermans, Viorica}, acronym = {{FroCoS}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {S}ymposium on {F}rontiers of {C}ombining {S}ystems ({FroCoS}'11)}, author = {Bersani, Marcello and Demri, St{\'e}phane}, title = {The complexity of reversal-bounded model-checking}, pages = {71-86}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BD-frocos11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BD-frocos11.pdf}, doi = {10.1007/978-3-642-24364-6_6}, abstract = {We study model-checking problems on counter systems when guards are quantifier-free Presburger formulae, the specification languages are LTL-like dialects with arithmetical constraints and the runs are restricted to reversal-bounded ones. We introduce a generalization of reversal-boundedness and we show the NExpTime-completeness of the reversal-bounded model-checking problem as well as for related reversalbounded reachability problems. As a by-product, we show the effective Presburger definability for sets of configurations for which there is a reversal-bounded run verifying a given temporal formula. Our results generalize existing results about reversal-bounded counter automata and provides a uniform and more general framework.} }
@phdthesis{chambart-phd2011, author = {Chambart, Pierre}, title = {Du Probl{\`e}me de sous-mot de {P}ost et de la complexit{\'e} des canaux non fiables}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/chambart-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/chambart-these11.pdf} }
@phdthesis{galland-phd2011, author = {Galland, Alban}, title = {Distributed Data Management with Access Control}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/galland-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/galland-these11.pdf} }
@book{webdam2011, author = {Abiteboul, Serge and Manolescu, Ioana and Rigaux, {\relax Ph}ilippe and Rousset, Marie-{\relax Ch}ristine and Senellart, Pierre}, title = {Web Data Management}, year = 2011, publisher = {Cambridge University Press}, url = {http://webdam.inria.fr/Jorge/} }
@article{UW-lmcs11, journal = {Logical Methods in Computer Science}, author = {Ummels, Michael and Wojtczak, Dominik}, title = {The Complexity of {N}ash Equilibria in Stochastic Multiplayer Games}, year = {2011}, month = sep, volume = {7}, number = {3:20}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-lmcs11.pdf}, doi = {10.2168/LMCS-7(3:20)2011}, abstract = {We analyse the computational complexity of finding Nash equilibria in turn-based stochastic multiplayer games with omega-regular objectives. We show that restricting the search space to equilibria whose payoffs fall into a certain interval may lead to undecidability. In particular, we prove that the following problem is undecidable: Given a game~\(G\), does there exist a Nash equilibrium of~\(G\) where Player~\(0\) wins with probability~\(1\)? Moreover, this problem remains undecidable when restricted to pure strategies or (pure) strategies with finite memory. One way to obtain a decidable variant of the problem is to restrict the strategies to be positional or stationary. For the complexity of these two problems, we obtain a common lower bound of NP and upper bounds of NP and PSPACE respectively. Finally, we single out a special case of the general problem that, in many cases, admits an efficient solution. In particular, we prove that deciding the existence of an equilibrium in which each player either wins or loses with probability~\(1\) can be done in polynomial time for games where the objective of each player is given by a parity condition with a bounded number of priorities.} }
@techreport{lsv-11-20, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz and Le{\ss}enich, Simon}, title = {Imperfect Recall and Counter Games}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = oct, type = {Research Report}, number = {LSV-11-20}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-20.pdf}, note = {21~pages}, abstract = {We study a class of omega-regular games with imperfect information and imperfect recall, and present a solution method which relies on the MSO-compatibility of graph unfoldings. Furthermore, we show a reduction from a large class of counter parity games to such games with imperfect recall. By combining the two results, we obtain the first elementary algorithm for solving counter parity games, which provides substantially improved complexity bounds for several problems in computational logic.} }
@phdthesis{dacosta-phd2011, author = {Da{~}Costa, Arnaud}, title = {Propri{\'e}t{\'e}s de jeux multi-agents}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/dacosta-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/dacosta-these11.pdf} }
@mastersthesis{pasaila-master, author = {Pasail{\u{a}}, Daniel}, title = {Verifying equivalence properties of security protocols}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2011}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/dp11-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/dp11-m2.pdf} }
@mastersthesis{degriek-master, author = {Degrieck, Jan}, title = {R{\'e}duction de graphes pour l'analyse de protocoles de routage s{\'e}curis{\'e}s}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2011}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/jd11-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/jd11-m2.pdf} }
@inproceedings{CFM-ncma11, address = {Milano, Italy}, month = jul, year = 2011, volume = 282, series = {books@ocg.at}, publisher = {Austrian Computer Society}, editor = {Freund, Rudolf and Holzer, Markus and Mereghetti, Carlo and Otto, Friedrich and Palano, Beatrice}, acronym = {{NCMA}'11}, booktitle = {{P}roceedings of the 3rd {W}orkshop on {N}on-{C}lassical {M}odels of {A}utomata and {A}pplications ({NCMA}'11)}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {On the Expressiveness of {P}arikh Automata and Related Models}, pages = {103-119}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ncma11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ncma11.pdf}, doi = {} }
@inproceedings{CFM-words11, address = {Prague, Czech Republic}, month = sep, year = 2011, volume = {63}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Ambro{\v{z}}, Petr and Holub, {\v{S}}t{\v{e}}p{\'a}n and Mas{\'a}kov{\'a}, Zuzana}, acronym = {{WORDS}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference {WORDS} ({WORDS}'11)}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Bounded {P}arikh Automata}, pages = {93-102}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-words11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-words11.pdf}, doi = {10.4204/EPTCS.63.13} }
@inproceedings{SR-dcfs11, address = {Limburg, Germany}, month = jul, year = 2011, volume = {6808}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Holzer, Markus and Kutrib, Martin and Pighizzini, Giovanni}, acronym = {{DCFS}'11}, booktitle = {{P}roceedings of the 13th {I}nternational {W}orkshop on {D}escriptional {C}omplexity of {F}ormal {S}ystems ({DCFS}'11)}, author = {Schwoon, Stefan and Rodr{\'\i}guez, C{\'e}sar}, title = {Construction and {SAT}-based verification of Contextual Unfoldings}, pages = {34-42}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SR-dcfs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SR-dcfs11.pdf}, doi = {10.1007/978-3-642-22600-7_3}, nonote = {Invited paper}, abstract = {Unfoldings succinctly represent the set of reachable markings of a Petri net. Here, we shall consider the case of contextual nets, which extend Petri nets with read arcs, and which are more suitable to represent the case of concurrent read access. We discuss the problem of (efficiently) constructing unfoldings of such nets. On the basis of these unfoldings, various verification problems can be encoded as satisfiability problems in propositional logic.} }
@inproceedings{HKS-gandalf11, address = {Minori, Italy}, month = jun, year = 2011, volume = 54, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {D'Agostino, Giovanna and La{~}Torre, Salvatore}, acronym = {{GandALF}'11}, booktitle = {{P}roceedings of the 2nd {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'11)}, author = {Haar, Stefan and Kern, Christian and Schwoon, Stefan}, title = {Computing the Reveals Relation in Occurrence Nets}, pages = {31-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HKS-gandalf11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HKS-gandalf11.pdf}, doi = {10.4204/EPTCS.54.3}, abstract = {Petri net unfoldings are a useful tool to tackle state-space explosion in verification and related tasks. Moreover, their structure allows to access directly the relations of causal precedence, concurrency, and conflict between events. Here, we explore the data structure further, to determine the following relation: event~\(a\) is said to reveal event~\(b\) iff the occurrence of~\(a\) implies that~\(b\) inevitably occurs, too, be it before, after, or concurrently with~\(a\). Knowledge of reveals facilitates in particular the analysis of partially observable systems, in the context of diagnosis, testing, or verification; it can also be used to generate more concise representations of behaviours via abstractions. The reveals relation was previously introduced in the context of fault diagnosis, where it was shown that the reveals relation was decidable: for a given pair~\(a,b\) in the unfolding~\(U\) of a safe Petri net~\(N\), a finite prefix~\(P\) of~\(U\) is sufficient to decide whether or not \(a\) reveals~\(b\). In this paper, we first considerably improve the bound on~\(|P|\). We then show that there exists an efficient algorithm for computing the relation on a given prefix. We have implemented the algorithm and report on experiments.} }
@inproceedings{CDS-fct11, address = {Oslo, Norway}, month = aug, year = 2011, volume = 6914, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Owe, Olaf and Steffen, Martin and Telle, Jan Arne}, acronym = {{FCT}'11}, booktitle = {{P}roceedings of the 18th {I}nternational {S}ymposium on {F}undamentals of {C}omputation {T}heory ({FCT}'11)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Singh, Rohit}, title = {On Memoryless Quantitative Objectives}, pages = {148-159}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDS-fct11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDS-fct11.pdf}, doi = {10.1007/978-3-642-22953-4_13}, abstract = {In two-player games on graph, the players construct an infinite path through the game graph and get a reward computed by a payoff function over infinite paths. Over weighted graphs, the typical and most studied payoff functions compute the limit-average or the discounted sum of the rewards along the path. Besides their simple definition, these two payoff functions enjoy the property that memoryless optimal strategies always exist.\par In an attempt to construct other simple payoff functions, we define a class of payoff functions which compute an (infinite) weighted average of the rewards. This new class contains both the limit-average and the discounted sum functions, and we show that they are the only members of this class which induce memoryless optimal strategies, showing that there is essentially no other simple payoff functions.} }
