@inproceedings{ltc-GardentPPS11,
  address = {Pozna\'n, Poland},
  month = nov,
  year = 2014,
  volume = {8387},
  series = {Lecture Notes in Artificial Intelligence},
  publisher = {Springer},
  editor = {Vetulani, Zygmunt and Mariani, Joseph},
  acronym = {{LTC}'11},
  booktitle = {{P}roceedings of the 5th {L}anguage {\&} {T}echnology
                  {C}onference ({LTC}'11)},
  author = {Gardent, Claire and Perrier, Guy and Parmentier, Yannick
                  and Schmitz, Sylvain},
  title = {Lexical Disambiguation in {LTAG} using Left Context},
  nopages = {},
  url = {http://hal.archives-ouvertes.fr/hal-00629902/},
  abstract = {In this paper, we present an automaton-based lexical
                  disambiguation process for Lexicalized Tree-Adjoining
                  Grammar (LTAG).  This process builds on previous work
                  of Bonfante \textit{et~al.}~(2004), and extends it by
                  computing a polarity-based abstraction, which
                  contains information about left context.  This
                  extension allows for a faster lexical disambiguation
                  by reducing the filtering automaton.}
}
@inproceedings{ABGGP-vstte13,
  address = {Atherton, California, USA},
  year = 2014,
  volume = 8164,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Cohen, Ernie and Rybalchenko, Andrey},
  acronym = {{VSTTE}'13},
  booktitle = {{R}evised {S}elected {P}apers of the
	   5th {IFIP} {TC2}\slash{WG2.3} {C}onference {V}erified
                  {S}oftware---{T}heories, {T}ools, and {E}xperiments
                  ({VSTTE}'13)},
  author = {Adj{\'e}, Assal{\'e} and Bouissou, Olivier and
                  Goubault{-}Larrecq, Jean and
                 Goubault, {\'E}ric and Putot, Sylvie},
  title = {Static Analysis of Programs with Imprecise Probabilistic Inputs},
  pages = {22-47},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGGP-vstte13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGGP-vstte13.pdf},
  doi = {10.1007/978-3-642-54108-7},
  abstract = {Having a precise yet sound abstraction of the inputs of
    numerical programs is important to analyze their behavior. For many
    programs, these inputs are probabilistic, but the actual distribution used
    is only partially known. We present a static analysis framework for
    reasoning about programs with inputs given as imprecise probabilities: we
    define a collecting semantics based on the notion of previsions and an
    abstract semantics based on an extension of Dempster-Shafer structures. We
    prove the correctness of our approach and show on some realistic examples
    the kind of invariants we are able to infer.}
}
@mastersthesis{m2-lefaucheux,
  author = {Lefaucheux, Engel},
  title = {D{\'e}tection de fautes dans les syst{\`e}mes probabilistes},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2014},
  month = sep,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lefaucheux.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lefaucheux.pdf},
  note = {35~pages}
}
@mastersthesis{m2-dubut,
  author = {Dubut, J{\'e}r{\'e}my},
  title = {{H}omologie dirig{\'e}e},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2014},
  month = sep,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-dubut.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-dubut.pdf},
  note = {35~pages}
}
@mastersthesis{m2-halfon,
  author = {Halfon, Simon},
  title = {Non Primitive Recursive Complexity Classes},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2014},
  month = sep,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-halfon.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-halfon.pdf},
  note = {21~pages}
}
@inproceedings{FFLRS-fsfma14,
  address = {Singapore},
  month = may,
  year = 2014,
  volume = 156,
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Lin, Shang{-}Wei and Petrucci, Laure},
  acronym = {{FSFMA}'14},
  booktitle = {{P}roceedings of the 2nd {F}rench-{S}ingaporean {W}orkshop
  	   on {F}ormal {M}ethods and {A}pplications ({FSFMA}'14)},
  author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and
                  Revol, Bertrand and Soulat, Romain},
  title = {Correct-by-design Control Synthesis for Multilevel
                  Converters using State Space Decomposition},
  pages = {5-16},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/FFLRS-fsfma14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FFLRS-fsfma14.pdf},
  doi = {10.4204/EPTCS.156.5},
  abstract = {High-power converters based on elementary switching cells are
    more and more used in the industry of power electronics owing to various
    advantages such as lower voltage stress and reduced power loss. However,
    the complexity of controlling such converters is a major challenge that
    the power manufacturing industry has to face with. The synthesis of
    industrial switching controllers relies today on heuristic rules and
    empiric simulation. The state of the system is not guaranteed to stay
    within the limits that are admissible for its correct electrical behavior.
    We show here how to apply a formal method in order to synthesize a
    correct-by-design control that guarantees that the power converter will
    always stay within a predefined safe zone of variations for its input
    parameters. The method is applied in order to synthesize a
    correct-by-design control for 5-level and 7-level power converters with a
    flying capacitor topology. We check the validity of our approach by
    numerical simulations for 5 and 7 levels. We also perform physical
    experimentations using a prototype built by SATIE laboratory for 5
    levels}
}
@misc{reachard-30,
  author = {Finkel, Alain},
  title = {REACHARD~-- Compte-rendu interm{\'e}diaire},
  month = feb,
  year = {2014},
  note = {18~pages},
  type = {Contract Report},
  howpublished = {Deliverable~D3 Reachard (ANR-11-BS02-001)}
}
@misc{cassting-D62,
  author = {Markey, Nicolas and Valette, Sophie},
  title = {Annual report for Year~1},
  howpublished = {Cassting deliverable~D6.2 (FP7-ICT-601148)},
  month = may,
  year = {2014},
  note = {38~pages},
  type = {Contract Report}
}
@misc{cassting-D31,
  author = {Markey, Nicolas and Brihaye, {\relax Th}omas and Larsen, Kim G.},
  title = {Robustness of collective adaptive systems},
  howpublished = {Cassting deliverable~D3.1 (FP7-ICT-601148)},
  month = mar,
  year = {2014},
  note = {17~pages},
  type = {Contract Report},
  url = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-31.pdf},
  pdf = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-31.pdf}
}
@misc{cassting-D24,
  author = {Markey, Nicolas and Chaturvedi, Namit and Geeraerts, Gilles
                  and Srba, Ji{\v{r}}{\'\i}},
  title = {Efficient strategy synthesis for complex objectives},
  howpublished = {Cassting deliverable~D2.4 (FP7-ICT-601148)},
  month = oct,
  year = {2014},
  note = {20~pages},
  type = {Contract Report},
  url = {http://www.cassting-project.eu/wp-content/uploads/2014/10/deliv-24.pdf},
  pdf = {http://www.cassting-project.eu/wp-content/uploads/2014/10/deliv-24.pdf}
}
@misc{cassting-D14,
  author = {Brihaye, {\relax Th}omas and Markey, Nicolas},
  title = {Solution concepts for collective adaptive systems},
  howpublished = {Cassting deliverable~D1.4 (FP7-ICT-601148)},
  month = mar,
  year = {2014},
  note = {13~pages},
  type = {Contract Report},
  url = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-14.pdf},
  pdf = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-14.pdf}
}
@article{BFCH-compj14,
  publisher = {Oxford University Press},
  journal = {The Computer Journal},
  author = {Beccuti, Marco and Franceschinis, Giuliana and
                  Codetta{-}Raiteri, Daniele and Haddad, Serge},
  title = {Computing Optimal Repair Strategies by Means of NdRFT
                  Modeling and Analysis},
  volume = 57,
  number = 12,
  month = dec,
  year = 2014,
  pages = {1870-1892},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFCH-compj14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFCH-compj14.pdf},
  doi = {10.1093/comjnl/bxt134},
  abstract = {In this paper, the \emph{Non-deterministic Repairable Fault
    Tree}~(NdRFT) formalism is proposed: it allows the modeling of failures of
    complex systems in addition to their repair processes. Its originality
    with respect to other Fault Tree extensions allows us to address repair
    strategy optimization problems: in an NdRFT model, the decision as to
    whether to start or not a given repair action is non-deterministic, so
    that all the possibilities are left open. The formalism is rather
    powerful, it allows: the specification of self-revealing events, the
    representation of components degradation, the choice among local repair,
    global repair, preventive maintenance, and the specification of the
    resources needed to start a repair action. The optimal repair strategy
    with respect to some relevant system state function, e.g. system
    unavailability, can then be computed by solving an optimization problem on
    a Markov Decision Process derived from the NdRFT. Such derivation is
    obtained by converting the NdRFT model into an intermediate formalism
    called Markov Decision Petri Net~(MDPN). In the paper, the NdRFT syntax
    and semantics are formally described, together with the conversion rules
    to derive from the NdRFT the corresponding MDPN model. The application of
    NdRFT is illustrated through examples.}
}
@article{GLS-tods14,
  publisher = {ACM Press},
  journal = {ACM Transactions on Database Systems},
  author = {Gheerbrant, Am{\'e}lie and Libkin, Leonid and Sirangelo, Cristina},
  title = {Na{\"\i}ve Evaluation of Queries over Incomplete Databases},
  volume = {39},
  number = {4:31},
  nopages = {},
  month = dec,
  year = {2014},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-tods14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-tods14.pdf},
  doi = {10.1145/2691190.2691194},
  abstract = {The term na{\"\i}ve evaluation refers to evaluating queries over
    incomplete databases as if nulls were usual data values, i.e., to using
    the standard database query evaluation engine. Since the semantics of
    query answering over incomplete databases is that of certain answers, we
    would like to know when na{\"\i}ve evaluation computes them: i.e., when
    certain answers can be found without inventing new specialized algorithms.
    For relational databases it is well known that unions of conjunctive
    queries possess this desirable property, and results on preservation of
    formulae under homomorphisms tell us that within relational calculus, this
    class cannot be extended under the open-world assumption.\par
    Our goal here is twofold. First, we develop a general framework that
    allows us to determine, for a given semantics of incompleteness, classes
    of queries for which na{\"\i}ve evaluation computes certain answers. Second,
    we apply this approach to a variety of semantics, showing that for many
    classes of queries beyond unions of conjunctive queries, na{\"\i}ve
    evaluation makes perfect sense under assumptions different from
    open-world. Our key observations are: (1)~na{\"\i}ve evaluation is equivalent
    to monotonicity of queries with respect to a semantics-induced ordering,
    and (2)~for most reasonable semantics of incompleteness, such monotonicity
    is captured by preservation under various types of homomorphisms. Using
    these results we find classes of queries for which na{\"\i}ve evaluation
    works, e.g., positive first-order formulae for the closed-world semantics.