@inproceedings{DDMM-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Darondeau, {\relax Ph}ilippe and Demri, St{\'e}phane and Meyer, Roland and Morvan, {\relax Ch}ristophe}, title = {{P}etri Net Reachability Graphs: Decidability Status of {FO} Properties}, pages = {140-151}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.140}, abstract = {We investigate the decidability and complexity status of model-checking problems on unlabelled reachability graphs of Petri nets by considering first-order, modal and pattern-based languages without labels on transitions or atomic propositions on markings. We consider several parameters to separate decidable problems from undecidable ones. Not only are we able to provide precise borders and a systematic analysis, but we also demonstrate the robustness of our proof techniques.} }
@inproceedings{SBM-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Sankur, Ocan and Bouyer, Patricia and Markey, Nicolas}, title = {Shrinking Timed Automata}, pages = {90-102}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.90}, abstract = {We define and study a new approach to the implementability of timed automata, where the semantics is perturbed by imprecisions and finite frequency of the hardware. In order to circumvent these effects, we introduce \emph{parametric shrinking} of clock constraints, which corresponds to tightening the guards. We propose symbolic procedures to decide the existence of (and then compute) parameters under which the shrunk version of a given timed automaton is non-blocking and can time-abstract simulate the exact semantics. We then define an implementation semantics for timed automata with a digital clock and positive reaction times, and show that for shrinkable timed automata both properties are preserved in implementation.} }
@inproceedings{CDK-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Chevalier, C{\'e}line and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Transforming Password Protocols to Compose}, pages = {204-216}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.204}, abstract = {Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover flaws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment.\par In this paper, we study whether password protocols can be safely composed, even when a same password is reused. More precisely, we present a transformation which maps a password protocol that is secure for a single protocol session (a~decidable problem) to a protocol that is secure for an unbounded number of sessions. Our result provides an effective strategy to design secure password protocols: (i)~design a protocol intended to be secure for one protocol session; (ii)~apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. Our technique also applies to compose different password protocols allowing us to obtain both inter-protocol and inter-session composition.} }
@inproceedings{BBMU-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas and Ummels, Michael}, title = {{N}ash Equilibria in Concurrent Games with {B}{\"u}chi Objectives}, pages = {375-386}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.375}, abstract = {We study the problem of the existence (and computation) of Nash equilibria in multi-player concurrent games with B{\"u}chi-definable objectives. First, when the objectives are B{\"u}chi conditions on the game, we prove that the existence problem can be solved in polynomial time. In a second part, we extend our technique to objectives defined by deterministic B{\"u}chi automata, and prove that the problem then becomes EXPTIME-complete. We prove PSPACE-completeness for the case where the B{\"u}chi automata are 1-weak.} }
@inproceedings{BLP-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz and Puchala, Bernd}, title = {Perfect-Information Construction for Coordination in Games}, pages = {387-398}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLP-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLP-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.387}, abstract = {We present a general construction for eliminating imperfect information from games with several players who coordinate against nature, and to transform them into two-player games with perfect information while preserving winning strategy profiles. The construction yields an infinite game tree with epistemic models associated to nodes. To obtain a more succinct representation, we define an abstraction based on homomorphic equivalence, which we prove to be sound for games with observable winning conditions. The abstraction generates finite game graphs in several relevant cases, and leads to a new semi-decision procedure for multi-player games with imperfect information.} }
@incollection{FLS-fosad11, noaddress = {}, month = sep, year = 2011, volume = 6858, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aldini, Alessandro and Gorrieri, Roberto}, acronym = {{FOSAD}'{VI}}, booktitle = {{F}oundations of {S}ecurity {A}nalysis and {D}esign~-- {FOSAD} {T}utorial {L}ectures ({FOSAD}'{VI})}, author = {Focardi, Riccardo and Luccio, Flaminia L. and Steel, Graham}, title = {An Introduction to Security {API} Analysis}, pages = {35-65}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FLS-fosad11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FLS-fosad11.pdf}, doi = {10.1007/978-3-642-23082-0_2}, abstract = {A~security API is an Application Program Interface that allows untrusted code to access sensitive resources in a secure way. Examples of security APIs include the interface between the tamper-resistant chip on a smartcard (trusted) and the card reader (untrusted), the~interface between a~cryptographic Hardware Security Module, or~HSM (trusted) and the client machine (untrusted), and the Google maps API (an~interface between a server, trusted by Google, and the rest of the Internet).} }
@inproceedings{CCD-ccs11, address = {Chicago, Illinois, USA}, month = oct, year = 2011, publisher = {ACM Press}, editor = {Chen, Yan and Danezis, George and Shmatikov, Vitaly}, acronym = {{CCS}'11}, booktitle = {{P}roceedings of the 18th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'11)}, author = {Cheval, Vincent and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Trace Equivalence Decision: Negative Tests and Non-determinism}, pages = {321-330}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf}, doi = {10.1145/2046707.2046744}, abstract = {We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.\par In this paper, we give a calculus that is close to the applied pi calculus and that allows one to capture most existing protocols that rely on classical cryptographic primitives. First, we propose a symbolic semantics for our calculus relying on constraint systems to represent infinite sets of possible traces, and we reduce the decidability of trace equivalence to deciding a notion of symbolic equivalence between sets of constraint systems. Second, we develop an algorithm allowing us to decide whether two sets of constraint systems are in symbolic equivalence or not. Altogether, this yields the first decidability result of trace equivalence for a general class of processes that may involve else branches and\slash or private channels (for a bounded number of sessions).} }
@incollection{haddad-DS11b, author = {Haddad, Serge}, title = {Introduction to Verification}, booktitle = {Models and Analysis in Distributed Systems}, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, publisher = {John Wiley \& Sons, Ltd.}, chapter = 6, pages = {137-154}, year = 2011 }
@incollection{DP-DS11b, author = {Demri, St{\'e}phane and Poitrenaud, Denis}, title = {Verification of Infinite-State Systems}, booktitle = {Models and Analysis in Distributed Systems}, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, publisher = {John Wiley \& Sons, Ltd.}, chapter = 8, pages = {221-269}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DP-DS11b.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DP-DS11b.pdf} }
@book{HKPP-DS11a, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, title = {Distributed Systems Design and Algorithms}, publisher = {John Wiley \& Sons, Ltd.}, year = {2011}, url = {http://www.iste.co.uk/index.php?f=a&ACTION=View&id=415} }
@book{HKPP-DS11b, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, title = {Models and Analysis in Distributed Systems}, publisher = {John Wiley \& Sons, Ltd.}, year = {2011}, url = {http://www.iste.co.uk/index.php?f=a&ACTION=View&id=416} }
@inproceedings{ECGJ-msr11, address = {Lille, France}, month = nov, year = 2011, number = {1-3}, volume = {45}, series = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {Herm{\`e}s}, editor = {Craye, {\'E}tienne and Gamati{\'e}, Abdoulaye}, acronym = {{MSR}'11}, booktitle = {{A}ctes du 8{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'11)}, author = {Echeveste, Jod{\'e} and Cont, Arshia and Giavitto, Jean-Louis and Jacquemard, Florent}, title = {Formalisation des relations temporelles entre une partition et une performance musicale dans un contexte d'accompagnement automatique}, pages = {109-124}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ECGJ-msr11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ECGJ-msr11.pdf}, doi = {10.3166/jesa.45.109-124}, abstract = {We sketch the real-time features required by automatic musical accompaniment seen as a reactive system. We formalize the datation of musical event taking into account the various temporal scales used in music. Various strategies for the handling of synchronization constraints and the handling of errors are presented.} }
@inproceedings{BHP-msr11, address = {Lille, France}, month = nov, year = 2011, number = {1-3}, volume = {45}, series = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {Herm{\`e}s}, editor = {Craye, {\'E}tienne and Gamati{\'e}, Abdoulaye}, acronym = {{MSR}'11}, booktitle = {{A}ctes du 8{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'11)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {{\'E}chantillonnage pr{\'e}f{\'e}rentiel pour le model checking statistique}, pages = {237-252}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-msr11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-msr11.pdf}, doi = {10.3166/jesa.45.237-252}, abstract = {The statistical model checking can be usefully substituted for numerical model checking when the models to be studied are huge. However the statistical approach cannot evaluate too small probabilities. In order to solve the problem, we develop here a new approach based on importance sampling. While most of the techniques related to importance sampling are based on heuristics, we establish theoretical results under some hypotheses. These results ensure a reduction of the variance during application of importance sampling. We also characterize situations that fulfill the hypotheses and we extend our approach for handling other situations but then without theoretical guarantee. We have implemented this approach with the tool \textsc{Cosmos} after some extensions. At~last we have evaluated this approach for two examples and analysed the experimentations.} }
@inproceedings{BMS-formats11, address = {Aalborg, Denmark}, month = sep, year = 2011, volume = 6919, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Fahrenberg, Uli and Tripakis, Stavros}, acronym = {{FORMATS}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'11)}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robust Model-Checking of Timed Automata via Pumping in Channel Machines}, pages = {97-112}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-formats11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-formats11.pdf}, doi = {10.1007/978-3-642-24310-3_8}, abstract = {Timed automata are governed by a mathematical semantics which assumes perfectly continuous and precise clocks. This requirement is not satised by digital hardware on which the models are implemented. In~fact, it~was shown that the presence of imprecisions, however small they may be, may yield extra behaviours. Therefore correctness proven on the formal model does not imply correctness of the real system.\par The problem of robust model-checking was then dened to circumvent this inconsistency. It consists in computing a bound on the imprecision under which the system will be correct.\par In this work, we show that robust model-checking against \(\omega\)-regular properties for timed automata can be reduced to standard model-checking of timed automata, by computing an adequate bound on the imprecision. This yields a new algorithm for robust model-checking of \(\omega\)-regular properties, which is both optimal and valid for general timed automata.} }