    Even more, we introduce a general relation-based framework for defining
    semantics of incompleteness, show how it can be used to capture many known
    semantics and to introduce new ones, and describe classes of first-order
    queries for which na{\"\i}ve evaluation works under such semantics.}
}
@inproceedings{BC-ccs14,
  address = {Scottsdale, Arizona, USA},
  month = nov,
  year = 2014,
  publisher = {ACM Press},
  editor = {Ahn, Gail-Joon and Yung, Moti and Li, Ninghui},
  acronym = {{CCS}'14},
  booktitle = {{P}roceedings of the 21st {ACM} {C}onference
               on {C}omputer and {C}ommunications {S}ecurity
               ({CCS}'14)},
  author = {Bana, Gergei and Comon{-}Lundh, Hubert},
  title = {A~Computationally Complete Symbolic Attacker for
                  Equivalence Properties},
  pages = {609-620},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-ccs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-ccs14.pdf},
  doi = {10.1145/2660267.2660276},
  abstract = {We consider the problem of computational indistinguishability of
    protocols. We design a symbolic model, amenable to automated deduction,
    such that a successful inconsistency proof implies computational
    indistinguishability. Conversely, symbolic models of distinguishability
    provide clues for likely computational attacks. We follow the idea we
    introduced earlier for reachability properties, axiomatizing what an
    attacker cannot violate. This results a computationally complete symbolic
    attacker, and ensures unconditional computational soundness for the
    symbolic analysis. We present a small library of computationally sound,
    modular axioms, and test our technique on an example protocol. Despite
    additional difficulties stemming from the equivalence properties, the
    models and the soundness proofs turn out to be simpler than they were for
    reachability properties.}
}
@phdthesis{ponce-phd2014,
  author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n},
  title = {Testing Concurrent Systems Through Event Structures},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = 2014,
  month = nov,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ponce-phd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ponce-phd14.pdf}
}
@phdthesis{barbot-phd2014,
  author = {Barbot, Beno{\^\i}t},
  title = {Acceleration for Statistical Model Checking},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = 2014,
  month = nov,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/barbot-phd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/barbot-phd14.pdf}
}
@phdthesis{sirangelo-HDR14,
  author = {Sirangelo, Cristina},
  title = {Representing and querying incomplete information: a~data
                  interoperability perspective},
  year = 2014,
  month = dec,
  type = {M{\'e}moire d'habilitation},
  school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-CS14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-CS14.pdf}
}
@article{LLV-tcs14,
  publisher = {Elsevier Science Publishers},
  journal = {Theoretical Computer Science},
  author = {Lange, Martin and Lozes, {\'E}tienne and Vargas{ }Guzm{\'a}n,
                  Manuel},
  title = {Model-checking process equivalences},
  volume = {560},
  number = {3},
  year = {2014},
  month = dec,
  pages = {326-347},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LLV-tcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LLV-tcs14.pdf},
  doi = {10.1016/j.tcs.2014.08.020},
  abstract = {Process equivalences are formal methods that relate programs and
    systems which, informally, behave in the same way. Since there is no
    unique notion of what it means for two dynamic systems to display the same
    behaviour there are a multitude of formal process equivalences, ranging
    from bisimulation to trace equivalence, categorised in the linear-time
    branching-time spectrum.\par
    We present a logical framework based on an expressive modal fixpoint logic
    which is capable of defining many process equivalence relations: for each
    such equivalence there is a fixed formula which is satisfied by a pair of
    processes if and only if they are equivalent with respect to this
    relation.\par
    We explain how to do model checking for this logic in EXPTIME. This allows
    model checking technology to be used for process equivalence checking. We
    introduce two fragments of the logic for which it is possible to do
    model-checking in PTIME and PSPACE respectively, and show that the
    formulas that define the process equivalences we consider are in one of
    these fragments. This yields a generic proof technique for establishing
    the complexities of these process equivalences.\par
    Finally, we show how partial evaluation can be used to obtain decision
    procedures for process equivalences from the generic model checking
    scheme.}
}
@article{BHLM-lmcs14,
  journal = {Logical Methods in Computer Science},
  author = {Bollig, Benedikt and Habermehl, Peter and Leucker, Martin
                    and Monmege, Benjamin},
  title = {A~Robust Class of Data Languages and an Application to Learning},
  year = {2014},
  month = dec,
  volume = 10,
  number = {4:19},
  nopages = {},
  url = {http://arxiv.org/abs/1411.6646},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHLM-lmcs14.pdf},
  doi = {10.2168/LMCS-10(4:19)2014},
  abstract = {We~introduce session automata, an automata model to process data
    words, i.e., words over an infinite alphabet. Session automata support the
    notion of fresh data values, which are well suited for modeling protocols
    in which sessions using fresh values are of major interest, like in
    security protocols or ad-hoc networks. Session automata have an
    expressiveness partly extending, partly reducing that of classical
    register automata. We~show that, unlike register automata and their
    various extensions, session automata are robust: They (i)~are closed under
    intersection, union, and (resource-sensitive) complementation, (ii)~admit
    a symbolic regular representation, (iii)~have a decidable inclusion
    problem (unlike register automata), and (iv)~enjoy logical
    characterizations. Using these results, we establish a learning algorithm
    to infer session automata through membership and equivalence queries.}
}
@article{HSS-lmcs14,
  journal = {Logical Methods in Computer Science},
  author = {Haase, Christoph and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe},
  title = {The Power of Priority Channel Systems},
  year = {2014},
  month = dec,
  volume = 10,
  number = {4:4},
  nopages = {},
  url = {http://arxiv.org/abs/1301.5500},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HSS-lmcs14.pdf},
  doi = {10.2168/LMCS-10(4:4)2014},
  abstract = {We introduce Priority Channel Systems, a new class of channel
    systems where messages carry a numeric priority and where higher-priority
    messages can supersede lower-priority messages preceding them in the fifo
    communication buffers. The decidability of safety and inevitability
    properties is shown via the introduction of a priority embedding, a
    well-quasi-ordering that has not previously been used in well-structured
    systems. We then show how Priority Channel Systems can compute
    Fast-Growing functions and prove that the aforementioned verification
    problems are \(\mathbf{F}_{\epsilon_{0}}\)-complete.}
}
@inproceedings{DSS-pods14,
  address = {Snowbird, Utah, USA},
  month = jun,
  year = 2014,
  publisher = {ACM Press},
  editor = {Hull, Richard and Grohe, Martin},
  acronym = {{PODS}'14},
  booktitle = {{P}roceedings of the 33rd {A}nnual 
	  {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium 
	  on {P}rinciples of {D}atabase {S}ystems
	  ({PODS}'14)},
  author = {Durand, Arnaud and Schweikardt, Nicole and Segoufin, Luc},
  title = {Enumerating answers to first-order queries over databases of low degree},
  pages = {121-131},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DSS-pods14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DSS-pods14.pdf},
  doi = {10.1145/2594538.2594539},
  abstract = {A~class of relational databases has low degree if for
    all~\(\delta\), all but finitely many databases in the class have degree
    at most~\(n^{\delta}\), where \(n\) is the size of the database. Typical
    examples are databases of bounded degree or of degree bounded by
    \(\textrm{log} n\).\par
    It is known that over a class of databases having low degree, first-order
    boolean queries can be checked in pseudo-linear time, i.e. in time bounded
    by \(n^{1+\epsilon}\), for all~\(\epsilon\). We~generalise this result by
    considering query evaluation.\par
    We show that counting the number of answers to a query can be done in
    pseudo-linear time and that enumerating the answers to a query can be done
    with constant delay after a pseudo-linear time preprocessing.}
}
@inproceedings{segoufin-stacs14,
  address = {Lyon, France},
  month = mar,
  year = 2014,
  volume = 25,
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Mayr, Ernst W. and Portier, Natacha},
  acronym = {{STACS}'14},
  booktitle = {{P}roceedings of the 31st {A}nnual
               {S}ymposium on {T}heoretical {A}spects of
               {C}omputer {S}cience
               ({STACS}'14)},
  author = {Segoufin, Luc},
  title = {A~glimpse on constant delay enumeration},
  pages = {13-27},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/segoufin-stacs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/segoufin-stacs14.pdf},
  doi = {10.4230/LIPIcs.STACS.2014.13},
  abstract = {We survey some of the recent results about enumerating the
    answers to queries over a database. We focus on the case where the
    enumeration is performed with a constant delay between any two consecutive
    solutions, after a linear time preprocessing. This cannot be always
    achieved. It requires restricting either the class of queries or the class
    of databases. We describe here several scenarios when this is possible.}
}
@inproceedings{ADV-icdt14,
  address = {Athens, Greece},
  month = mar,
  year = 2014,
  editor = {Schweikardt, Nicole and Christophides, Vassilis and Leroy, Vincent},
  acronym = {{ICDT}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on
                  {D}atabase {T}heory ({ICDT}'14)},
  author = {Abiteboul, Serge and Deutch, Daniel and Vianu, Victor},
  title = {Deduction with Contradictions in Datalog},
  pages = {143-154},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ADV-icdt14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ADV-icdt14.pdf},
  doi = {10.5441/002/icdt.2014.17},
  abstract = {We study deduction in the presence of inconsistencies. Following
    previous works, we capture deduction via datalog programs and
    inconsistencies through violations of functional dependencies (FDs). We
    study and compare two semantics for datalog with FDs: the first, of a
    logical nature, is based on inferring facts one at a time, while never
    violating the FDs; the second, of an operational nature, consists in a
    fixpoint computation in which maximal sets of facts consistent with the
    FDs are inferred at each stage.\par
    Both semantics are nondeterministic, yielding sets of possible worlds. We
    introduce a PTIME (in the size of the extensional data) algorithm, that
    given a datalog program, a set of FDs and an input instance, produces a
    c-table representation of the set of possible worlds. Then, we propose to
    quantify nondeterminism with probabilities, by means of a probabilistic
    semantics. We consider the problem of capturing possible worlds along with
    their probabilities via probabilistic c-tables.\par
    We then study classical computational problems in this novel context. We
    consider the problems of computing the probabilities of answers, of
    identifying most likely supports for answers, and of determining the
    extensional facts that are most influential for deriving a particular
    fact. We show that the interplay of recursion and FDs leads to novel
    technical challenges in the context of these problems.}
}
@inproceedings{JLMX-mfps30,
  address = {Ithaca, New~York, USA},
  month = jun,
  year = 2014,
  volume = 308,
  series = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier Science Publishers},
  editor = {Jacobs, Bart and Silva, Alexandra and Staton, Sam},
  acronym = {{MFPS}'14},
  booktitle = {{P}roceedings of the 30th {C}onference on 
	{M}athematical {F}oundations of {P}rogramming 
	{S}emantics ({MFPS}'14)},
  author = {Jaziri, Samy and Larsen, Kim G. and Mardare, Radu and Xue, Bingtian},
  title = {Adequacy and Complete Axiomatization for Timed Modal Logic},
  pages = {183-210},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/JLMX-mfps14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JLMX-mfps14.pdf},
  doi = {10.1016/j.entcs.2014.10.011},
  abstract = {In this paper we develop the metatheory for Timed Modal
    Logic~(TML), which is the modal logic used for the analysis of timed
    transition systems~(TTSs). We solve a series of long-standing open
    problems related to~TML. Firstly, we prove that TML enjoys the
    Hennessy-Milner property and solve one of the open questions in the field.
    Secondly, we prove that the set of validities are not recursively
    enumerable. Nevertheless, we develop a strongly-complete proof system
    for~TML. Since the logic is not compact, the proof system contains
    infinitary rules, but only with countable sets of instances. Thus, we~can
    involve topological results regarding Stone spaces, such as the
    Rasiowa-Sikorski lemma, to complete the proofs.}
}
@inproceedings{GLJ-mfps30,
  address = {Ithaca, New~York, USA},
  month = jun,
  year = 2014,
  volume = 308,
  series = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier Science Publishers},
  editor = {Jacobs, Bart and Silva, Alexandra and Staton, Sam},
  acronym = {{MFPS}'14},
  booktitle = {{P}roceedings of the 30th {C}onference on 
	{M}athematical {F}oundations of {P}rogramming 
	{S}emantics ({MFPS}'14)},
  author = {Goubault{-}Larrecq, Jean and Jung, Achim},
  title = {{QRB}, {QFS}, and the Probabilistic Powerdomain},
  pages = {167-182},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-mfps14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-mfps14.pdf},
  doi = {10.1016/j.entcs.2014.10.010},
  abstract = {We show that the first author's QRB-domains coincide with Li and
    Xu's QFS-domains, and also with Lawson-compact quasi-continuous dcpos,
    with stably-compact locally finitary compact spaces, with sober
    QFS-spaces, and with sober QRB-spaces. The first three coincidences were
    discovered independently by Lawson and~Xi. The equivalence with sober
    QFS-spaces is then applied to give a novel, direct proof that the
    probabilistic powerdomain of a QRB-domain is a QRB-domain. This improves
    upon a previous, similar result, which was limited to pointed,
    second-countable QRB-domains.}
}
@inproceedings{AG-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {Aiswarya, C. and Gastin, Paul},
  title = {Reasoning about distributed systems: {WYSIWYG}},
  pages = {11-30},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/AG-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AG-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.11},
  abstract = {There are two schools of thought on reasoning about distributed
    systems: one~following interleaving based semantics, and one following
    partial-order{{\slash}}graph based semantics. This paper compares these two
    approaches and argues in favour of the latter. An~introductory treatment
    of the split-width technique is also provided.}
}
@article{BFHP-fi14,
  publisher = {{IOS} Press},
  journal = {Fundamenta Informaticae},
  author = {Bernardinello, Luca and Ferigato, Carlo and
  	 	     Haar, Stefan and Pomello, Lucia},
  title = {Closed Sets in Occurrence Nets with Conflicts},
  volume = 133,
  number = 4,
  year = 2014,
  pages = {323-344},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHP-fi14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHP-fi14.pdf},
  doi = {10.3233/FI-2014-1079},
  abstract = {The semantics of concurrent processes can be defined in terms of
    partially ordered sets. Occurrence nets, which belong to the family of
    Petri nets, model concurrent processes as partially ordered sets of
    occurrences of local states and local events. On the basis of the
    associated concurrency relation, a closure operator can be defined, giving
    rise to a lattice of closed sets. Extending previous results along this
    line, the present paper studies occurrence nets with forward conflicts,
    modelling families of processes. It is shown that the lattice of closed
    sets is orthomodular, and the relations between closed sets and some
    particular substructures of an occurrence net are studied. In particular,
    the paper deals with runs, modelling concurrent histories, and trails,
    corresponding to possible histories of sequential components. A~second
    closure operator is then defined by means of an iterative procedure.
    The~corresponding closed sets, here called 'dynamically closed', are shown
    to form a complete lattice, which in general is not orthocomplemented.
    Finally, it is shown that, if an occurrence net satisfies a property
    called B-density, which essentially says that any antichain meets any
    trail, then the two notions of closed set coincide, and they form a
    complete, algebraic orthomodular lattice.}
}
@inproceedings{BHL-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {Bertrand, Nathalie and Haddad, Serge and Lefaucheux, Engel},
  title = {Foundation of Diagnosis and Predictability in Probabilistic
                  Systems},
  pages = {417-429},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.417},
  abstract = {In discrete event systems prone to unobservable faults, a
    diagnoser must eventually detect fault occurrences. The diagnosability
    problem consists in deciding whether such a diagnoser exists. Here we
    investigate diagnosis for probabilistic systems modelled by partially
    observed Markov chains also called probabilistic labeled transition
    systems (pLTS). First we study different specifications of diagnosability
    and establish their relations both in finite and infinite pLTS. Then we
    analyze the complexity of the diagnosability problem for finite pLTS: we
    show that the polynomial time procedure earlier proposed is erroneous and
    that in fact for all considered specifications, the problem is
    PSPACE-complete. We also establish tight bounds for the size of
    diagnosers. Afterwards we consider the dual notion of predictability which
    consists in predicting that in a safe run, a fault will eventually occur.