@inproceedings{bonnet-RP11, address = {Genova, Italy}, month = sep, year = 2011, volume = {6945}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Delzanno, Giorgio and Potapov, Igor}, acronym = {{RP}'11}, booktitle = {{P}roceedings of the 5th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'11)}, author = {Bonnet, R{\'e}mi}, title = {Decidability of {LTL} Model Checking for Vector Addition Systems with one Zero-test}, pages = {85-95}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-RP11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-RP11.pdf}, doi = {10.1007/978-3-642-24288-5_9}, abstract = {We consider the class of Vector Addition Systems with one zero-test and we show that the model-checking problem for LTL is decidable thanks to a reduction to the computability of the cover and the decidability of reachability. Our proof uses the notion of increasing loop, that we refine to fit the non-standard monotony of our system.} }
@inproceedings{FK-RP11, address = {Genova, Italy}, month = sep, year = 2011, volume = {6945}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Delzanno, Giorgio and Potapov, Igor}, acronym = {{RP}'11}, booktitle = {{P}roceedings of the 5th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'11)}, author = {Fribourg, Laurent and K{\"u}hne, Ulrich}, title = {Parametric Verification and Test Coverage for Hybrid Automata Using the Inverse Method}, pages = {191-204}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FK-RP11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FK-RP11.pdf}, doi = {10.1007/978-3-642-24288-5_17}, abstract = {Hybrid systems combine continuous and discrete behavior. Hybrid Automata are a powerful formalism for the modeling and verification of such systems. A~common problem in hybrid system verification is the good parameters problem, which consists in identifying a set of parameter valuations which guarantee a certain behavior of a system. Recently, a method has been presented for attacking this problem for Timed Automata. In this paper, we show the extension of this methodology for hybrid automata with linear and affine dynamics. The method is demonstrated with a hybrid system benchmark from the literature.} }
@inproceedings{AS-RP11, address = {Genova, Italy}, month = sep, year = 2011, volume = {6945}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Delzanno, Giorgio and Potapov, Igor}, acronym = {{RP}'11}, booktitle = {{P}roceedings of the 5th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'11)}, author = {Andr{\'e}, {\'E}tienne and Soulat, Romain}, title = {Synthesis of Timing Parameters Satisfying Safety Properties}, pages = {31-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AS-RP11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AS-RP11.pdf}, doi = {10.1007/978-3-642-24288-5_5}, abstract = {Safety properties are crucial when verifying real-time concurrent systems. When reasoning parametrically, i.e., with unknown constants, it is of high interest to infer a set of parameter valuations consistent with such safety properties. We present here algorithms based on the inverse method for parametric timed automata: given a reference parameter valuation, it infers a constraint such that, for any valuation satisfying this constraint, the discrete behavior of the system is the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions. These algorithms do not guarantee the equality of the trace sets, but are significantly quicker, synthesize larger sets of parameter valuations than the original method, and still preserve various properties including safety (i.e., non-reachability) properties. Those algorithms have been implemented in Imitator~II and applied to various examples of asynchronous circuits and communication protocols. } }
@techreport{lsv-11-18, author = {Florentin, {\'E}ric and Fribourg, Laurent and K{\"u}hne, Ulrich and Lefebvre, St{\'e}phane and Rey, {\relax Ch}ristian}, title = {{COUPLET}: Coupled Electrothermal Simulation}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = jun, type = {Research Report}, number = {LSV-11-18}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-18.pdf}, note = {32~pages}, abstract = {The~aim of the project COUPLET (supported by Institut Farman) is to study the electrothermal effects of the degradation of the metallisation layer of power semiconductor dies. In this first technical report of the project, we describe our work of modeling and simulation of the behavior of a power transistor. The die is represented by four elementary transistors driven by a distributed gate signal. A~simplified electrical model is used to simulate the transistor behavior at turn-off. The thermal model is realized by finite elements methods and allows to estimate the maximum temperature on each elementary transistor. By~coupling the thermal model with the electric simulation, it is possible to take into account silicon and metallisation heating in the electrical model.} }
@inproceedings{SC-unif11, address = {Wroc{\l}aw, Poland}, month = jul, year = 2011, editor = {Baader, Franz}, acronym = {{UNIF}'11}, booktitle = {{P}roceedings of the 25th {I}nternational {W}orkshop on {U}nification ({UNIF}'11)}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan}, title = {Computing finite variants for subterm convergent rewrite systems}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SC-unif11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SC-unif11.pdf}, abstract = {Driven by an application in the verification of security protocols, we introduce the strong finite variant property, an extention of the finite variant property, and we show that subterm convergent rewrite systems enjoy the strong finite variant property modulo the empty equational theory.\par We argue that the strong finite variant property is more natural and more useful in practice than the finite variant property. We also compare the two properties and we provide a prototype implementation of an algorithm that computes a finite strongly complete set of variants for any term t with respect to a subterm convergent rewrite system.} }
@inproceedings{BMOU-atva11, address = {Taipei, Taiwan}, month = oct, year = {2011}, volume = 6996, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bultan, Tevfik and Hsiung, Pao-Ann}, acronym = {{ATVA}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'11)}, author = {Bouyer, Patricia and Markey, Nicolas and Olschewski, J{\"o}rg and Ummels, Michael}, title = {Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited}, pages = {135-149}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOU-atva11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOU-atva11.pdf}, doi = {10.1007/978-3-642-24372-1_11}, abstract = {We study nondeterministic strategies in parity games with the aim of computing a most permissive winning strategy. Following earlier work, we measure permissiveness in terms of the average number{\slash}weight of transitions blocked by a strategy. Using a translation into mean-payoff parity games, we prove that deciding (the permissiveness~of) a~most permissive winning strategy is in \(\textsf{NP}\cap\textsf{coNP}\). Along the way, we~provide a new study of mean-payoff parity games. In particular, we give a new algorithm for solving these games, which beats all previously known algorithms for this problem.} }
@inproceedings{CKVAK-qest11, address = {Aachen, Germany}, month = sep, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'11)}, author = {Chadha, Rohit and Korthikranthi, Vijay and Viswanathan, Mahesh and Agha, Gul and Kwon, Youngmin}, title = {Model Checking {MDP}s with a Unique Compact Invariant Set of Distributions}, pages = {121-130}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CKVAK-qest11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CKVAK-qest11.pdf}, doi = {10.1109/QEST.2011.22}, abstract = {The semantics of Markov Decision Processes (MDPs), when viewed as transformers of probability distributions, can described as a labeled transition system over the probability distributions over the states of the MDP. The MDP can be seen as defining a set of executions, where each execution is a sequence of probability distributions. Reasoning about sequences of distributions allows one to express properties not expressible in logics like PCTL; examples include expressing bounds on transient rewards and expected values of random variables, as well as comparing the probability of being in one set of states at a given time with another set of states. With respect to such a semantics, the problem of checking that the MDP never reaches a bad distribution is undecidable. In this paper, we identify a special class of MDPs called \emph{semi-regular} MDPs that have a unique non-empty, compact, invariant set of distributions, for which we show that checking any \(\omega\)-regular property is decidable. Our decidability result also implies that for semi-regular probabilistic finite automata with isolated cut-points, the emptiness problem is decidable.} }
@inproceedings{CD-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Energy and Mean-Payoff Parity {M}arkov Decision Processes}, pages = {206-218}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_21}, abstract = {We consider Markov Decision Processes (MDPs) with mean-payoff parity and energy parity objectives. In system design, the parity objective is used to encode \(\omega\)-regular specifications, while the mean-payoff and energy objectives can be used to model quantitative resource constraints. The energy condition requires that the resource level never drops below~\(0\), and the mean-payoff condition requires that the limit-average value of the resource consumption is within a threshold. While these two (energy and mean-payoff) classical conditions are equivalent for two-player games, we~show that they differ for MDPs. We show that the problem of deciding whether a state is almost-sure winning (i.e., winning with probability~\(1\)) in energy parity MDPs is in \(\textsf{NP}\cap\textsf{coNP}\), while for mean-payoff parity MDPs, the problem is solvable in polynomial time.} }
@inproceedings{DMS-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa}, title = {Infinite Synchronizing Words for Probabilistic Automata}, pages = {278-289}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_27}, abstract = {Probabilistic automata are finite-state automata where the transitions are chosen according to fixed probability distributions. We consider a semantics where on an input word the automaton produces a sequence of probability distributions over states. An~infinite word is accepted if the produced sequence is synchronizing, i.e. the sequence of the highest probability in the distributions tends to~\(1\). We show that this semantics generalizes the classical notion of synchronizing words for deterministic automata. We consider the emptiness problem, which asks whether some word is accepted by a given probabilistic automaton, and the universality problem, which asks whether all words are accepted. We provide reductions to establish the PSPACE-completeness of the two problems.} }