    Predictability is an easier problem than diagnosability: it is
    NLOGSPACE-complete. Yet the predictor synthesis is as hard as the
    diagnoser synthesis. Finally we introduce and study the more flexible
    notion of prediagnosability that generalizes predictability and
    diagnosability.}
}
@inproceedings{BGK-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {Bollig, Benedikt and Gastin, Paul and Kumar, Akshay},
  title = {Parameterized Communicating Automata: Complementation and
                  Model Checking},
  pages = {625-637},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGK-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGK-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.625},
  abstract = {We study the language-theoretical aspects of parameterized
    communicating automata (PCAs), in which processes communicate via
    rendez-vous. A given PCA can be run on any topology of bounded degree such
    as pipelines, rings, ranked trees, and grids. We show that, under a
    context bound, which restricts the local behavior of each process, PCAs
    are effectively complementable. Complementability is considered a key
    aspect of robust automata models and can, in particular, be exploited for
    verification. In this paper, we use it to obtain a characterization of
    context-bounded PCAs in terms of monadic second-order (MSO) logic. As the
    emptiness problem for context-bounded PCAs is decidable for the classes of
    pipelines, rings, and trees, their model-checking problem wrt. MSO
    properties also becomes decidable. While previous work on model checking
    parameterized systems typically uses temporal logics without next
    operator, our MSO logic allows one to express several natural next
    modalities.}
}
@inproceedings{CMS-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {Chadha, Rohit and Mathur, Umang and Schwoon, Stefan},
  title = {Computing Information Flow Using Symbolic Model-Checking},
  pages = {505-516},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CMS-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CMS-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.505},
  abstract = {Several measures have been proposed in literature for
    quantifying the information leaked by the public outputs of a program with
    secret inputs. We consider the problem of computing information leaked by
    a deterministic or probabilistic program when the measure of information
    is based on (a)~min-entropy and (b)~Shannon entropy. The key challenge in
    computing these measures is that we need the total number of possible
    outputs and, for each possible output, the number of inputs that lead to
    it. A direct computation of these quantities is infeasible because of the
    state-explosion problem. We therefore propose symbolic algorithms based on
    binary decision diagrams (BDDs). The advantage of our approach is that
    these symbolic algorithms can be easily implemented in any BDD-based
    model-checking tool that checks for reachability in deterministic
    non-recursive programs by computing program summaries. We demonstrate the
    validity of our approach by implementing these algorithms in a tool
    Moped-QLeak, which is built upon Moped, a model checker for Boolean
    programs. Finally, we show how this symbolic approach extends to
    probabilistic programs.}
}
@inproceedings{DFM-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {David, Claire and Francis, Nadime and Murlak, Filip},
  title = {Consistency of injective tree patterns},
  pages = {279-290},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DFM-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DFM-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.279},
  abstract = {Testing if an incomplete description of an XML document is
    consistent, that is, if it describes a real document conforming to the
    imposed schema, amounts to deciding if a given tree pattern can be matched
    injectively into a tree accepted by a fixed automaton. This problem can be
    solved in polynomial time for patterns that use the child relation and the
    sibling order, but do not use the descendant relation. For general
    patterns the problem is in NP, but no lower bound has been known so far.
    We show that the problem is NP-complete already for patterns using only
    child and descendant relations. The source of hardness turns out to be the
    interplay between these relations: for patterns using only descendant we
    give a polynomial algorithm. We also show that the algorithm can be
    adapted to patterns using descendant and following-sibling, but combining
    descendant and next-sibling leads to intractability.}
}
@inproceedings{DJLMS-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {Doyen, Laurent and Juhl, Line and Larsen, Kim G. and
                  Markey, Nicolas and Shirmohammadi, Mahsa},
  title = {Synchronizing words for weighted and timed automata},
  pages = {121-132},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DJLMS-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DJLMS-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.121},
  abstract = {The problem of synchronizing automata is concerned with the
    existence of a word that sends all states of the automaton to one and the
    same state. This problem has classically been studied for complete
    deterministic finite automata, with the existence problem being
    NLOGSPACE-complete.\par
    In this paper we consider synchronizing-word problems for weighted and
    timed automata. We consider the synchronization problem in several
    variants and combinations of these, including deterministic and
    non-deterministic timed and weighted automata, synchronization to unique
    location with possibly different clock valuations or accumulated weights,
    as well as synchronization with a safety condition forbidding the
    automaton to visit states outside a safety-set during synchronization
    (e.g. energy constraints). For deterministic weighted automata, the
    synchronization problem is proven PSPACE-complete under energy
    constraints, and in 3-EXPSPACE under general safety constraints. For timed
    automata the synchronization problems are shown to be PSPACE-complete in
    the deterministic case, and undecidable in the non-deterministic case.}
}
@inproceedings{BMS-fsttcs14,
  address = {New~Dehli, India},
  month = dec,
  year = 2014,
  volume = {29},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Raman, Venkatesh and Suresh, S.~P.},
  acronym = {{FSTTCS}'14},
  booktitle = {{P}roceedings of the 34th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'14)},
  author = {Bouyer, Patricia and Markey, Nicolas and Stan, Daniel},
  title = {Mixed {N}ash Equilibria in Concurrent Games},
  pages = {351-363},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-fsttcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-fsttcs14.pdf},
  doi = {10.4230/LIPIcs.FSTTCS.2014.351},
  abstract = {We study mixed-strategy Nash equilibria in multiplayer
    deterministic concurrent games played on graphs, with terminal-reward
    payoffs (that is, absorbing states with a value for each player). We show
    undecidability of the existence of a constrained Nash equilibrium (the
    constraint requiring that one player should have maximal payoff), with
    only three players and 0/1-rewards (i.e., reachability objectives). This
    has to be compared with the undecidability result by Ummels and Wojtczak
    for turn-based games which requires 14 players and general rewards. Our
    proof has various interesting consequences: (i)~the~undecidability of the
    existence of a Nash equilibrium with a constraint on the social welfare;
    (ii)~the~undecidability of the existence of an (unconstrained) Nash
    equilibrium in concurrent games with terminal-reward payoffs.}
}
@article{BBBMBGJ-lmcs14,
  journal = {Logical Methods in Computer Science},
  author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye,
                    {\relax Th}omas and Menet, Quentin and Baier, Christel and
                    Gr{\"o}{\ss}er, Marcus and Jurdzi{\'n}ski, Marcin},
  title = {Stochastic Timed Automata},
  volume = 10,
  number = {4:6},
  nopages = {},
  month = dec,
  year = 2014,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBMBGJ-mfcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBMBGJ-mfcs14.pdf},
  doi = {10.2168/LMCS-10(4:6)2014},
  abstract = {A~stochastic timed automaton is a purely stochastic process
    defined on a timed automaton, in which both delays and discrete choices
    are made randomly. We study the almost-sure model-checking problem for
    this model, that is, given a stochastic timed automaton~\(\mathcal{A}\)
    and a property~\(\varphi\), we want to decide whether \(\mathcal{A}\)
    satisfies~\(\varphi\) with probability~\(1\). In this paper, we identify
    several classes of automata and of properties for which this can be
    decided. The proof relies on the construction of a finite abstraction,
    called the thick graph, that we interpret as a finite Markov chain, and
    for which we can decide the almost-sure model-checking problem.
    Correctness of the abstraction holds when automata are almost-surely fair,
    which we show, is the case for two large classes of systems, single-clock
    automata and so-called weak-reactive automata. Techniques employed in this
    article gather tools from real-time verification and probabilistic
    verification, as well as topological games played on timed automata.}
}
@article{BCGZ-jal14,
  publisher = {Elsevier Science Publishers},
  journal = {Journal of Applied Logic},
  author = {Bollig, Benedikt and Cyriac, Aiswarya and Gastin, Paul and
                  Zeitoun, Marc},
  title = {Temporal logics for concurrent recursive programs:
                  Satisfiability and model checking},
  volume = 12,
  number = 4,
  pages = {395-416},
  month = dec,
  year = 2014,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGZ-jal14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGZ-jal14.pdf},
  doi = {10.1016/j.jal.2014.05.001},
  abstract = {We develop a general framework for the design of temporal logics
    for concurrent recursive programs. A program execution is modeled as a
    partial order with multiple nesting relations. To specify properties of
    executions, we consider any temporal logic whose modalities are definable
    in monadic second-order logic and which, in addition, allows PDL-like path
    expressions. This captures, in a unifying framework, a wide range of
    logics defined for ranked and unranked trees, nested words, and
    Mazurkiewicz traces that have been studied separately. We show that
    satisfiability and model checking are decidable in EXPTIME and 2EXPTIME,
    depending on the precise path modalities.}
}
@proceedings{KHY-topnoc2014,
  editor = {Koutny, Maciej and Haddad, Serge and Yakovlev, Alex},
  title = {Transactions on {P}etri Nets and Other Models of Concurrency~{IX}},
  booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{IX}},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = 8910,
  year = {2014},
  noaddress = {},
  url = {http://www.springer.com/978-3-662-45729-0}
}
@incollection{topnoc14-CH,
  year = 2014,
  volume = {8910},
  series = {Lecture Notes in Computer Science},
  editor = {Koutny, Maciej and Haddad, Serge and Yakovlev, Alex},
  publisher = {Springer},
  booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{IX}},
  author = {Chatain, {\relax Th}omas and Haar, Stefan},
  title = {A Canonical Contraction for Safe {P}etri Nets},
  pages = {83-98},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc14-CH.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc14-CH.pdf},
  doi = {10.1007/978-3-662-45730-6_5},
  abstract = {Under maximal semantics, the occurrence of an event~\(a\) in a
    concurrent run of an occurrence net may imply the occurrence of other
    events, not causally related to~\(a\), in the same run. In recent works,
    we have formalized this phenomenon as the reveals relation, and used it to
    obtain a contraction of sets of events called facets in the context of
    occurrence nets. Here, we extend this idea to propose a canonical
    contraction of general safe Petri nets into pieces of partial-order
    behaviour which can be seen as {"}macro-transitions{"} since all their
    events must occur together in maximal semantics. On occurrence nets, our
    construction coincides with the facets abstraction. Our contraction
    preserves the maximal semantics in the sense that the maximal processes of
    the contracted net are in bijection with those of the original net.}
}
@inproceedings{CHJPS-cmsb14,
  address = {Manchester, UK},
  month = nov,
  year = 2014,
  volume = {8859},
  series = {Lecture Notes in Bioinformatics},
  publisher = {Springer-Verlag},
  editor = {Mendes, Pedro},
  acronym = {{CMSB}'14},
  booktitle = {{P}roceedings of the 12th
           {C}onference on
           {C}omputational {M}ethods in {S}ystem {B}iology
	   ({CMSB}'14)},
  author = {Chatain, {\relax Th}omas and Haar, Stefan and Jezequel,
                  Lo{\"\i}g and Paulev{\'e}, Lo{\"\i}c and Schwoon, Stefan},
  title = {Characterization of Reachable Attractors Using {P}etri Net
                  Unfoldings},
  pages = {129-142},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CHJPS-cmsb14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CHJPS-cmsb14.pdf},
  doi = {10.1007/978-3-319-12982-2_10},
  abstract = {Attractors of network dynamics represent the long-term
    behaviours of the modelled system. Their characterization is therefore
    crucial for understanding the response and differentiation capabilities of
    a dynamical system. In the scope of qualitative models of interaction
    networks, the computation of attractors reachable from a given state of
    the network faces combinatorial issues due to the state space explosion.
    In this paper, we present a new algorithm that exploits the concurrency
    between transitions of parallel acting components in order to reduce the
    search space. The algorithm relies on Petri net unfoldings that can be
    used to compute a compact representation of the dynamics. We illustrate
    the applicability of the algorithm with Petri net models of cell
    signalling and regulation networks, Boolean and multi-valued. The proposed
    approach aims at being complementary to existing methods for deriving the
    attractors of Boolean models, while being generic since they apply to any
    safe Petri net.}
}
@inproceedings{BHHP-simul14,
  address = {Nice, France},
  month = oct,
  year = 2014,
  publisher = {XPS},
  editor = {Arisha, Amr and Bobashev, Georgiy},
  acronym = {{SIMUL}'14},
  booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {A}dvances in
                  {S}ystem {S}imulation ({SIMUL}'14)},
  author = {Barbot, Beno{\^\i}t and Haddad, Serge and Heiner, Monika
                    and Picaronny, Claudine},
  title = {Rare Event Handling in Signalling Cascades},
  pages = {126-131},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHP-simul14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHP-simul14.pdf},
  abstract = {Signalling cascades are a recurrent pattern of biological
    regulatory systems whose analysis has deserved a lot of attention. It has
    been shown that stochastic Petri nets are appropriate to model such
    systems and evaluate the probabilities of specific properties. Such an
    evaluation can be done numerically when the combinatorial state space
    explosion is manageable or statistically otherwise. However, when the
    probabilities to be evaluated are too small, random simulation requires
    more sophisticated techniques for the handling of rare events. In this
    paper, we show how such involved methods can be successfully applied for
    signalling cascades. More precisely, we study three relevant properties of
    a signalling cascade with the help of the Cosmos tool. Our experiments
    point out interesting dependencies between quantitative parameters of the
    regulatory system and its transient behaviour. In addition, they
    demonstrate that we can go beyond the capabilities of Marcie which
    provides one of the most efficient numerical solvers.}
}
@inproceedings{DDS-rp14,
  address = {Oxford, UK},
  month = sep,
  year = 2014,
  volume = {8762},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James},
  acronym = {{RP}'14},
  booktitle = {{P}roceedings of the 8th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)},
  author = {Demri, St{\'e}phane and Dhar, Amit Kumar and Sangnier, Arnaud},
  title = {Equivalence Between Model-Checking Flat Counter Systems and
  	          {P}resburger Arithmetic},
  pages = {85-97},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-rp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-rp14.pdf},
  doi = {10.1007/978-3-319-11439-2_7},
  abstract = {We show that model-checking flat counter systems over
    CTL\textsuperscript{*} (with arithmetical constraints on counter values)
    has the same complexity as the satisfiability problem for Presburger
    arithmetic. The lower bound already holds with the temporal operator EF
    only, no~arithmetical constraints in the logical language and with guards
    on transitions made of simple linear constraints. This complements our
    understanding of model-checking flat counter systems with linear-time
    temporal logics, such as LTL for which the problem is already known to be
    (only) NP-complete with guards restricted to the linear fragment.}
}
@proceedings{DKW-ijcar2014,
  editor = {Demri, St{\'e}phane and Kapur, Deepak and Weidenbach, Christoph},
  title = {{P}roceedings of the 7th
                   {I}nternational {J}oint {C}onference on {A}utomated {R}easoning
                   ({IJCAR}'14)},
  booktitle = {{P}roceedings of the 7th
               	   {I}nternational {J}oint {C}onference on {A}utomated {R}easoning
               	   ({IJCAR}'14)},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = 8562,
  year = {2014},
  month = jul,
  address = {Vienna, Austria},
  url = {http://www.springer.com/978-3-319-08586-9}
}
@article{CD-interstices14,
  publisher = {INRIA},
  journal = {Interstices},
  author = {Chr{\'e}tien, R{\'e}my and Delaune, St{\'e}phanie},
  title = {Le~bitcoin, une monnaie \(100\%\) num{\'e}rique},
  month = sep,
  year = {2014},
  url = {https://interstices.info/jcms/ni_78681/le-bitcoin-une-monnaie-100-numerique},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-interstices14.pdf}
}
@inproceedings{CDR-tgc14,
  address = {Rome, Italy},
  month = dec,
  year = 2014,
  volume = {8902},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Maffei, Matteo and Tuosto, Emilio},
  acronym = {{TGC}'14},
  booktitle = {{R}evised {S}elected {P}apers of the 9th {S}ymposium on {T}rustworthy {G}lobal 
	   {C}omputing ({TGC}'14)},
  author = {Cheval, Vincent and Delaune, St{\'e}phanie and Ryan, Mark
                  D.},
  title = {Tests for establishing security properties},
  pages = {82-96},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDR-tgc14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDR-tgc14.pdf},
  doi = {10.1007/978-3-662-45917-1_6},
  abstract = {Ensuring strong security properties in some cases requires
    participants to carry out tests during the execution of a protocol.
    A~classical example is electronic voting: participants are required to
    verify the presence of their ballots on a bulletin board, and to verify
    the computation of the election outcome. The notion of certificate
    transparency is another example, in which participants in the protocol are
    required to perform tests to verify the integrity of a certificate log.\par
    We present a framework for modelling systems with such `testable
    properties', using the applied pi calculus. We model the tests that are
    made by participants in order to obtain the security properties.
    Underlying our work is an attacker model called {"}malicious but cautious{"},
    which lies in between the Dolev-Yao model and the {"}honest but curious{"}
    model. The malicious-but-cautious model is appropriate for cloud computing
    providers that are potentially malicious but are assumed to be cautious
    about launching attacks that might cause user tests to fail.}
}
@inproceedings{schmitz-rp14,
  address = {Oxford, UK},
  month = sep,
  year = 2014,
  volume = {8762},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James},
  acronym = {{RP}'14},
  booktitle = {{P}roceedings of the 8th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)},
  author = {Schmitz, Sylvain},
  title = {Complexity Bounds for Ordinal-Based Termination},
  pages = {1-19},
  url = {http://arxiv.org/abs/1407.5896},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/schmitz-rp14.pdf},
  doi = {10.1007/978-3-319-11439-2_1},
  abstract = {`What more than its truth do we know if we have a proof of a
    theorem in a given formal system?' We examine Kreisel's question in the
    particular context of program termination proofs, with an eye to deriving
    complexity bounds on program running times.\par
    Our main tool for this are length function theorems, which provide
    complexity bounds on the use of well quasi orders. We illustrate how to
    prove such theorems in the simple yet until now untreated case of
    ordinals. We show how to apply this new theorem to derive complexity
    bounds on programs when they are proven to terminate thanks to a ranking
    function into some ordinal.}
}
@inproceedings{GLS-pp14,
  year = 2014,
  volume = 8464,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {van Breugel, Franck and Kashefi, Elham and Palamidessi,
                  Catuscia and Rutten, Jan},
  booktitle = {Horizons of the Mind. A~Tribute to Prakash Panangaden},
  author = {Goubault{-}Larrecq, Jean and Segala, Roberto},
  title = {Random Measurable Selections},
  pages = {343-362},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pp14.pdf},
  doi = {10.1007/978-3-319-06880-0_18},
  abstract = {We make the first steps towards showing a general {"}randomness
    for free{"} theorem for stochastic automata. The goal of such theorems is
    to replace randomized schedulers by averages of pure schedulers. Here, we
    explore the case of measurable multifunctions and their measurable
    selections. This involves constructing probability measures on the
    measurable space of measurable selections of a given measurable
    multifunction, which seems to be a fairly novel problem. We then extend
    this to the case of IT automata, namely, non-deterministic (infinite)
    automata with a history-dependent transition relation. Throughout, we
    strive to make our assumptions minimal.}
}
@inproceedings{BGS-rp14,
  address = {Oxford, UK},
  month = sep,
  year = 2014,
  volume = {8762},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James},
  acronym = {{RP}'14},
  booktitle = {{P}roceedings of the 8th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)},
  author = {Bollig, Benedikt and Gastin, Paul and Schubert, Jana},
  title = {Parameterized Verification of Communicating Automata under Context Bounds},
  pages = {45-57},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-rp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-rp14.pdf},
  doi = {10.1007/978-3-319-11439-2_4},
  abstract = {We study the verification problem for parameterized
    communicating automata~(PCA), in which processes synchronize via message
    passing. A~given PCA can be run on any topology of bounded degree (such as
    pipelines, rings, or ranked trees), and communication may take place
    between any two processes that are adjacent in the topology. Parameterized
    verification asks if there is a topology from a given topology class that
    allows for an accepting run of the given PCA. In general, this problem is
    undecidable even for synchronous communication and simple pipeline
    topologies. We therefore consider context-bounded verification, which
    restricts the behavior of each single process. For several variants of
    context bounds, we show that parameterized verification over pipelines,
    rings, and ranked trees is decidable. Our approach is automata-theoretic
    and uniform. We introduce a notion of graph acceptor that identifies those
    topologies allowing for an accepting run. Depending on the given topology
    class, the topology acceptor can then be restricted, or adjusted, so that
    the verification problem reduces to checking emptiness of finite automata
    or tree automata.}
}
@inproceedings{HM-rp14,
  address = {Oxford, UK},
  month = sep,
  year = 2014,
  volume = {8762},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James},
  acronym = {{RP}'14},
  booktitle = {{P}roceedings of the 8th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)},
  author = {Haddad, Serge and Monmege, Benjamin},
  title = {Reachability in {MDP}s: Refining Convergence of Value Iteration},
  pages = {125-137},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-07.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-07.pdf},
  doi = {10.1007/978-3-319-11439-2_10},
  abstract = {Markov Decision Processes (MDP) are a widely used model
    including both non-deterministic and probabilistic choices. Minimal and
    maximal probabilities to reach a target set of states, with respect to a
    policy resolving non-determinism, may be computed by several methods
    including value iteration. This algorithm, easy to implement and efficient
    in terms of space complexity, consists in iteratively finding the
    probabilities of paths of increasing length. However, it raises three
    issues: (1)~defining a stopping criterion ensuring a bound on the
    approximation, (2)~analyzing the rate of convergence, and (3)~specifying
    an additional procedure to obtain the exact values once a sufficient
    number of iterations has been performed. The first two issues are still
    open and for the third one a {"}crude{"} upper bound on the number of
    iterations has been proposed. Based on a graph analysis and transformation
    of MDPs, we address these problems. First we introduce an interval
    iteration algorithm, for which the stopping criterion is straightforward.
    Then we exhibit convergence rate. Finally we significantly improve the
    bound on the number of iterations required to get the exact values.}
}
@inproceedings{LS-rp14,
  address = {Oxford, UK},
  month = sep,
  year = 2014,
  volume = {8762},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James},
  acronym = {{RP}'14},
  booktitle = {{P}roceedings of the 8th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)},
  author = {Leroux, J{\'e}r{\^o}me and Schnoebelen, {\relax Ph}ilippe},
  title = {On Functions Weakly Computable by {P}etri Nets and Vector
                    Addition Systems},
  pages = {190-202},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-rp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-rp14.pdf},
  doi = {    10.1007/978-3-319-11439-2_15},
  abstract = {We show that any unbounded function weakly computable by a Petri
    net or a VASS cannot be sublinear. This answers a long-standing folklore
    conjecture about weakly computing the inverses of some fast-growing
    functions. The proof relies on a pumping lemma for sets of runs in Petri
    nets or VASSes.}
}
@inproceedings{HH-rp14,
  address = {Oxford, UK},
  month = sep,
  year = 2014,
  volume = {8762},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James},
  acronym = {{RP}'14},
  booktitle = {{P}roceedings of the 8th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)},
  author = {Haase, Christoph and Halfon, Simon},
  title = {Integer Vector Addition Systems with States},
  pages = {112-124},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-rp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-rp14.pdf},
  doi = {10.1007/978-3-319-11439-2_9},
  abstract = {This paper studies reachability, coverability and
                  inclusion problems for Integer Vector Addition
                  Systems with States (\(\mathbb{Z}\)-VASS) and
                  extensions and restrictions
                  thereof. A~\(\mathbb{Z}\)-VASS comprises a
                  finite-state controller with a finite number of
                  counters ranging over the integers. Although it is
                  folklore that reachability in \(\mathbb{Z}\)-VASS is
                  NP-complete, it turns out that despite their
                  naturalness, from a complexity point of view this
                  class has received little attention in the
                  literature. We fill this gap by providing an
                  in-depth analysis of the computational complexity of
                  the aforementioned decision problems. Most
                  interestingly, it turns out that while the addition
                  of reset operations to ordinary VASS leads to
                  undecidability and Ackermann-hardness of
                  reachability and coverability, respectively, they
                  can be added to \(\mathbb{Z}\)-VASS while retaining
                  NP-completeness of both coverability and
                  reachability.}
}
@article{PHL-stvr14,
  publisher = {John Wiley \& Sons, Ltd.},
  journal = {Software Testing, Verification and Reliability},
  author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and
                  Longuet, Delphine},
  title = {Model-Based Testing for Concurrent Systems with Labeled Event
                  Structures},
  volume = 24,
  number = 7,
  year = {2014},
  month = nov,
  pages = {558-590},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-stvr14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-stvr14.pdf},
  doi = {10.1002/stvr.1543},
  abstract = {We propose a theoretical testing framework and a test generation
    algorithm for concurrent systems specified with true concurrency models,
    such as Petri nets or networks of automata. The semantic model of
    computation of such formalisms are labeled event structures, which allow
    to represent concurrency explicitly. We introduce the notions of strong
    and weak concurrency: strongly concurrent events must be concurrent in the
    implementation, while weakly concurrent ones may eventually be ordered.