@inproceedings{BCGZ-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Bollig, Benedikt and Cyriac, Aiswarya and Gastin, Paul and Zeitoun, Marc}, title = {Temporal Logics for Concurrent Recursive Programs: Satisfiability and Model Checking}, pages = {132-144}, url = {http://hal.archives-ouvertes.fr/hal-00591139/en/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGZ-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_15}, abstract = {We develop a general framework for the design of temporal logics for concurrent recursive programs. A program execution is modeled as a partial order with multiple nesting relations. To specify properties of executions, we consider any temporal logic whose modalities are definable in monadic second-order logic and that, in addition, allows PDL-like path expressions. This captures, in a unifying framework, a wide range of logics defined for trees, nested words, and Mazurkiewicz traces that have been studied separately. We show that satisfiability and model checking are decidable in EXPTIME and 2EXPTIME, depending on the precise path modalities.} }
@inproceedings{Schmitz-fsmnlp11, address = {Blois, France}, month = jul, year = 2011, publisher = {ACL Press}, editor = {Maletti, Andreas}, acronym = {{FSMNLP}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {W}orkshop on {F}inite-{S}tate {M}ethods and {N}atural {L}anguage {P}rocessing ({FSMNLP}'11)}, author = {Sylvain Schmitz}, title = {A~Note on Sequential Rule-Based {POS} Tagging}, pages = {83-87}, url = {http://hal.archives-ouvertes.fr/hal-00600260/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-fsmnlp11.pdf}, abstract = {Brill's part-of-speech tagger is defined through a cascade of leftmost rewrite rules. We revisit the compilation of such rules into a single sequential transducer given by Roche and Schabes (\textit{Comput. Ling.}~1995) and provide a direct construction of the minimal sequential transducer for each individual rule.} }
@inproceedings{BS-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Blockelet, Michel and Schmitz, Sylvain}, title = {Model-Checking Coverability Graphs of Vector Addition Systems}, pages = {108-119}, url = {http://hal.archives-ouvertes.fr/hal-00600077/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_13}, abstract = {A large number of properties of a vector addition system---for instance coverability, boundedness, or regularity---can be decided using its coverability graph, by looking for some characteristic pattern. We propose to unify the known exponential-space upper bounds on the complexity of such problems on vector addition systems, by seeing them as instances of the model-checking problem for a suitable extension of computation tree logic, which allows to check for the existence of these patterns. This provides new insights into what constitutes a {"}coverability-like{"} property.} }
@inproceedings{Sankur-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Sankur, Ocan}, title = {Untimed Language Preservation in Timed Systems}, pages = {556-567}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-mfcs11.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-mfcs11-erratum.pdf}, doi = {10.1007/978-3-642-22993-0_50}, abstract = {Timed automata are a model that is extensively used in formal verification of real-time systems. However, their mathematical semantics is an idealization which assumes perfectly precise clocks, but does not correspond to real hardware. In fact, it is known that imprecisions, however small they may be, may yield extra behaviours. Several works concentrated on a relaxation of the semantics of timed automata to model the imprecisions of the clocks. Algorithms were given, first for safety, then for richer linear-time properties, to decide the robustness of timed systems, that is, the existence of a bound on the imprecisions under which the system satisfies a given property. In this work, we study a stronger notion of robustness: we show how to decide whether the untimed language of a timed automaton is preserved under small enough imprecisions, and provide a bound on the imprecision parameter.} }
@inproceedings{Bonnet-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Bonnet, R{\'e}mi}, title = {The reachability problem for Vector Addition Systems with one zero-test}, pages = {145-157}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RB-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RB-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_16}, abstract = {We consider here a variation of Vector Addition Systems where one counter can be tested for zero. We extend the reachability proof for Vector Addition System recently published by Leroux to this model. This provides an alternate, more conceptual proof of the reachability problem that was originally proved by Reinhardt.} }
@inproceedings{NM-sies11, address = {V{\"a}ster{\aa}s, Sweden}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{SIES}'11}, booktitle = {{P}roceedings of the 6th {IEEE} {I}nternational {S}ymposium on {I}ndustrial {E}mbedded {S}ystems ({SIES}'11)}, author = {Markey, Nicolas}, title = {Robustness in Real-time Systems}, pages = {28-34}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/NM-sies11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NM-sies11.pdf}, doi = {10.1109/SIES.2011.5953652}, abstract = {We~review several aspects of robustness of real-time systems, and present recent results on the robust verification of timed automata.} }
@inproceedings{BDDHP-case11, address = {Trieste, Italy}, month = aug, year = 2011, publisher = {{IEEE} Robotics \& Automation Society}, noeditor = {}, acronym = {{CASE}'11}, booktitle = {{P}roceedings of the 7th {IEEE} {C}onference on {A}utomation {S}cience and {E}ngineering ({CASE}'11)}, author = {Ballarini, Paolo and Djafri, Hilal and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{P}etri Nets Compositional Modeling and Verification of Flexible Manufacturing Systems}, pages = {588-593}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-case11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-case11.pdf}, doi = {10.1109/CASE.2011.6042488}, abstract = {Flexible Manufacturing Systems (FMS) are amongst the most studied types of systems, however due to their increasing complexity, there is still room for improvement in their modeling and analysis. In this paper we consider the design and the analysis of stochastic models of FMS in two complementary respects. First we describe a (stochastic) Petri Nets based compositional framework which enables to model an FMS by combination of an arbitrary number of basic components. Second we demonstrate how classical transient-analysis of manufacturing systems, including reliability and performability analysis, can be enriched by application of a novel, sophisticated stochastic logic, namely the Hybrid Automata Stochastic Logic (HASL). We demonstrate the proposed methodology on an FMS example.} }
@inproceedings{BDDHP-qest11, address = {Aachen, Germany}, month = sep, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'11)}, author = {Ballarini, Paolo and Djafri, Hilal and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{COSMOS}: a~Statistical Model Checker for the Hybrid Automata Stochastic Logic}, pages = {143-144}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-qest11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-qest11.pdf}, doi = {10.1109/QEST.2011.24}, abstract = {This tool paper introduces COSMOS, a statistical model checker for the Hybrid Automata Stochastic Logic (HASL). HASL employs Linear Hybrid Automata (LHA), a generalization of Deterministic Timed Automata (DTA), to describe accepting execution paths of a Discrete Event Stochastic Process (DESP), a class of stochastic models which includes, but is not limited to, Markov chains. As a result HASL verification turns out to be a unifying framework where sophisticated temporal reasoning is naturally blended with elaborate reward-based analysis. COSMOS takes as input a DESP (described in terms of a Generalized Stochastic Petri Net), an LHA and an expression~\(Z\) representing the quantity to be estimated. It returns a confidence interval estimation of~\(Z\). COSMOS is written in C++ and is freely available to the research community.} }
@article{BFH-ijpe11, publisher = {RAMS Consultants}, journal = {International Journal of Performability Engineering}, author = {Beccuti, Marco and Franceschinis, Giuliana and Haddad, Serge}, title = {{MDWN}solver: A~Framework to Design and Solve {M}arkov Decision {P}etri Nets}, year = {2011}, month = sep, volume = 7, number = 5, pages = {417-428}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFH-ijpe11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFH-ijpe11.pdf}, abstract = {MDWNsolver is a framework for system modeling and optimization of performability measures based on Markov Decision Petri Net (MDPN) and Markov Decision Well-formed Net (MDWN) formalisms, two Petri Net extensions for high level specification of Markov Decision Processes (MDP). It is integrated in the GreatSPN suite which provides a GUI to design MDPN/MDWN models. From the analysis point of view, MDWNsolver uses efficient algorithms that take advantage of system symmetries, thus reducing the analysis complexity. In this paper the MDWNsolver framework features and architecture are presented, and some application examples are discussed.} }
@inproceedings{UW-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Ummels, Michael and Wojtczak, Dominik}, title = {The Complexity of {N}ash Equilibria in Limit-Average Games}, pages = {482-496}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_32}, abstract = {We study the computational complexity of Nash equilibria in concurrent games with limit-average objectives. In particular, we prove that the existence of a Nash equilibrium in randomised strategies is undecidable, while the existence of a Nash equilibrium in pure strategies is decidable, even if we put a constraint on the payoff of the equilibrium. Our undecidability result holds even for a restricted class of concurrent games, where nonzero rewards occur only on terminal states. Moreover, we show that the constrained existence problem is undecidable not only for concurrent games but for turn-based games with the same restriction on rewards. Finally, we prove that the constrained existence problem for Nash equilibria in (pure or randomised) stationary strategies is decidable and analyse its complexity.} }
@inproceedings{Bol-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Bollig, Benedikt}, title = {An automaton over data words that captures {EMSO} logic}, pages = {171-186}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/B-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/B-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_12}, abstract = {We develop a general framework for the specification and implementation of systems whose executions are words, or partial orders, over an infinite alphabet. As a model of an implementation, we introduce class register automata, a one-way automata model over words with multiple data values. Our model combines register automata and class memory automata. It has natural interpretations. In particular, it captures communicating automata with an unbounded number of processes, whose semantics can be described as a set of (dynamic) message sequence charts. On the specification side, we provide a local existential monadic second-order logic that does not impose any restriction on the number of variables. We study the realizability problem and show that every formula from that logic can be effectively, and in elementary time, translated into an equivalent class register automaton.} }