    The ioco type conformance relations for sequential systems rely on the
    observation of sequences of actions and blockings, thus they are not
    capable of capturing and exploiting concurrency of non sequential
    behaviors. We propose an extension of \textbf{ioco} for labeled event
    structures, named \textbf{co-ioco}, allowing to deal with strong and weak
    concurrency. We~extend the notions of test cases and test execution to
    labeled event structures, and give a test generation algorithm building a
    complete test suite for \textbf{co-ioco}.}
}
@inproceedings{BMP-dx14,
  address = {Graz, Austria},
  month = sep,
  year = 2014,
  editor = {Abreu, Rui and Pill, Ingo and Wotawa, Franz},
  acronym = {{DX}'14},
  booktitle = {{P}roceedings of the 25th {I}nternational {W}orkshop on
                  {P}rinciples of {D}iagnosis ({DX}'14)},
  author = {Brand{\'a}n{ }Briones, Laura and Madalinski, Agnes and Ponce{ }de{~}Le{\'o}n, Hern{\'a}n},
  title = {Distributed Diagnosability Analysis with {P}etri Nets},
  nopages = {},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMP-dx14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMP-dx14.pdf},
  abstract = {We propose a framework to distributed diagnosability analysis of
    concurrent systems modeled with Petri nets as a collection of components
    synchronizing on common observable transitions, where faults can occur in
    several components. The diagnosability analysis of the entire system is
    done in parallel by verifying the interaction of each component with the
    fault free versions of the other components. Furthermore, we use existing
    efficient methods and tools, in particular parallel LTL-X model checking
    based on unfoldings, for diagnosability verification.}
}
@article{EM-integers14,
  journal = {INTEGERS -- Electronic Journal of Combinatorial Number Theory},
  author = {Elias, Yara and McKenzie, Pierre},
  title = {On Generalized Addition Chains},
  volume = 14,
  number = {A16},
  nopages = {},
  year = 2014,
  month = mar,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/EM-integers14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/EM-integers14.pdf},
  abstract = {Given integers \(d \geq 1\), and \(g \geq 2\),
                  a~\(g\)-addition chain for~\(d\) is a sequence of
                  integers \(a_0 = 1\), \(a_1\), \(a_2\), ... ,
                  \(a_{r-1}\), \(a_r = d\) where \(a_i = a_{j_{1}} +
                  a_{j_{2}} + \cdots + a_{j_{k}}\), with \(2 \leq k
                  \leq g\), and \(0 \leq j_1 \leq j_2 \cdots j_k \leq
                  i-1\). The length of a \(g\)-addition chain
                  is~\(r\), the number of terms following~\(1\) in the
                  sequence. We denote by~\(l_{g}(d)\) the length of a
                  shortest addition chain for~\(d\). Many results have
                  been established in the case \(g = 2\). Our aim is
                  to establish the same sort of results for arbitrary
                  fixed~\(g\). In~particular, we adapt methods for
                  constructing \(g\)-addition chains when \(g = 2\) to
                  the case \(g > 2\) and we study the asymptotic
                  behavior of~\(l_g\).}
}
@inproceedings{CKM-ncma14,
  address = {Kassel, Germany},
  month = jul,
  year = 2014,
  volume = 304,
  series = {books@ocg.at},
  publisher = {Austrian Computer Society},
  editor = {Bensch, Suna and Freund, Rudolf and Otto, Friedrich},
  acronym = {{NCMA}'14},
  booktitle = {{P}roceedings of the 6th {W}orkshop on {N}on-{C}lassical {M}odels
                  of {A}utomata and {A}pplications ({NCMA}'14)},
  author = {Cadilhac, Micha{\"e}l and Krebs, Andreas and McKenzie, Pierre},
  title = {Extremely uniform branching programs},
  pages = {73-83},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CKM-ncma14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CKM-ncma14.pdf},
  abstract = {We propose a new descriptive complexity notion of
                  uniformity for branching programs solving problems
                  defined on structured data. We observe that
                  FO[=]-uniform (\(n\)-way) branching programs are
                  unable to solve the tree evaluation problem studied
                  by Cook, McKenzie, Wehr, Braverman and Santhanam
                  because such programs possess a variant of their
                  thriftiness property. Similarly, FO[=]-uniform
                  (\(n\)-way) branching programs are unable to solve
                  the P-complete GEN problem because such programs
                  possess the incremental property studied by G{\'a}l,
                  Kouck{\'y} and McKenzie.}
}
@inproceedings{AGN-atva14,
  address = {Sydney, Australia},
  month = nov,
  year = {2014},
  volume = 8837,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Cassez, Franck and Raskin, Jean-Fran{\c{c}}ois},
  acronym = {{ATVA}'14},
  booktitle = {{P}roceedings of the 12th {I}nternational
               {S}ymposium on {A}utomated {T}echnology
               for {V}erification and {A}nalysis
               ({ATVA}'14)},
  author = {Aiswarya, C. and Gastin, Paul and Narayan Kumar, K.},
  title = {Verifying Communicating Multi-pushdown Systems via Split-width},
  pages = {1-17},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGN-atva14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGN-atva14.pdf},
  doi = {10.1007/978-3-319-11936-6_1},
  abstract = {Communicating multi-pushdown systems model networks of
    multi-threaded recursive programs communicating via reliable FIFO
    channels. We extend the notion of split-width to this setting, improving
    and simplifying the earlier definition. Split-width, while having the same
    power of clique-{{\slash}}tree-width, gives a divide-and-conquer technique
    to prove the bound of a class, thanks to the two basic operations, shuffle
    and merge, of the split-width algebra. We illustrate this technique on
    examples. We also obtain simple, uniform and optimal decision procedures
    for various verification problems parametrised by split-width.}
}
@article{FKS-fmsd14,
  publisher = {Springer},
  journal = {Formal Methods in System Design},
  author = {Fribourg, Laurent and K{\"u}hne, Ulrich and Soulat, Romain},
  title = {Finite Controlled Invariants for Sampled Switched Systems},
  year = 2014,
  month = dec,
  volume = 45,
  number = 3,
  pages = {303-329},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/FKS-fmsd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FKS-fmsd14.pdf},
  doi = {10.1007/s10703-014-0211-2},
  abstract = {We consider in this paper switched systems, a class of hybrid
    systems recently used with success in various domains such as automotive
    industry and power electronics. We propose a state-dependent control
    strategy which makes the trajectories of the analyzed system converge to
    finite cyclic sequences of points. Our method relies on a technique of
    decomposition of the state space into local regions where the control is
    uniform. We have implemented the procedure using zonotopes, and applied it
    successfully to several examples of the literature and industrial case
    studies in power electronics.}
}
@inproceedings{SLAF-syncop14,
  address = {Grenoble, France},
  volume = 145,
  series = {Electronic Proceedings in Theoretical Computer Science},
  month = apr,
  year = 2014,
  editor = {Andr{\'e}, {\'E}tienne and Frehse, Goran},
  acronym = {{SYNCOP}'14},
  booktitle = {{P}roceedings of the 1st {I}nternational {W}orkshop on {S}ynthesis 
  	   of {C}ontinuous {P}arameters ({SYNCOP}'14)},
  author = {Sun, Youcheng and Lipari, Giuseppe and
  	  	Andr{\'e}, {\'E}tienne and Fribourg, Laurent},
  title = {Toward Parametric Timed Interfaces for Real-Time Components},
  pages = {49-64},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/SLAF-syncop14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SLAF-syncop14.pdf},
  doi = {10.4204/EPTCS.145.6},
  abstract = {We propose here a framework to model real-time components
    consisting of concurrent real-time tasks running on a single processor,
    using parametric timed automata. Our framework is generic and modular, so
    as to be easily adapted to different schedulers and more complex task
    models. We first perform a parametric schedulability analysis of the
    components using the inverse method. We show that the method unfortunately
    does not provide satisfactory results when the task periods are considered
    as parameters. After identifying and explaining the problem, we present a
    solution adapting the model by making use of the worst-case scenario in
    schedulability analysis. We show that the analysis with the inverse method
    always converges on the modified model when the system load is strictly
    less than~\(100\%\). Finally, we show how to use our parametric analysis for
    the generation of timed interfaces in compositional system design.}
}
@inproceedings{BGM-atva14,
  address = {Sydney, Australia},
  month = nov,
  year = {2014},
  volume = 8837,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Cassez, Franck and Raskin, Jean-Fran{\c{c}}ois},
  acronym = {{ATVA}'14},
  booktitle = {{P}roceedings of the 12th {I}nternational
               {S}ymposium on {A}utomated {T}echnology
               for {V}erification and {A}nalysis
               ({ATVA}'14)},
  author = {Bouyer, Patricia and Gardy, Patrick and Markey, Nicolas},
  title = {Quantitative verification of weighted {K}ripke structures},
  pages = {64-80},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-atva14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-atva14.pdf},
  doi = {10.1007/978-3-319-11936-6_6},
  abstract = {Extending formal verification techniques to handle quantitative
    aspects, both for the models and for the properties to be checked, has
    become a central research topic over the last twenty years. Following
    several recent works, we study model checking for (one-dimensional)
    weighted Kripke structures with positive and negative weights, and
    temporal logics constraining the total and/or average weight. We prove
    decidability when only accumulated weight is constrained, while allowing
    average-weight constraints alone already is undecidable.}
}
@inproceedings{MV-atva14,
  address = {Sydney, Australia},
  month = nov,
  year = {2014},
  volume = 8837,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Cassez, Franck and Raskin, Jean-Fran{\c{c}}ois},
  acronym = {{ATVA}'14},
  booktitle = {{P}roceedings of the 12th {I}nternational
               {S}ymposium on {A}utomated {T}echnology
               for {V}erification and {A}nalysis
               ({ATVA}'14)},
  author = {Markey, Nicolas and Vester, Steen},
  title = {Symmetry Reduction in Infinite Games with Finite Branching},
  pages = {281-296},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/MV-atva14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MV-atva14.pdf},
  doi = {10.1007/978-3-319-11936-6_21},
  abstract = {Symmetry reductions have been applied extensively for the
    verification of finite-state concurrent systems and hardware designs using
    model-checking of temporal logics such as LTL, CTL and
    CTL\textsuperscript{*}, as well as real-time and probabilistic-system
    model-checking. In this paper we extend the technique to handle
    infinite-state games on graphs with finite branching where the objectives
    of the players can be very general. As particular applications, it is
    shown that the technique can be applied to reduce the state space in
    parity games as well as when doing model-checking of the temporal logic
    ATL\textsuperscript{*}.}
}
@article{ADK-lmcs14,
  journal = {Logical Methods in Computer Science},
  author = {Arapinis, Myrto and Delaune, St{\'e}phanie and Kremer, Steve},
  title = {Dynamic Tags for Security Protocols},
  volume = 10,
  number = {2:11},
  nopages = {},
  month = jun,
  year = 2014,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ADK-lmcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ADK-lmcs14.pdf},
  doi = {10.2168/LMCS-10(2:11)2014},
  abstract = {The design and verification of cryptographic protocols is a
    notoriously difficult task, even in symbolic models which take an abstract
    view of cryptography. This is mainly due to the fact that protocols may
    interact with an arbitrary attacker which yields a verification problem
    that has several sources of unboundedness (size of messages, number of
    sessions, etc. In this paper, we characterize a class of protocols for
    which deciding security for an unbounded number of sessions is decidable.
    More precisely, we present a simple transformation which maps a protocol
    that is secure for a bounded number of protocol sessions (a~decidable
    problem) to a protocol that is secure for an unbounded number of sessions.
    The precise number of sessions that need to be considered is a function of
    the security property and we show that for several classical security
    properties a single session is sufficient. Therefore, in many cases our
    results yields a design strategy for security protocols: (i)~design a
    protocol intended to be secure for a {single session}; and (ii)~apply our
    transformation to obtain a protocol which is secure for an unbounded
    number of sessions.}
}
@article{FL-is14,
  publisher = {Springer},
  journal = {Informatik Spektrum},
  author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me},
  title = {Neue, einfache {A}lgorithmen f{\"u}r {P}etrinetze},
  volume = 37,
  number = {3},
  month = jun,
  year = 2014,
  pages = {229-236},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/FL-is14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FL-is14.pdf},
  doi = {10.1007/s00287-013-0753-5},
  abstract = {Wir zeigen, wie die Entscheidungsprobleme der {\"U}berdeckung,
     der Beschr{\"a}nktheit und der Erreichbarkeit mithilfe induktiver
     Invarianten einfacher l{\"o}sbar sind als mit herk{\"o}mmlichen
     Methoden}
}
@article{CD-tocl14,
  publisher = {ACM Press},
  journal = {ACM Transactions on Computational Logic},
  author = {Chatterjee, Krishnendu and Doyen, Laurent},
  title = {Partial-Observation Stochastic Games: How to Win when Belief Fails},
  volume = 15,
  number = {2:16},
  month = apr,
  year = 2014,
  nopages = {},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tocl14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tocl14.pdf},
  doi = {10.1145/2579819},
  abstract = {In two-player finite-state stochastic games of partial
                  observation on graphs, in every state of the graph,
                  the players simultaneously choose an action, and
                  their joint actions determine a probability
                  distribution over the successor states. The game is
                  played for infinitely many rounds and thus the
                  players construct an infinite path in the graph. We
                  consider reachability objectives where the first
                  player tries to ensure a target state to be visited
                  almost-surely (i.e., with probability~1) or
                  positively (i.e., with positive probability), no
                  matter the strategy of the second player.\par
                  We classify such games according to the information and to the
                  power of randomization available to the players. On
                  the basis of information, the game can be one-sided
                  with either (a)~player~1, or (b)~player 2 having
                  partial observation (and the other player has
                  perfect observation), or two-sided with (c)~both
                  players having partial observation. On the basis of
                  randomization, (a)~the players may not be allowed to
                  use randomization (pure strategies), or (b)~they may
                  choose a probability distribution over actions but
                  the actual random choice is external and not visible
                  to the player (actions invisible), or (c)~they may
                  use full randomization.\par
                  Our main results for pure strategies are as follows:
                  (1)~For one-sided games with player~2 having perfect
                  observation we show that (in contrast to full
                  randomized strategies) belief-based
                  (subset-construction based) strategies are not
                  sufficient, and we present an exponential upper
                  bound on memory both for almost-sure and positive
                  winning strategies; we show that the problem of
                  deciding the existence of almost-sure and positive
                  winning strategies for player~1 is EXPTIME-complete
                  and present symbolic algorithms that avoid the
                  explicit exponential construction. (2)~For one-sided
                  games with player~1 having perfect observation we
                  show that non-elementary memory is both necessary
                  and sufficient for both almost-sure and positive
                  win- ning strategies. (3)~We~show that for the
                  general (two-sided) case finite-memory strategies
                  are sufficient for both positive and almost-sure
                  winning, and at least non-elementary memory is
                  required. We establish the equivalence of the
                  almost-sure winning problems for pure strategies and
                  for randomized strategies with actions
                  invisible. Our equivalence result exhibit serious
                  flaws in previous results of the literature: we show
                  a non-elementary memory lower bound for almost-sure
                  winning whereas an exponential upper bound was
                  previously claimed.}
}
@inproceedings{CS-mfcs14,
  address = {Budapest, Hungary},
  month = aug,
  year = 2014,
  volume = {8634},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {{\'E}sik, Zolt{\'a}n and Csuhaj{-}Varj{\'u}, Erzs{\'e}bet and 
                 Dietzfelbinger, Martin},
  acronym = {{MFCS}'14},
  booktitle = {{P}roceedings of the 39th
               {I}nternational {S}ymposium on
               {M}athematical {F}oundations of 
               {C}omputer {S}cience
               ({MFCS}'14)~-- {P}art~{I}},
  author = {Courtois, Jean-Baptiste and Schmitz, Sylvain},
  title = {Alternating Vector Addition Systems with States},
  pages = {220-231},
  url = {http://hal.inria.fr/hal-00980878},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-mfcs14.pdf},
  doi = {10.1007/978-3-662-44522-8_19},
  abstract = {Alternating vector addition systems are obtained by equipping
    vector addition systems with states (VASS) with 'fork' rules, and provide
    a natural setting for infinite-arena games played over a VASS. Initially
    introduced in the study of propositional linear logic, they have more
    recently gathered attention in the guise of \emph{multi-dimensional
    energy} games for quantitative verification and synthesis.\par
    We show that establishing who is the winner in such a game with a state
    reachability objective is 2-ExpTime-complete. As a further application, we
    show that the same complexity result applies to the problem of whether a
    VASS is simulated by a finite-state system.}
}
@inproceedings{CGK-concur14,
  address = {Rome, Italy},
  month = sep,
  year = 2014,
  volume = 8704,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Baldan, Paolo and Gorla, Daniele},
  acronym = {{CONCUR}'14},
  booktitle = {{P}roceedings of the 25th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'14)},
  author = {Cyriac, Aiswarya and Gastin, Paul and Narayan Kumar, K.},
  title = {Controllers for the Verification of Communicating Multi-Pushdown Systems},
  pages = {297-311},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CGK-concur14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CGK-concur14.pdf},
  doi = {10.1007/978-3-662-44584-6_21},
  abstract = {Multi-pushdowns communicating via queues are formal models of
    multi-threaded programs communicating via channels. They are turing
    powerful and much of the work on their verification has focussed on
    under-approximation techniques. Any error detected in the
    under-approximation implies an error in the system. However the successful
    verification of the under-approximation is not as useful if the system
    exhibits unverified behaviours. Our aim is to design controllers that
    observe/restrict the system so that it stays within the verified
    under-approximation. We identify some important properties that a good
    controller should satisfy. We consider an extensive under-approximation
    class, construct a distributed controller with the desired properties and
    also establish the decidability of verification problems for this class.}
}
@inproceedings{CCD-concur14,
  address = {Rome, Italy},
  month = sep,
  year = 2014,
  volume = 8704,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Baldan, Paolo and Gorla, Daniele},
  acronym = {{CONCUR}'14},
  booktitle = {{P}roceedings of the 25th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'14)},
  author = {Chr{\'e}tien, R{\'e}my and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie},
  title = {Typing messages for free in security protocols: 
                 the~case of equivalence properties},
  pages = {372-386},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-concur14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-concur14.pdf},
  doi = {10.1007/978-3-662-44584-6_26},
  abstract = {Privacy properties such as untraceability, vote secrecy, or
    anonymity are typically expressed as behavioural equivalence in a process
    algebra that models security protocols. In this paper, we study how to
    decide one particular relation, namely trace equivalence, for an unbounded
    number of sessions.\par
    Our first main contribution is to reduce the search space for attacks.
    Specifically, we show that if there is an attack then there is one that is
    well-typed. Our result holds for a large class of typing systems and a
    large class of determinate security protocols. Assuming finitely many
    nonces and keys, we can derive from this result that trace equivalence is
    decidable for an unbounded number of sessions for a class of tagged
    protocols, yielding one of the first decidability results for the
    unbounded case. As an intermediate result, we also provide a novel
    decision procedure in the case of a bounded number of sessions.}
}
@inproceedings{DMS-concur14,
  address = {Rome, Italy},
  month = sep,
  year = 2014,
  volume = 8704,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Baldan, Paolo and Gorla, Daniele},
  acronym = {{CONCUR}'14},
  booktitle = {{P}roceedings of the 25th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'14)},
  author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa},
  title = {Robust Synchronization in {M}arkov Decision Processes},
  pages = {234-248},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-concur14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-concur14.pdf},
  doi = {10.1007/978-3-662-44584-6_17},
  abstract = {We consider synchronizing properties of Markov decision
    processes (MDP), viewed as generators of sequences of probability
    distributions over states. A~probability distribution is \(p\)-synchronizing
    if the probability mass is at least~\(p\) in some state, and a sequence of
    probability distributions is weakly \(p\)-synchronizing, or strongly
    \(p\)-synchronizing if respectively infinitely many, or all but finitely many
    distributions in the sequence are \(p\)-synchronizing.\par
    For each synchronizing mode, an MDP can be \textit{(i)}~sure winning if
    there is a strategy that produces a \(1\)-synchronizing sequence;
    \textit{(ii)}~almost-sure winning if there is a strategy that produces a
    sequence that is, for all \(\epsilon>0\), a \((1-\epsilon)\)-synchronizing
    sequence; \textit{(iii)}~limit-sure winning if for all \(\epsilon>0\),
    there is a strategy that produces a \((1-\epsilon)\)-synchronizing
    sequence.\par
    For each synchronizing and winning mode, we consider the problem of
    deciding whether an MDP is winning, and we establish matching upper and
    lower complexity bounds of the problems, as well as the optimal memory
    requirement for winning strategies: \textit{(a)}~for all winning modes, we
    show that the problems are PSPACE-complete for weakly synchronizing, and
    PTIME-complete for strongly synchronizing; \textit{(b)}~we~show that for
    weakly synchronizing, exponential memory is sufficient and may be
    necessary for sure winning, and infinite memory is necessary for
    almost-sure winning; for strongly synchronizing, linear-size memory is
    sufficient and may be necessary in all modes; \textit{(c)}~we~show a
    robustness result that the almost-sure and limit-sure winning modes
    coincide for both weakly and strongly synchronizing.}
}
@inproceedings{BMM-concur14,
  address = {Rome, Italy},
  month = sep,
  year = 2014,
  volume = 8704,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Baldan, Paolo and Gorla, Daniele},
  acronym = {{CONCUR}'14},
  booktitle = {{P}roceedings of the 25th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'14)},
  author = {Bouyer, Patricia and Markey, Nicolas and Matteplackel,
                  Raj~Mohan},
  title = {Averaging in~{LTL}},
  pages = {266-280},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMM-concur14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMM-concur14.pdf},
  doi = {10.1007/978-3-662-44584-6_19},
  abstract = {For the accurate analysis of computerized systems, powerful
    quantitative formalisms have been designed, together with efficient
    verification algorithms. However, verification has mostly remained
    boolean---either a property is~true, or it~is false. We~believe that this
    is too crude in a context where quantitative information and constraints
    are crucial: correctness should be quantified!\par In a recent line of
    works, several authors have proposed quantitative semantics for temporal
    logics, using e.g. \emph{discounting} modalities (which give less
    importance to distant events). In~the present paper, we define and study a
    quantitative semantics of~LTL with \emph{averaging} modalities, either on
    the long run or within an until modality. This, in a way, relaxes the
    classical Boolean semantics of~LTL, and provides a measure of certain
    properties of a model. We~prove that computing and even approximating the
    value of a formula in this logic is undecidable.}
}
@inproceedings{PHL-ictac14,
  address = {Bucharest, Romania},
  month = sep,
  year = 2014,
  volume = 8687,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Ciobanu, Gabriel and M{\'e}ry, Dominique},
  acronym = {{ICTAC}'14},
  booktitle = {{P}roceedings of the 11th {I}nternational {C}olloquium on
	{T}heoretical {A}spects of {C}omputing ({ICTAC}'14)},
  author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and
                  Longuet, Delphine},
  title = {Distributed testing of concurrent systems: vector clocks to
                  the rescue},
  pages = {369-387},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-ictac14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-ictac14.pdf},
  doi = {10.1007/978-3-319-10882-7_22},
  abstract = {The ioco relation has become a standard in model-based
    conformance testing. The co-ioco conformance relation is an extension of
    this relation to concurrent systems specified with true-concurrency
    models. This relation assumes a global control and observation of the
    system under test, which is not usually realistic in the case of
    physically distributed systems. Such systems can be partially observed at
    each of their points of control and observation by the sequences of inputs
    and outputs exchanged with their environment. Unfortunately, in general,
    global observation cannot be reconstructed from local ones, so global
    conformance cannot be decided with local tests. We propose to append time
    stamps to the observable actions of the system under test in order to
    regain global conformance from local testing.}
}
@inproceedings{KS-dcfs2014,
  address = {Turku, Finland},
  month = aug,
  year = 2014,
  volume = {8614},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer-Verlag},
  editor = {J{\"u}rgensen, Helmut and Karhum{\"a}ki, Juhani and Okhotin, Alexander},
  acronym = {{DCFS}'14},
  booktitle = {{P}roceedings of the 16th {W}orkshop on {D}escriptional 
  	   {C}omplexity of {F}ormal {S}ystems ({DCFS}'14)},
  author = {Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe},
  title = {On the state complexity of closures and interiors of regular
                  languages with subwords},
  pages = {234-245},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-dcfs2014.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-dcfs2014.pdf},
  doi = {10.1007/978-3-319-09704-6_21},
  abstract = {We study the state complexity of the set of subwords and
    superwords of regular languages, and provide new lower bounds in the case
    of languages over a two-letter alphabet. We also consider the dual
    interior sets, for which the nondeterministic state complexity has a
    doubly-exponential upper bound. We prove a matching doubly-exponential
    lower bound for downward interiors in the case of an unbounded alphabet.}
}
@inproceedings{KH-acsd14,
  address = {Tunis, Tunisia},
  month = jun,
  year = 2014,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{ACSD}'14},
  booktitle = {{P}roceedings of the 14th {I}nternational
               {C}onference on {A}pplication of {C}oncurrency
               to {S}ystem {D}esign
               ({ACSD}'14)},
  author = {Kordon, Fabrice and Hulin{-}Hubard, Francis},
  title = {BenchKit, a Tool for Massive Concurrent Benchmarking},
  pages = {159-165},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/KH-acsd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KH-acsd14.pdf},
  doi = {10.1109/ACSD.2014.12},
  abstract = {Benchmarking numerous programs in a reasonable time requires the
    use of several (potentially multicore) computers. We experimented such a
    situation in the context of the MCC (Model Checking Contest @ Petri net)
    where we had to operate more than 52000 runs for the 2013 edition. This
    paper presents BenchKit, a tool to operate programs on sets of potentially
    parallel machines and to gather monitoring information like CPU or memory
    usage. It also samples such data over the execution time. BenchKit has
    been elaborated in the context of the MCC and will be used for the 2014
    edition.}
}
@inproceedings{GHKS-acsd14,
  address = {Tunis, Tunisia},
  month = jun,
  year = 2014,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{ACSD}'14},
  booktitle = {{P}roceedings of the 14th {I}nternational
               {C}onference on {A}pplication of {C}oncurrency
               to {S}ystem {D}esign
               ({ACSD}'14)},
  author = {Germanos, Vasileios and Haar, Stefan
                and Khomenko, Victor and Schwoon, Stefan},
  title = {Diagnosability under Weak Fairness},
  pages = {132-141},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GHKS-acsd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GHKS-acsd14.pdf},
  doi = {10.1109/ACSD.2014.9},
  abstract = {In partially observed Petri nets, diagnosis is the
                task of detecting whether or not the given sequence of
                observed labels indicates that some unobservable fault
                has occurred. Diagnosability is an associated property of
                the Petri net, stating that in any possible execution an
                occurrence of a fault can eventually be diagnosed.\par In this
                paper we consider diagnosability under the weak fairness (WF)
                assumption, which intuitively states that no transition from
                a given set can stay enabled forever---it~must eventually
                either fire or be disabled. We show that a previous approach
                to WF-diagnosability in the literature has a major flaw, and
                present a corrected notion. Moreover, we present an efficient
                method for verifying WF-diagnosability based on a reduction
                to LTL-X model checking. An important advantage of this
                method is that the LTL-X formula is fixed---in~particular,
                the WF assumption does not have to be expressed as a part of
                it (which would make the formula length proportional to the
                size of the specification), but rather the ability of existing
                model checkers to handle weak fairness directly is exploited.}
}
@inproceedings{SLSFM-rtcsa14,
  address = {Chongqing, China},
  month = aug,
  year = 2014,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{RTCSA}'14},
  booktitle = {{P}roceedings of the 20th {IEEE} {I}nternational {C}onference on {E}mbedded
                  and {R}eal-{T}ime {C}omputing {S}ystems and {A}pplications
                  ({RTCSA}'14)},
  author = {Sun, Youcheng and Lipari, Giuseppe and
  	  	Soulat, Romain and Fribourg, Laurent and
		Markey, Nicolas},
  title = {Component-Based Analysis of Hierarchical Scheduling using Linear Hybrid Automata},
  nopages = {},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/SLSFM-rtcsa14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SLSFM-rtcsa14.pdf},
  doi = {10.1109/RTCSA.2014.6910502},
  abstract = {Formal methods (e.g. Timed Automata or Linear Hybrid Automata)
    can be used to analyse a real-time system by performing a reachability
    analysis on the model. The advantage of using formal methods is that they
    are more expressive than classical analytic models used in schedulability
    analysis. For example, it is possible to express state-dependent
    behaviour, arbitrary activation patterns,~etc.\par
    In this paper we use the formalism of Linear Hybrid Automata to encode a
    hierarchical scheduling system. In particular, we model a dynamic server
    algorithm and the tasks contained within, abstracting away the rest of the
    system, thus enabling component-based scheduling analysis. We prove the
    correctness of the model and the decidability of the reachability analysis
    for the case of periodic tasks. Then, we compare the results of our model
    against classical schedulability analysis techniques, showing that our
    analysis performs better than analytic methods in terms of resource
    utilisation. We further present two case studies: a~component with
    state-dependent tasks, and a simplified model of a real avionics system.