@inproceedings{RSB-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan and Baldan, Paolo}, title = {Efficient contextual unfolding}, pages = {342-357}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RSB-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RSB-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_23}, abstract = {A~contextual net is a Petri net extended with read arcs, which allow transitions to check for tokens without consuming them. Contextual nets allow for better modelling of concurrent read access than Petri nets, and their unfoldings can be exponentially more compact than those of a corresponding Petri net. A~constructive but abstract procedure for generating those unfoldings was proposed in earlier work; however, no concrete implementation existed. Here, we~close this gap providing two concrete methods for computing contextual unfoldings, with a view to efficiency. We report on experiments carried out on a number of benchmarks. These show that not only are contextual unfoldings more compact than Petri net unfoldings, but they can be computed with the same or better efficiency, in~particular with respect to the place-replication encoding of contextual nets into Petri nets.} }
@inproceedings{BLMST-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Bouyer, Patricia and Larsen, Kim~G. and Markey, Nicolas and Sankur, Ocan and Thrane, Claus}, title = {Timed automata can always be made implementable}, pages = {76-91}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLMST-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLMST-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_6}, abstract = {Timed automata follow a mathematical semantics, which assumes perfect precision and synchrony of clocks. Since this hypothesis does not hold in digital systems, properties proven formally on a timed automaton may be lost at implementation. In order to ensure implementability, several approaches have been considered, corresponding to different hypotheses on the implementation platform. We address two of these: a~timed automaton is samplable if its semantics is preserved under a discretization of time; it is robust if its semantics is preserved when all timing constraints are relaxed by some small positive parameter. We propose a construction which makes timed automata implementable in the above sense: From any timed automaton~\(\mathcal{A}\), we build a timed automaton~\(\mathcal{A}'\) that exhibits the same behaviour as~\(\mathcal{A}\), and moreover is both robust and samplable by construction.} }
@inproceedings{BBBS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Stainer, Am{\'e}lie}, title = {Emptiness and Universality Problems in Timed Automata with Positive Frequency}, pages = {246-257}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBS-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_19}, abstract = {The languages of infinite timed words accepted by timed automata are traditionally dened using B{\"u}chi-like conditions. These acceptance conditions focus on the set of locations visited infinitely often along a run, but completely ignore quantitative timing aspects. In this paper we propose a natural quantitative semantics for timed automata based on the so-called frequency, which measures the proportion of time spent in the accepting locations. We study various properties of timed languages accepted with positive frequency, and in particular the emptiness and universality problems.} }
@inproceedings{BDGORW-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Brihaye, {\relax Th}omas and Doyen, Laurent and Geeraerts, Gilles and Ouaknine, Jo{\"e}l and Raskin, Jean-Fran{\c{c}}ois and Worrell, James}, title = {On~Reachability for Hybrid Automata over Bounded Time}, pages = {416-427}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDGORW-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDGORW-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_33}, abstract = {This paper investigates the time-bounded version of the reachability problem for hybrid automata. This problem asks whether a given hybrid automaton can reach a given target location within~\(\mathbf{T}\) time units, where \(\mathbf{T}\) is a constant rational value. We show that, in contrast to the classical (unbounded) reachability problem, the timed-bounded version is decidable for rectangular hybrid automata provided only non-negative rates are allowed. This class of systems is of practical interest and subsumes, among others, the class of stopwatch automata. We also show that the problem becomes undecidable if either diagonal constraints or both negative and positive rates are allowed.} }
@inproceedings{BCS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {B{\'a}r{\'a}ny, Vince and ten~Cate, Balder and Segoufin, Luc}, title = {Guarded negation}, pages = {356-367}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCS-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_28}, abstract = {We consider restrictions of first-order logic and of fixpoint logic in which all occurrences of negation are required to be guarded by an atomic predicate. In terms of expressive power, the logics in question, called GNFO and GNFP, extend the guarded fragment of first-order logic and guarded least fixpoint logic, respectively. They also extend the recently introduced unary negation fragments of first-order logic and of least fixpoint logic.\par We show that the satisfiability problem for GNFO and for GNFP is 2ExpTime-complete, both on arbitrary structures and on finite structures. We also study the complexity of the associated model checking problems. Finally, we show that GNFO and GNFP are not only computationally well behaved, but also model theoretically: we show that GNFO and GNFP have the tree-like model property and that GNFO has the finite model property, and we characterize the expressive power of GNFO in terms of invariance for an appropriate notion of bisimulation.} }
@inproceedings{SS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {Multiply-Recursive Upper Bounds with {H}igman's Lemma}, pages = {441-452}, url = {http://arxiv.org/abs/1103.4399}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_35}, abstract = {We develop a new analysis for the length of controlled bad sequences in well-quasi-orderings based on Higman's Lemma. This leads to tight multiply-recursive upper bounds that readily apply to several verification algorithms for well-structured systems.} }
@inproceedings{AMSS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Anderson, Matthew and van~Melkebeek, Dieter and Schweikardt, Nicole and Segoufin, Luc}, title = {Locality of queries definable in invariant first-order logic with arbitrary built-in predicates}, pages = {368-379}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_29}, abstract = {We consider first-order formulas over relational structures which may use arbitrary numerical predicates. We require that the validity of the formula is independent of the particular interpretation of the numerical predicates and refer to such formulas as Arb-invariant first-order.\par Our main result shows a Gaifman locality theorem: two tuples of a structure with n elements, having the same neighborhood up to distance \((\log n)^{\omega(1)}\), cannot be distinguished by Arb-invariant first-order formulas. When restricting attention to word structures, we can achieve the same quantitative strength for Hanf locality. In both cases we show that our bounds are tight.\par Our proof exploits the close connection between Arb-invariant first-order formulas and the complexity class \(\textsf{AC}^{0}\), and hinges on the tight lower bounds for parity on constant-depth circuits.} }
@techreport{rr-lsv-11-08, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {Weighted Expressions and {DFS} Tree Automata}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = apr, type = {Research Report}, number = {LSV-11-08}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-08.pdf}, note = {32~pages}, abstract = {We introduce weighted expressions, a~calculus to express quantitative properties over unranked trees. They involve products and sums from a semiring as well as classical boolean formulas. We~show that weighted expressions are expressively equivalent to a new class of weighted tree-walking automata. This new automata model is equipped with pebbles, and follows a depth-first-search policy in the tree.} }
@inproceedings{benzina-iccans11, address = {Republic of Maldives}, month = may, year = 2011, noeditor = {}, acronym = {{ICCANS}'11}, booktitle = {{P}roceedings of the {I}nternational {C}onference on {C}omputer {A}pplications and {N}etwork {S}ecurity ({ICCANS}'11)}, author = {Benzina, Hedi}, title = {Logic in Virtualized Systems}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iccans11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iccans11.pdf}, abstract = {As virtualized systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A malicious driver downloaded and installed by the system administrator can trigger high-complexity behavior exhausting CPU time or stack space and making the whole system unavailable. Virtualized systems such as Xen or VirtualBox have been proposed to increase the level of security on computers. On the other hand, such virtualized systems are now targets for attacks. The weak spot of such systems is domain zero administration, which is left entirely under the administrator's responsibility, and is in particular vulnerable to attacks. \par We propose to let the administrator write and deploy security policies and rely on RuleGen, a policy compiler, and Orchids' fast, real-time monitoring engine to raise alerts in case any policy violation, expressed in a fragment of linear temporal logic, is detected. This approach has shown its efficiency against real DoS exploits. } }
@phdthesis{markey-HDR11, author = {Markey, Nicolas}, title = {Verification of Embedded Systems -- Algorithms and Complexity}, year = 2011, month = apr, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-nm.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-nm.pdf} }
@incollection{CDM-fmtasp11, author = {Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie and Millen, Jonathan K.}, title = {Constraint solving techniques and enriching the model with equational theories}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, editor = {Cortier, V{\'e}ronique and Kremer, Steve}, series = {Cryptology and Information Security Series}, volume = 5, publisher = {{IOS} Press}, nochapter = {}, pages = {35-61}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDM-fmtasp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDM-fmtasp11.pdf}, abstract = {Derivability constraints represent in a symbolic way the infinite set of possible executions of a finite protocol, in presence of an arbitrary active attacker. Solving a derivability constraint consists in computing a simplified representation of such executions, which is amenable to the verification of any (trace) security property. Our goal is to explain this method on a non-trivial combination of primitives.\par In this chapter we explain how to model the protocol executions using derivability constraints, and how such constraints are interpreted, depending on the cryptographic primitives and the assumed attacker capabilities. Such capabilities are represented as a deduction system that has some specific properties. We choose as an example the combination of exclusive-or, symmetric encryption{\slash}decryption and pairing{\slash}unpairing. We explain the properties of the deduction system in this case and give a complete and terminating set of rules that solves derivability constraints. A similar set of rules has been already published for the classical Dolev-Yao attacker, but it is a new result for the combination of primitives that we consider. This allows to decide trace security properties for this combination of primitives and arbitrary finite protocols.} }