    Finally, through extensive tests with various configurations, we
    demonstrate that this approach is usable for medium size components.}
}
@article{BFSP-tcs14,
  publisher = {Elsevier Science Publishers},
  journal = {Theoretical Computer Science},
  author = {Bouchy, Florent and Finkel, Alain and San{ }Pietro, Pierluigi},
  title = {Dense-choice Counter Machines Revisited},
  volume = {542},
  month = jul,
  year = 2014,
  pages = {17-31},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFSP-tcs14.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFSP-tcs14.pdf},
  doi = {10.1016/j.tcs.2014.04.029},
  abstract = {This paper clarifies the picture about Dense-choice
                  Counter Machines (DCM), a less studied version of
                  Counter Machines where counters range on a dense,
                  rather than discrete, domain. The definition of DCM
                  is revisited to make it extend (discrete) Counter
                  Machines, and new undecidability and decidability
                  results are proved. Using the first-order additive
                  mixed theory of reals and integers, the paper
                  presents a logical characterization of the sets of
                  configurations reachable by reversal-bounded DCM. We
                  also relate the DCM model to more common models of
                  systems.}
}
@techreport{rr-lsv-14-06,
  author = {Sun, Youcheng and Lipari, Giuseppe},
  title = {A Weak Simulation Relation for Real-Time 
  		 Schedulability Analysis of Global Fixed 
		 Priority Scheduling Using Linear Hybrid 
		 Automata},
  institution = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  year = {2014},
  month = apr,
  type = {Research Report},
  number = {LSV-14-06},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-06.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-06.pdf},
  versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2014-06-v1.pdf, 20140428},
  note = {17~pages},
  abstract = {In this paper we present an exact schedulability test for
    sporadic real-time tasks scheduled by the Global Fixed Priority Fully
    Preemptive Scheduler on a multiprocessor system. The analysis consists in
    modelling the system as a Linear Hybrid Automaton, and in performing a
    reachability analysis for states representing deadline miss conditions. To
    mitigate the problem of state space explosion, we propose a partial order
    relationship over the symbolic states of the model and we prove that this
    is a weak simulation relation. We then present an implementation of the
    analysis in a software tool, and we show that the use of the proposed
    model permits to analyse larger systems than other exact algorithms in the
    literature.}
}
@inproceedings{CD-icalp14,
  address = {Copenhagen, Denmark},
  month = jul,
  year = 2014,
  volume = 8573,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Esparza, Javier and Fraigniaud, Pierre and Koutsoupias, Elias},
  acronym = {{ICALP}'14},
  booktitle = {{P}roceedings of the 41st {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'14)~-- {P}art~{II}},
  author = {Chatterjee, Krishnendu and Doyen, Laurent},
  title = {Games with a Weak Adversary},
  pages = {110-121},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp14.pdf},
  doi = {10.1007/978-3-662-43951-7_10},
  abstract = {We consider multi-player graph games with partial-observation
    and parity objective. While the decision problem for three-player games
    with a coalition of the first and second players against the third player
    is undecidable in general, we present a decidability result for
    partial-observation games where the first and third player are in a
    coalition against the second player, thus where the second player is
    adversarial but weaker due to partial-observation. We establish tight
    complexity bounds in the case where player~1 is less informed than
    player~2, namely 2-EXPTIME-completeness for parity objectives. The
    symmetric case of player~1 more informed than player~2 is much more
    complicated, and we show that already in the case where player~1 has
    perfect observation, memory of size non-elementary is necessary in general
    for reachability objectives, and the problem is decidable for safety and
    reachability objectives. Our results have tight connections with
    partial-observation stochastic games for which we derive new complexity
    results.}
}
@inproceedings{BFM-icalp14,
  address = {Copenhagen, Denmark},
  month = jul,
  year = 2014,
  volume = 8573,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Esparza, Javier and Fraigniaud, Pierre and Koutsoupias, Elias},
  acronym = {{ICALP}'14},
  booktitle = {{P}roceedings of the 41st {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'14)~-- {P}art~{II}},
  author = {Blondin, Michael and Finkel, Alain and McKenzie, Pierre},
  title = {Handling Infinitely Branching {WSTS}},
  pages = {13-25},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFM-icalp14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFM-icalp14.pdf},
  doi = {10.1007/978-3-662-43951-7_2},
  abstract = {Most decidability results concerning well-structured
                  transition systems apply to the \emph{finitely branching}
                  variant. Yet some models (inserting automata, \(\omega\)-Petri
                  nets,~...) are naturally infinitely branching.  Here
                  we develop tools to handle infinitely branching WSTS
                  by exploiting the crucial property that in the
                  (ideal) completion of a well-quasi-ordered set,
                  downward-closed sets are finite unions of
                  ideals. Then, using these tools, we derive
                  decidability results and we delineate the
                  undecidability frontier in the case of the
                  termination, the control-state maintainability and
                  the coverability problems. Coverability and
                  boundedness under new effectivity conditions are
                  shown decidable.}
}
@inproceedings{DD-aiml14,
  address = {Groningen, The Netherlands},
  month = aug,
  year = 2014,
  publisher = {College Publications},
  editor = {Gor{\'e}, Rajeev and Kooi, Barteld P. and Kurucz, Agi},
  acronym = {{AiML}'14},
  booktitle = {{P}roceedings of the 10th
           {C}onference on {A}dvances in {M}odal {L}ogics
           ({AiML}'14)},
  author = {Demri, St{\'e}phane and Deters, Morgan},
  title = {The effects of modalities in separation logics (extended abstract)},
  pages = {134-138},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-aiml14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-aiml14.pdf},
  abstract = {Like modal logic, temporal logic, or description logic,
    separation logic has become a popular class of logical formalisms in
    computer science, conceived as assertion languages for Hoare-style proof
    systems with the goal to perform automatic program analysis. We present
    similarities with modal and temporal logics, and we present landmark
    results about decidability, complexity and expressive power.}
}
@inproceedings{DD-csllics14,
  address = {Vienna, Austria},
  month = jul,
  year = 2014,
  publisher = {ACM Press},
  acronym = {{CSL\slash LICS}'14},
  booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on
  	    {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)},
  author = {Demri, St{\'e}phane and Deters, Morgan},
  title = {Expressive Completeness of Separation Logic With Two
                  Variables and No Separating Conjunction},
  nopages = {},
  chapter = {37},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-csllics14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-csllics14.pdf},
  doi = {10.1145/2603088.2603142},
  abstract = {We show that first-order separation logic with one record field
    restricted to two variables and the separating implication (no separating
    conjunction) is as expressive as weak second-order logic, substantially
    sharpening a previous result. Capturing weak second-order logic with such
    a restricted form of separation logic requires substantial updates to
    known proof techniques. We develop these, and as a by-product identify the
    smallest fragment of separation logic known to be undecidable: first-order
    separation logic with one record field, two variables, and no separating
    conjunction.}
}
@inproceedings{BGMZ-csllics14,
  address = {Vienna, Austria},
  month = jul,
  year = 2014,
  publisher = {ACM Press},
  acronym = {{CSL\slash LICS}'14},
  booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on
  	    {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)},
  author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and
                  Zeitoun, Marc},
  title = {Logical Characterization of Weighted Pebble Walking Automata},
  nopages = {},
  chapter = 19,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-csllics14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-csllics14.pdf},
  doi = {10.1145/2603088.2603118},
  abstract = {Weighted automata are a conservative quantitative extension of
    finite automata that enjoys applications, e.g., in language processing and
    speech recognition. Their expressive power, however, appears to be
    limited, especially when they are applied to more general structures than
    words, such as graphs. To address this drawback, weighted automata have
    recently been generalized to weighted pebble walking automata, which
    proved useful as a tool for the specification and evaluation of
    quantitative properties over words and nested words. In this paper, we
    establish the expressive power of weighted pebble walking automata in
    terms of transitive closure logic, lifting a similar result by Engelfriet
    and Hoogeboom from the Boolean case to a quantitative setting. This result
    applies to general classes of graphs, including all the aforementioned
    classes.}
}
@inproceedings{Haase-csllics14,
  address = {Vienna, Austria},
  month = jul,
  year = 2014,
  publisher = {ACM Press},
  acronym = {{CSL\slash LICS}'14},
  booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on
  	    {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)},
  author = {Haase, Christoph},
  title = {Subclasses of {P}resburger Arithmetic and the Weak {EXP} Hierarchy},
  nopages = {},
  chapter = 47,
  url = {http://arxiv.org/abs/1401.5266},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Haase-csllics14.pdf},
  doi = {10.1145/2603088.2603092},
  abstract = {It is shown that for any fixed \(i>0\), the
    \(\Sigma_{i+1}\)-fragment of Presburger arithmetic, i.e., its restriction
    to \(i+1\) quantifier alternations beginning with an existential
    quantifier, is complete for \(\Sigma^{\textsc{EXP}}_{i}\), the \(i\)-th
    level of the weak EXP hierarchy, an~analogue to the polynomial-time
    hierarchy residing between \textsc{NEXP} and \textsc{EXPSPACE}. This
    result completes the computational complexity landscape for Presburger
    arithmetic, a~line of research which dates back to the seminal work by
    Fischer~\& Rabin in~1974. Moreover, we~apply some of the techniques
    developed in the proof of the lower bound in order to establish bounds on
    sets of naturals definable in the \(\Sigma_1\)-fragment of Presburger
    arithmetic: given a \(\Sigma_1\)-formula \(\Phi(x)\), it~is shown that the
    set of non-negative solutions is an ultimately periodic set whose period
    is at most doubly-exponentially and that this bound is tight.}
}
@inproceedings{BB-csllics14,
  address = {Vienna, Austria},
  month = jul,
  year = 2014,
  publisher = {ACM Press},
  acronym = {{CSL\slash LICS}'14},
  booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on
  	    {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)},
  author = {Bollig, Benedikt},
  title = {Logic for Communicating Automata with Parameterized Topology},
  nopages = {},
  chapter = 18,
  exturl = {http://hal.inria.fr/hal-00872807/},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BB-csllics14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BB-csllics14.pdf},
  doi = {10.1145/2603088.2603093},
  abstract = {We introduce parameterized communicating automata~(PCA) as a
    model of systems where finite-state processes communicate through FIFO
    channels. Unlike classical communicating automata, a given PCA can be run
    on any network topology of bounded degree. The topology is thus a
    parameter of the system. We provide various B{\"u}chi-Elgot-Trakhtenbrot
    theorems for~PCA, which roughly read as follows: Given a logical
    specification~\(\phi\) and a class of topologies~\(T\), there is a~PCA that is
    equivalent to~\(\phi\) on all topologies from~\(T\). We~give uniform constructions
    which allow us to instantiate~\(T\) with concrete classes such as pipelines,
    ranked trees, grids, rings,~etc. The proofs build on a locality theorem
    for first-order logic due to Schwentick and Barthelmann, and they exploit
    concepts from the non-parameterized case, notably a result by Genest,
    Kuske, and Muscholl.}
}
@inproceedings{CDNV-fossacs14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = {8412},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Muscholl, Anca},
  acronym = {{FoSSaCS}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'14)},
  author = {Chatterjee, Krishnendu and Doyen, Laurent and 
  	 	Nain, Sumit and Vardi, Moshe Y.},
  title = {The Complexity of Partial-Observation Stochastic Parity Games
                  with Finite-Memory Strategies},
  pages = {242-257},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDNV-fossacs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDNV-fossacs14.pdf},
  doi = {10.1007/978-3-642-54830-7_16},
  abstract = { We consider two-player partial-observation stochastic games on
    finite-state graphs where player~1 has partial observation and player~2
    has perfect observation. The winning condition we study are \(\omega\)-regular
    conditions specified as parity objectives. The qualitative-analysis
    problem given a partial-observation stochastic game and a parity objective
    asks whether there is a strategy to ensure that the objective is satisfied
    with probability~1 (resp.~positive probability). These
    qualitative-analysis problems are known to be undecidable. However in many
    applications the relevant question is the existence of finite-memory
    strategies, and the qualitative-analysis problems under finite-memory
    strategies was recently shown to be decidable in 2EXPTIME. We improve the
    complexity and show that the qualitative-analysis problems for
    partial-observation stochastic parity games under finite-memory strategies
    are EXPTIME-complete; and also establish optimal (exponential) memory
    bounds for finite-memory strategies required for qualitative analysis. }
}
@inproceedings{CDGO-fossacs14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = {8412},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Muscholl, Anca},
  acronym = {{FoSSaCS}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'14)},
  author = {Chatterjee, Krishnendu and Doyen, Laurent and Gimbert, Hugo
                  and Oualhadj, Youssouf},
  title = {Perfect-Information Stochastic Mean-Payoff Parity Games},
  pages = {210-225},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGO-fossacs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGO-fossacs14.pdf},
  doi = {10.1007/978-3-642-54830-7_4},
  abstract = {The theory of graph games is the foundation for modeling and
    synthesizing reactive processes. In the synthesis of stochastic processes,
    we use \(2\frac{1}{2}\)-player games where some transitions of the game
    graph are controlled by two adversarial players, the System and the
    Environment, and the other transitions are determined probabilistically.