@inproceedings{ACD-cade11, address = {Wroc{\l}aw, Poland}, month = jul, year = 2011, volume = {6803}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bj{\o}rner, Nikolaj and Sofronie-Stokkermans, Viorica}, acronym = {{CADE}'11}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {A}utomated {D}eduction ({CADE}'11)}, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Deciding security for protocols with recursive tests}, pages = {49-63}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-cade11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-cade11.pdf}, doi = {10.1007/978-3-642-22438-6_6}, abstract = {Security protocols aim at securing communications over public networks. Their design is notoriously dicult and error-prone. Formal methods have shown their usefulness for providing a careful security analysis in the case of standard authentication and condentiality protocols. However, most current techniques do not apply to protocols that perform recursive computation e.g. on a list of messages received from the network.\par While considering general recursive input{\slash}output actions very quickly yields undecidability, we focus on protocols that perform recursive tests on received messages but output messages that depend on the inputs in a standard way. This is in particular the case of secured routing protocols, distributed right delegation or PKI certication paths. We provide NPTIME decision procedures for protocols with recursive tests and for a bounded number of sessions. We also revisit constraint system solving, providing a complete symbolic representation of the attacker knowledge.} }
@inproceedings{KSW-csf11, address = {Cernay-la-Ville, France}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'11}, booktitle = {{P}roceedings of the 24th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'11)}, author = {Kremer, Steve and Steel, Graham and Warinschi, Bogdan}, title = {Security for Key Management Interfaces}, pages = {266-280}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KSW-csf11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KSW-csf11.pdf}, nolongps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2011-07.ps}, nolongpsgz = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PSGZ/ rr-lsv-2011-07.ps.gz}, doi = {10.1109/CSF.2011.25}, abstract = {We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the security of more expressive APIs which support richer functionality. We illustrate our approach by showing the security of APIs both in symbolic and computational models.} }
@inproceedings{DKRS-csf11, address = {Cernay-la-Ville, France}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'11}, booktitle = {{P}roceedings of the 24th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'11)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham}, title = {Formal analysis of protocols based on {TPM} state registers}, pages = {66-82}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-csf11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-csf11.pdf}, doi = {10.1109/CSF.2011.12}, abstract = {We~present a Horn-clause-based framework for analysing security protocols that use platform configuration registers~(PCRs), which are registers for maintaining state inside the Trusted Platform Module~(TPM). In~our model, the~PCR state space is unbounded, and our experience shows that a na{\"i}ve analysis using ProVerif or SPASS does not terminate. To address this, we extract a set of instances of the Horn clauses of our model, for which ProVerif does terminate on our examples. We~prove the soundness of this extraction process: no~attacks are lost, that~is, any query derivable in the more general set of clauses is also derivable from the extracted instances. The~effectiveness of our framework is demonstrated in two case studies: a~simplified version of Microsoft Bitlocker, and a digital envelope protocol that allows a user to choose whether to perform a decryption, or to verifiably renounce the ability to perform the decryption.} }
@techreport{rr-lsv-11-04, author = {Fribourg, Laurent and K{\"u}hne, Ulrich}, title = {Parametric Verification of Hybrid Automata Using the Inverse Method}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = mar, type = {Research Report}, number = {LSV-11-04}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-04.pdf}, note = {25~pages}, abstract = {Hybrid systems combine continuous and discrete behavior. Hybrid Automata are a powerful formalism for the modeling and verification of such systems. A~common problem in hybrid system verification is the good parameters problem, which consists in identifying a subset of parameters which guarantee a certain behavior of a system. Recently, a method has been presented for attacking this problem for Timed Automata. In this report, we show the extension of this methodology for hybrid automata with linear and affine dynamics. The method is demonstrated with a distributed temperature control system and several other hybrid system benchmarks from the literature.} }
@inproceedings{CLC-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique}, title = {How to prove security of communication protocols? A~discussion on the soundness of formal models w.r.t. computational ones}, pages = {29-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CLC-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CLC-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.29}, abstract = {Security protocols are short programs that aim at securing communication over a public network. Their design is known to be error-prone with flaws found years later. That is why they deserve a careful security analysis, with rigorous proofs. Two main lines of research have been (independently) developed to analyse the security of protocols. On the one hand, formal methods provide with symbolic models and often automatic proofs. On the other hand, cryptographic models propose a tighter modeling but proofs are more difficult to write and to check. An approach developed during the last decade consists in bridging the two approaches, showing that symbolic models are sound w.r.t. symbolic ones, yielding strong security guarantees using automatic tools. These results have been developed for several cryptographic primitives (e.g. symmetric and asymmetric encryption, signatures, hash) and security properties. While proving soundness of symbolic models is a very promising approach, several technical details are often not satisfactory. Focusing on symmetric encryption, we describe the difficulties and limitations of the available results.} }
@inproceedings{CS-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {ten~Cate, Balder and Segoufin, Luc}, title = {Unary negation}, pages = {344-355}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.344}, abstract = {We study fragments of first-order logic and of least fixed point logic that allow only unary negation: negation of formulas with at most one free variable. These logics generalize many interesting known formalisms, including modal logic and the \(\mu\)-calculus, as well as conjunctive queries and monadic Datalog. We show that satisfiability and finite satisfiability are decidable for both fragments, and we pinpoint the complexity of satisfiability, finite satisfiability, and model checking. We also show that the unary negation fragment of first-order logic is model-theoretically very well behaved. In particular, it enjoys Craig interpolation and the Beth property.} }
@inproceedings{ST-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {Segoufin, Luc and Toru{\'n}czyk, Szymon}, title = {Automata based verification over linearly ordered data domains}, pages = {81-92}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ST-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ST-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.81}, abstract = {In this paper we work over linearly ordered data domains equipped with finitely many unary predicates and constants. We consider nondeterministic automata processing words and storing finitely many variables ranging over the domain. During a transition, these automata can compare the data values of the current configuration with those of the previous configuration using the linear order, the unary predicates and the constants.\par We show that emptiness for such automata is decidable, both over finite and infinite words, under reasonable computability assumptions on the linear order.\par Finally, we show how our automata model can be used for verifying properties of workflow specifications in the presence of an underlying database.} }
@article{LS-jcss11, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Libkin, Leonid and Sirangelo, Cristina}, title = {Data exchange and schema mappings in open and closed worlds}, year = {2011}, month = may, volume = {77}, number = {3}, pages = {542-571}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-jcss11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-jcss11.pdf}, doi = {10.1016/j.jcss.2010.04.010} }
@phdthesis{kremer-HDR11, author = {Kremer, Steve}, title = {Modelling and analyzing security protocols in cryptographic process calculi}, year = 2011, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SK.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SK.pdf}, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/} }
@phdthesis{steel-HDR11, author = {Steel, Graham}, title = {Formal Analysis of Security {API}s}, year = 2011, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-GS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-GS.pdf}, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/} }
@phdthesis{delaune-HDR11, author = {Delaune, St{\'e}phanie}, title = {Verification of security protocols: from confidentiality to privacy}, year = 2011, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SD.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SD.pdf}, abstract = {Security is a very old concern, which until quite recently was mostly of interest for military purposes. The deployment of electronic commerce changes this drastically. The security of exchanges is ensured by cryptographic protocols which are notoriously error prone. The formal verification of cryptographic protocols is a difficult problem that can be seen as a particular model-checking problem in an hostile environment. Many results and tools have been developed to automatically verify cryptographic protocols.\par Recently, new type of applications have emerged, in order to face new technological and societal challenges, e.g. electronic voting protocols, secure routing protocols for mobile ad hoc networks,~... These applications involve some features that are not taken into account by the existing verification tools, e.g. complex cryptographic primitives, privacy-type security properties,~... This prevents us from modelling these protocols in an accurate way. Moreover, protocols are often analysed in isolation and this is well-known to be not sufficient. In this thesis, we use formal methods to study these aspects concerning the verification of cryptographic protocols.} }
@inproceedings{pas-icdt11, address = {Uppsala, Sweden}, month = mar, year = 2011, publisher = {ACM Press}, editor = {Milo, Tova}, acronym = {{ICDT}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'11)}, author = {Pasail{\u{a}}, Daniel}, title = {Conjunctive queries determinacy and rewriting}, pages = {220-231}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/pasaila-icdt11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/pasaila-icdt11.pdf}, doi = {10.1145/1938551.1938580} }
@inproceedings{BCH-acsd11, address = {Newcastle upon Tyne, UK}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, editor = {Caillaud, Beno{\^\i}t and Carmona, Josep}, acronym = {{ACSD}'11}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'11)}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {Building Tight Occurrence Nets from Reveals Relations}, pages = {44-53}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-acsd11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-acsd11.pdf}, doi = {10.1109/ACSD.2011.16}, abstract = {Occurrence nets are a well known partial order model for the concurrent behavior of Petri nets. The causality and conflict relations between events, which are explicitly represented in occurrence nets, induce logical dependencies between event occurrences: the occurrence of an event~\(e\) in a run implies that all its causal predecessors also occur, and that no event in conflict with \(e\) occurs. But these structural relations do not express all the logical dependencies between event occurrences in maximal runs: in particular, the occurrence of~\(e\) in any maximal run may imply the occurrence of another event that is not a causal predecessor of~\(e\), in that run. The \emph{reveals} relation has been introduced in~[Haar, IEEE TAC 55(10):2310-2320, 2010] to express this dependency between two events. Here we generalize the reveals relation to express more general dependencies, involving more than two events, and we introduce ERL logic to express them as boolean formulas. Finally we answer the synthesis problem that arises: given an ERL formula~\(\varphi\), is there an occurrence net~\(\mathcal{N}\) such that \(\varphi\) describes exactly the dependencies between the events of~\(\mathcal{N}\)?} }
@inproceedings{HMN-atpn11, address = {Newcastle upon Tyne, UK}, month = jun, year = 2011, volume = {6709}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kristensen, Lars M. and Petrucci, Laure}, acronym = {{PETRI~NETS}'11}, booktitle = {{P}roceedings of the 32nd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'11)}, author = {Haddad, Serge and Mairesse, Jean and Nguyen, Hoang-Thach}, title = {Synthesis and Analysis of Product-form {P}etri Nets}, pages = {288-307}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HMN-atpn11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HMN-atpn11.pdf}, doi = {10.1007/978-3-642-21834-7_16}, abstract = {For a large Markovian model, a {"}product form{"} is an explicit description of the steady-state behaviour which is otherwise generally untractable. Being first introduced in queueing networks, it has been adapted to Markovian Petri nets. Here we address three relevant issues for product-form Petri nets which were left fully or partially open: (1)~we~provide a sound and complete set of rules for the synthesis; (2)~we~characterise the exact complexity of classical problems like reachability; (3)~we~introduce a new subclass for which the normalising constant (a crucial value for product-form expression) can be efficiently computed.} }
@inproceedings{CFS-atpn2011, address = {Newcastle upon Tyne, UK}, month = jun, year = 2011, volume = {6709}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kristensen, Lars M. and Petrucci, Laure}, acronym = {{PETRI~NETS}'11}, booktitle = {{P}roceedings of the 32nd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'11)}, author = {Chambart, Pierre and Finkel, Alain and Schmitz, Sylvain}, title = {Forward Analysis and Model Checking for Trace Bounded {WSTS}}, nopages = {49-68}, url = {http://arxiv.org/abs/1004.2802}, doi = {10.1007/978-3-642-21834-7_4}, abstract = {We investigate a subclass of well-structured transition systems~(WSTS), the bounded---in the sense of Ginsburg and Spanier (Trans. AMS 1964)---complete deterministic ones, which we claim provide an adequate basis for the study of forward analyses as developed by Finkel and Goubault-Larrecq (ICALP~2009). Indeed, we prove that, unlike other conditions considered previously for the termination of forward analysis, boundedness is decidable. Boundedness turns out to be a valuable restriction for WSTS verification, as we show that it further allows to decide all \(\omega\)-regular properties on the set of infinite traces of the system.} }
@inproceedings{ACGP-rsa11, address = {San Francisco, California, USA}, month = feb, year = 2011, volume = 6558, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kiayias, Aggelos}, acronym = {{CT-RSA}'11}, booktitle = {{P}roceedings of the {C}ryptographers' {T}rack at the {RSA} {C}onference 2011 ({CT-RSA}'11)}, author = {Abdalla, Michel and Chevalier, C{\'e}line and Granboulan, Louis and Pointcheval, David}, title = {Contributory Password-Authenticated Group Key Exchange with Join Capability}, pages = {142-160}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACGP-rsa11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACGP-rsa11.pdf}, doi = {10.1007/978-3-642-19074-2_11}, abstract = {Password-based authenticated group key exchange allows any group of users in possession of a low-entropy secret key to establish a common session key even in the presence of adversaries. In this paper, we propose a new generic construction of password-authenticated group key exchange protocol from any two-party password-authenticated key exchange with explicit authentication. Our new construction has several advantages when compared to existing solutions. First, our construction only assumes a common reference string and does not rely on any idealized models. Second, our scheme enjoys a simple and intuitive security proof in the universally composable framework and is optimal in the sense that it allows at most one password test per user instance. Third, our scheme also achieves a strong notion of security against insiders in that the adversary cannot bias the distribution of the session key as long as one of the players involved in the protocol is honest. Finally, we show how to easily extend our protocol to the dynamic case in a way that the costs of establishing a common key between two existing groups is significantly smaller than computing a common key from scratch.} }
@inproceedings{FFSS-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Figueira, Diego and Figueira, Santiago and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {{A}ckermannian and Primitive-Recursive Bounds with {D}ickson's Lemma}, pages = {269-278}, url = {http://arxiv.org/abs/1007.2989}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FFSS-lics11.pdf}, doi = {10.1109/LICS.2011.39}, abstract = {Dickson's Lemma is a simple yet powerful tool widely used in decidability proofs, especially when dealing with counters or related data structures in algorithmics, verification and model-checking, constraint solving, logic, etc. While Dickson's Lemma is well-known, most computer scientists are not aware of the complexity upper bounds that are entailed by its use. This is mainly because, on this issue, the existing literature is not very accessible.\par We propose a new analysis of the length of bad sequences over \((\mathbb{N}^{k},\leq)\), improving on earlier results and providing upper bounds that are essentially tight. This analysis is complemented by a {"}user guide{"} explaining through practical examples how to easily derive complexity upper bounds from Dickson's Lemma.} }
@inproceedings{GLV-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Goubault{-}Larrecq, Jean and Varacca, Daniele}, title = {Continuous Random Variables}, pages = {97-106}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011-errata.pdf}, doi = {10.1109/LICS.2011.23}, abstract = {We introduce the domain of continuous random variables (CRV) over a domain, as an alternative to Jones and Plotkin's probabilistic powerdomain. While no known Cartesian-closed category is stable under the latter, we show that the so-called thin (uniform) CRVs define a strong monad on the Cartesian-closed category of bc-domains. We also characterize their inequational theory, as (fair-)coin algebras. We apply this to solve a recent problem posed by M. Escard{\'o}: testing is semi-decidable for EPCF terms. CRVs arose from the study of the second author's (layered) Hoare indexed valuations, and we also make the connection apparent.} }
@inproceedings{Fig-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Figueira, Diego}, title = {A decidable two-way logic on data words}, pages = {365-374}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lics2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lics2011.pdf}, doi = {10.1109/LICS.2011.18}, abstract = {We study the satisfiability problem for a logic on data words. A~data word is a finite word where every position carries a label from a finite alphabet and a data value from an infinite domain. The logic we consider is two-way, contains \emph{future} and \emph{past} modalities, which are considered as reflexive and transitive relations, and data equality and inequality tests. This logic corresponds to the fragment of XPath with the 'followingsibling- or-self' and 'preceding-sibling-or-self' axes over data words. We show that this problem is decidable, EXPSPACE-complete. This is surprising considering that with the strict (non-reflexive) navigation relations the satisfiability problem is undecidable. To~prove this, we~first reduce the problem to a derivation problem for an infinite transition system, and then we show how to abstract this problem into a reachability problem of a finite transition system.} }
@phdthesis{villard-phd2010, author = {Villard, Jules}, title = {Heaps and Hops}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/villard-phd.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/villard-phd.pdf}, abstract = {This thesis is about the specification and verification of copyless message-passing programs, a particular kind of concurrent programs that communicate by message passing. Instead of copying messages over channels, processes exchange pointers into a shared memory where the actual contents of messages are stored. Channels are themselves objects in the heap that can be communicated, thus achieving full mobility. This flexible and efficient programming paradigm must be used carefully: every pointer that is communicated becomes shared between its sender and its recipient, which may introduce races. To err on the side of caution, the sender process should not attempt to access the area of storage circumscribed by a message once it has been sent. Indeed, this right is now reserved to the recipient, who may already have modified it or even disposed of it. In other words, the ownership of pieces of heap hops from process to process following the flow of messages.\par Copyless message passing combines two features of programs that make formal verification challenging: explicit memory management and concurrency. To tackle these difficulties, we base our approach on two recent developments. On the one hand, concurrent separation logic produces concise proofs of pointer-manipulating programs by keeping track only of those portions of storage owned by the program. We use such local reasoning techniques to analyse the fluxes of ownership in programs, and ensure in particular that no dangling pointer will be dereferenced or freed at runtime. On the other hand, channel contracts, a form of session types introduced by the Sing\# programming language, provide an abstraction of the exchanges of messages that can be used to statically verify that programs never face unexpected message receptions and that all messages are delivered before a channel is closed.\par The contributions contained in this thesis fall into three categories. First, we give a semantics to copyless message-passing programs, the ownership transfers they induce and contracts, and link the three together. In doing so, we provide the first formal model of a theoretically significant subset of the Sing\# programming language. In particular, we show that some properties of their contracts rub off on programs, which justifies their use as protocol specifications. Second, we introduce the first proof system for copyless message passing, based on separation logic and contracts. The proof system discharges parts of the verification of programs on the verification of their contracts. The marriage of these two techniques allows one to prove that programs are free from memory faults, race conditions and message-passing errors such as unspecified receptions and undelivered messages. Moreover, we show how the logic and contracts cooperate to prove the absence of memory leaks. Third, we give an implementation of our analysis, Heap-Hop, that takes annotated programs as input and automatically checks the given specifications and deduces which of the properties above are enjoyed by the program. The only annotations needed by Heap-Hop are pre and postconditions of each function, loop invariants, and the contracts followed by the communications.} }
@book{CK-ios2011, editor = {Cortier, V{\'e}ronique and Kremer, Steve}, title = {Formal Models and Techniques for Analyzing Security Protocols}, publisher = {{IOS} Press}, year = {2011}, series = {Cryptology and Information Security Series}, volume = 5, url = {http://www.iospress.nl/loadtop/load.php?isbn=9781607507130} }
@inproceedings{BDDHP-valuetools11, address = {Cachan, France}, month = may, year = 2011, acronym = {{VALUETOOLS}'11}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {P}erformance {E}valuation {M}ethodologies and {T}ools ({VALUETOOLS}'11)}, author = {Ballarini, Paolo and Djafri, Hilal and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{HASL}: An~Expressive Language for Statistical Verification of Stochastic Models}, pages = {306-315}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-valuetools11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-valuetools11.pdf}, abstract = {We introduce the Hybrid Automata Stochastic Logic (HASL), a new temporal logic formalism for the verification of discrete event stochastic processes (DESP). HASL employs Linear Hybrid Automata (LHA) as machineries to select prefixes of relevant execution paths of a DESP~\(\mathcal{D}\). The advantage with LHA is that rather elaborate information can be collected \emph{on-the-fly} during path selection, providing the user with a powerful means to express sophisticated measures. A formula of HASL consists of an LHA~\(\mathcal{A}\) and an expression~\(Z\) referring to moments of \emph{path random variables}. A~simulation-based statistical engine is employed to obtained a confidence-interval estimate of the expected value of~\(Z\). In essence HASL provide a unifying verification framework where sophisticated temporal reasoning is naturally blended with elabo- rate reward-based analysis. We illustrate the HASL approach by means of some examples and a discussion about its expressivity. We also provide empirical evidence obtained through COSMOS, a prototype software tool for HASL verification.} }
@article{BFLM-cacm11, publisher = {ACM Press}, journal = {Communications of the~{ACM}}, author = {Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim~G. and Markey, Nicolas}, title = {Quantitative analysis of real-time systems using priced timed automata}, volume = 54, number = 9, month = sep, pages = {78-87}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLM-cacm11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLM-cacm11.pdf}, doi = {10.1145/1995376.1995396}, abstract = {The problems of time-dependent behavior in general, and dynamic resource allocation in particular, pervade many aspects of modern life. Prominent examples range from reliability and efficient use of communication resources in a telecommunication network to the allocation of tracks in a continental railway network, from scheduling the usage of computational resources on a chip for durations of nano-seconds to the weekly, monthly, or longer-range reactive planning in a factory or a supply chain.} }
@inproceedings{BFHR-fossacs11, address = {Saarbr{\"u}cken, Germany}, month = mar # {-} # apr, year = 2011, volume = {6604}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hofmann, Martin}, acronym = {{FoSSaCS}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'11)}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Haddad, Serge and Rosa{-}Velardo, Fernando}, title = {Ordinal Theory for Expressiveness of Well Structured Transition Systems}, pages = {153-167}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHR-fossacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHR-fossacs11.pdf}, doi = {10.1007/978-3-642-19805-2_11} }
@inproceedings{FS-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {Figueira, Diego and Segoufin, Luc}, title = {Bottom-up automata on data trees and vertical {XP}ath}, pages = {93-104}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.93}, abstract = {A data tree is a tree whose every node carries a label from a finite alphabet and a datum from some infinite domain. We introduce a new model of automata over unranked data trees with a decidable emptiness problem. It is essentially a bottom-up alternating automaton with one register, enriched with epsilon-transitions that perform tests on the data values of the subtree. We show that it captures the expressive power of the vertical fragment of XPath --containing the child, descendant, parent and ancestor axes-- obtaining thus a decision procedure for its satisfiability problem.} }
@inproceedings{BKKL-ceeset2008, address = {Brno, Czech Republic}, year = 2011, volume = {4980}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Huzar, Zbigniew and Koc{\'\i}, Radek and Meyer, Bertrand and Walter, Bartosz and Zendulka, Jaroslav}, acronym = {{CEE-SET}'08}, booktitle = {{R}evised {S}elected {P}apars of the 3rd {IFIP} {TC2} {C}entral and {E}ast {E}uropean {C}onference on {S}oftware {E}ngineering {T}echniques ({CEE-SET}'08)}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin}, title = {{SMA}---The {S}myle Modeling Approach}, pages = {103-117}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-ceeset2008.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-ceeset2008.pdf}, doi = {10.1007/978-3-642-22386-0_8}, abstract = {This paper introduces the model-based software development methodology SMA---the Smyle Modeling Approach---which is centered around Smyle, a dedicated learning procedure to support engineers to interactively obtain design models from requirements, characterized as either being desired (positive) or unwanted (negative) system behavior. The learning approach is complemented by scenario patterns where the engineer can specify clearly desired or unwanted behavior. This~way, user interaction is reduced to the interesting scenarios limiting the design effort considerably. In~SMA, the learning phase is complemented by an effective analysis phase that allows for detecting design flaws at an early design stage. This paper describes the approach and reports on first practical experiences.} }
@article{JGL-jyg10, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Musings Around the Geometry of Interaction, and Coherence}, volume = 412, number = 20, pages = {1998-2014}, year = 2011, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf}, doi = {10.1016/j.tcs.2010.12.023}, abstract = {We introduce the Danos-R{\'e}gnier category \(\mathcal{DR}(M)\) of a linear inverse monoid~\(M\), as~a categorical description of geometries of interaction~(GOI) inspired from the weight algebra. The natural setting for GOI is that of a so-called weakly Cantorian linear inverse monoid, in which case \(\mathcal{DR}(M)\) is a kind of symmetrized version of the classical Abramsky-Haghverdi-Scott construction of a weak linear category from a GOI situation. It is well-known that GOI is perfectly suited to describe the multiplicative fragment of linear logic, and indeed \(\mathcal{DR}(M)\) will be a \(\star\)-autonomous category in this case. It is also well-known that the categorical interpretation of the other linear connectives conflicts with GOI interpretations. We make this precise, and show that \(\mathcal{DR}(M)\) has no terminal object, no cartesian product of any two objects, and no exponential---whatever \(M\)~is, unless \(M\)~is trivial. However, a form of coherence completion of \(\mathcal{DR}(M)\) \textit{{\`a} la} Hu-Joyal (which for additives resembles a layered approach \textit{{\`a} la} Hughes-van Glabbeek), provides a model of full classical linear logic, as soon as \(M\) is weakly Cantorian. One finally notes that Girard's notion of \emph{coherence} is pervasive, and instrumental in every aspect of this work.} }
@comment{{B-arxiv16, author = Bollig, Benedikt, affiliation = aff-LSVmexico, title = One-Counter Automata with Counter Visibility, institution = Computing Research Repository, number = 1602.05940, month = feb, nmonth = 2, year = 2016, type = RR, axeLSV = mexico, NOcontrat = "", url = http://arxiv.org/abs/1602.05940, PDF = "http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf", lsvdate-new = 20160222, lsvdate-upd = 20160222, lsvdate-pub = 20160222, lsv-category = "rapl", wwwpublic = "public and ccsb", note = 18~pages, abstract = "In a one-counter automaton (OCA), one can read a letter from some finite alphabet, increment and decrement the counter by one, or test it for zero. It is well-known that universality and language inclusion for OCAs are undecidable. We consider here OCAs with counter visibility: Whenever the automaton produces a letter, it outputs the current counter value along with~it. Hence, its language is now a set of words over an infinite alphabet. We show that universality and inclusion for that model are in PSPACE, thus no harder than the corresponding problems for finite automata, which can actually be considered as a special case. In fact, we show that OCAs with counter visibility are effectively determinizable and closed under all boolean operations. As~a~strict generalization, we subsequently extend our model by registers. The general nonemptiness problem being undecidable, we impose a bound on the number of register comparisons and show that the corresponding nonemptiness problem is NP-complete.", }}
This file was generated by bibtex2html 1.98.