    We consider \(2\frac{1}{2}\)-player games where the objective of the
    System is the conjunction of a qualitative objective (specified as a
    parity condition) and a quantitative objective (specified as a mean-payoff
    condition). We establish that the problem of deciding whether the System
    can ensure that the probability to satisfy the mean-payoff parity
    objective is at least a given threshold is in
    \(\textsf{NP}\cap\textsf{coNP}\), matching the best known bound in the
    special case of 2-player games (where all transitions are deterministic)
    with only parity objectives, or with only mean-payoff objectives. We
    present an algorithm running in time~\(O(d \cdot n^{2d} \cdot
    \textsf{MeanGame}) to compute the set of almost-sure winning states from
    which the objective can be ensured with probability~1, where n is the
    number of states of the game, d the number of priorities of the parity
    objective, and MeanGame is the complexity to compute the set of
    almost-sure winning states in \(2\frac{1}{2}\)-player mean-payoff games.
    Our results are useful in the synthesis of stochastic reactive systems
    with both functional requirement (given as a qualitative objective) and
    performance requirement (given as a quantitative objective).}
}
@inproceedings{DMS-fossacs14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = {8412},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Muscholl, Anca},
  acronym = {{FoSSaCS}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'14)},
  author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa},
  title = {Limit Synchronization in Markov Decision Processes},
  pages = {58-72},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-fossacs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-fossacs14.pdf},
  doi = {10.1007/978-3-642-54830-7_4},
  abstract = {Markov decision processes (MDP) are finite-state systems with
    both strategic and probabilistic choices. After fixing a strategy, an MDP
    produces a sequence of probability distributions over states. The sequence
    is eventually synchronizing if the probability mass accumulates in a
    single state, possibly in the limit. Precisely, for \(0 \leq p \leq 1\)
    the sequence is \(p\)-synchronizing if a probability distribution in the
    sequence assigns probability at least~\(p\) to some state, and we
    distinguish three synchronization modes: \textit{(i)}~sure winning if
    there exists a strategy that produces a 1-synchronizing sequence;
    \textit{(ii)}~almost-sure winning if there exists a strategy that produces
    a sequence that is, for all \(\varepsilon>0\), a
    \((1-\varepsilon)\)-synchronizing sequence; \textit{(iii)}~limit-sure
    winning if for all \(\varepsilon>0\), there exists a strategy that
    produces a \((1-\varepsilon)\)-synchronizing sequence. We~consider the
    problem of deciding whether an MDP is sure, almost-sure, or limit-sure
    winning, and we establish the decidability and optimal complexity for all
    modes, as well as the memory requirements for winning strategies. Our main
    contributions are as follows: \textit{(a)}~for~each winning modes
    we~present characterizations that give a PSPACE complexity for the
    decision problems, and we establish matching PSPACE lower bounds;
    \textit{(b)}~we~show that for sure winning strategies, exponential memory
    is sufficient and may be necessary, and that in general infinite memory is
    necessary for almost-sure winning, and unbounded memory is necessary for
    limit-sure winning; \textit{(c)}~along with our results, we establish new
    complexity results for alternating finite automata over a one-letter
    alphabet.}
}
@inproceedings{FSS-icdt14,
  address = {Athens, Greece},
  month = mar,
  year = 2014,
  editor = {Schweikardt, Nicole and Christophides, Vassilis and Leroy, Vincent},
  acronym = {{ICDT}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on
                  {D}atabase {T}heory ({ICDT}'14)},
  author = {Francis, Nadime and Segoufin, Luc and Sirangelo, Cristina},
  title = {Datalog Rewritings of Regular Path Queries using Views},
  pages = {107-118},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/FSS-icdt14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FSS-icdt14.pdf},
  doi = {10.5441/002/icdt.2014.14},
  abstract = {We consider query answering using views on graph databases, i.e.
    databases structured as edge-labeled graphs. We consider views and queries
    specified by Regular Path Queries. These are queries selecting pairs of
    nodes in a graph database that are connected via a path whose sequence of
    edge labels belongs to some regular language.\par
    A~view~\(\mathbf{V}\) determines a query~\(Q\) if for all graph
    databases~\(D\), the view image~\(\mathbf{V}(D)\) always contains enough
    information to answer~\(Q\) on~\(D\). In other words, there is a well defined
    function from~\(\mathbf{V}(D)\) to~\(Q(D)\).\par
    Our main result shows that when this function is monotone, there exists a
    rewriting of~\(Q\) as a Datalog query over the view
    instance~\(\mathbf{V}(D)\). In~particular the query can be evaluated in
    time polynomial in the size of~\(\mathbf{V}(D)\).\par
    As a side result we also prove that it is decidable whether an RPQ query
    can be rewritten in Datalog using RPQ views.}
}
@techreport{BB-arxiv14,
  author = {Brault{-}Baron, Johann},
  title = {Hypergraph Acyclicity Revisited},
  institution = {Computing Research Repository},
  number = {1403.7076},
  year = {2014},
  month = feb,
  type = {Research Report},
  url = {http://arxiv.org/abs/1403.7076},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BB-arxiv14.pdf},
  note = {32~pages},
  abstract = {The notion of graph acyclicity has been extended to several 
    different notions of hypergraph acyclicity, in increasing order of generality: 
    \emph{gamma} acyclicity, \emph{beta} acyclicity, and \emph{alpha} acyclicity, that 
    have met a great 
    interest in many fields. \parWe prove the equivalence between the numerous 
    characterizations of each notion with a new, simpler proof, in a self-contained 
    manner. For that purpose, we introduce new notions of alpha, beta and gamma leaf 
    that allow to define new {"}rule-based{"} characterizations of each notion.\par
    The~combined presentation of the notions is completed with a study of their 
    respective closure properties. New closure results are established, and alpha, 
    beta and gamma acyclicity are proved optimal w.r.t. their closure properties.}
}
@article{LM-lmcs14,
  journal = {Logical Methods in Computer Science},
  author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas},
  title = {Quantified {CTL}: Expressiveness and Complexity},
  volume = 10,
  number = {4:17},
  nopages = {},
  month = dec,
  year = 2014,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LM-lmcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LM-lmcs14.pdf},
  doi = {10.2168/LMCS-10(4:17)2014},
  abstract = {While it was defined long ago, the extension of CTL with
    quantification over atomic propositions has never been studied
    extensively. Considering two different semantics (depending whether
    propositional quantification refers to the Kripke structure or to its
    unwinding tree), we~study its expressiveness (showing in particular that
    QCTL coincides with Monadic Second-Order Logic for both semantics) and
    characterise the complexity of its model-checking and satisfiability
    problems, depending on the number of nested propositional quantifiers
    (showing that the structure semantics populates the polynomial hierarchy
    while the tree semantics populates the exponential hierarchy).}
}
@article{NM-ercim14,
  publisher = {European Research Consortium for Informatics and Mathematics},
  journal = {ERCIM News},
  author = {Markey, Nicolas},
  title = {Cassting: Synthesizing Complex Systems Using Non-Zero-Sum Games},
  volume = 97,
  pages = {25-26},
  year = 2014,
  month = apr,
  url = {http://ercim-news.ercim.eu/en97/special/cassting-synthesizing-complex-systems-using-non-zero-sum-games},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NM-ercim14.pdf}
}
@inproceedings{DGLM-csr14,
  address = {Moscow, Russia},
  month = jun,
  year = 2014,
  volume = {8476},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Pin, Jean-{\'E}ric},
  acronym = {{CSR}'14},
  booktitle = {{P}roceedings of the 9th {I}nternational {C}omputer {S}cience
                  {S}ymposium in {R}ussia ({CSR}'14)},
  author = {Demri, St{\'e}phane and Galmiche, Didier and
                  Larchey-Wendling, Dominique and M{\'e}ry, Daniel},
  title = {Separation Logic with One Quantified Variable},
  pages = {125-138},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGLM-csr14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGLM-csr14.pdf},
  doi = {10.1007/978-3-319-06686-8_10},
  abstract = {We investigate first-order separation logic with one record
    field restricted to a unique quantified variable (1SL1). Undecidability is
    known when the number of quantified variables is unbounded and the
    satisfiability problem is PSPACE-complete for the propositional fragment.
    We show that the satisfiability problem for 1SL1 is PSPACE-complete and we
    characterize its expressive power by showing that every formula is
    equivalent to a Boolean combination of atomic properties. This contributes
    to our understanding of fragments of first-order separation logic that can
    specify properties about the memory heap of programs with singly-linked
    lists. When the number of program variables is fixed, the complexity drops
    to polynomial time. All the fragments we consider contain the magic wand
    operator and first-order quantification over a single variable.}
}
@phdthesis{mahsa-phd2014,
  author = {Shirmohammadi, Mahsa},
  title = {Qualitative Analysis of Synchronizing Probabilistic Systems},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France and Universit\'e Libre de Bruxelles, Belgium},
  type = {Th{\`e}se de doctorat},
  year = 2014,
  month = dec,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/mahsa-phd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/mahsa-phd14.pdf}
}
@phdthesis{soulat-phd2014,
  author = {Soulat, Romain},
  title = {Synthesis of Correct-by-Design Schedulers for Hybrid Systems},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = 2014,
  month = feb,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/soulat-phd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/soulat-phd14.pdf}
}
@techreport{rr-lsv-14-03,
  author = {Fribourg, Laurent and Goubault, {\'E}ric and Mohamed, Sameh
                  and Putot, Sylvie and Soulat, Romain},
  title = {Synthesis of robust boundary control for systems
  		 governed by semi-discrete differential equations},
  institution = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  year = {2014},
  month = feb,
  type = {Research Report},
  number = {LSV-14-03},
  url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-03.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-03.pdf},
  versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2014-03-v1.pdf, 20140228},
  note = {8~pages},
  abstract = {The topic of boundary control of PDEs has been the subject of a
    considerable literature since the seminal works of J.-L. Lions in the 90s.
    In this paper, we consider the boundary control of systems represented by
    spatial discretizations of~PDEs (i.e.,~semi-discrete equations). We~focus
    on control laws which are sampled and piecewise constant: periodically, at
    every sampling time, a fixed control amplitude is applied to the system
    until the next sampling instant. We show that, under some conditions,
    sampled piecewise-constant boundary control allows to achieve
    {"}approximate controllability{"}: Given a time \(T>0\), the controlled system
    evolves to a neighborhood of a given final state. The result is
    illustrated on the boundary control of the semi-discrete version of the
    heat equation.}
}
@inproceedings{CDFR-vmcai14,
  address = {San~Diego, California, USA},
  month = jan,
  year = 2014,
  volume = 8318,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {McMillan, Kenneth and Rival, Xavier},
  acronym = {{VMCAI}'14},
  booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on
   	       {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation
	       ({VMCAI}'14)},
  author = {Chatterjee, Krishnendu and Doyen, Laurent and Filiot,
                  Emmanuel and Raskin, Jean-Fran{\c{c}}ois},
  title = {Doomsday Equilibria for Omega-Regular Games},
  pages = {78-97},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-vmcai14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-vmcai14.pdf},
  doi = {10.1007/978-3-642-54013-4_5},
  abstract = {Two-player games on graphs provide the theoretical framework for
    many important problems such as reactive synthesis. While the traditional
    study of two-player zero-sum games has been extended to multi-player games
    with several notions of equilibria, they are decidable only for
    perfect-information games, whereas several applications require
    imperfect-information games.\par
    In this paper we propose a new notion of equilibria, called doomsday
    equilibria, which is a strategy profile such that all players satisfy
    their own objective, and if any coalition of players deviates and violates
    even one of the players objective, then the objective of every player is
    violated.\par
    We present algorithms and complexity results for deciding the existence of
    doomsday equilibria for various classes of \(\omega\)-regular objectives,
    both for imperfect-information games, and for perfect-information games.We
    provide optimal complexity bounds for imperfect-information games, and in
    most cases for perfect-information games.}
}
@inproceedings{Schmitz-rta14,
  address = {Vienna, Austria},
  month = jul,
  year = 2014,
  volume = {8560},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Dowek, Gilles},
  acronym = {{RTA\slash TLCA}'14},
  booktitle = {{P}roceedings of the {J}oint 25th {I}nternational {C}onference on
                  {R}ewriting {T}echniques and {A}pplications and 12th
                  {I}nternational {C}onference on {T}yped {L}ambda-{C}alculi
                  and {A}pplications ({RTA\slash TLCA}'14)},
  author = {Schmitz, Sylvain},
  title = {Implicational Relevance Logic is 2-{E}xp{T}ime-Complete},
  pages = {395-409},
  url = {http://arxiv.org/abs/1402.0705},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-rta14.pdf},
  doi = {10.1007/978-3-319-08918-8_27},
  abstract = {We show that provability in the implicational fragment of
                  relevance logic is complete for doubly exponential time,
                  using reductions to and from coverability in branching
                  vector addition systems.}
}
@inproceedings{LS-csllics14,
  address = {Vienna, Austria},
  month = jul,
  year = 2014,
  publisher = {ACM Press},
  acronym = {{CSL\slash LICS}'14},
  booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on
  	    {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)},
  author = {Lazi{\'c}, Ranko and Schmitz, Sylvain},
  title = {Non-Elementary Complexities for Branching {VASS},
                  {MELL}, and Extensions},
  nopages = {},
  chapter = 61,
  url = {http://arxiv.org/abs/1401.6785},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-csllics14.pdf},
  doi = {10.1145/2603088.2603129},
  abstract = {We study the complexity of reachability problems on branching
                  extensions of vector addition systems, which allows us to
                  derive new non-elementary complexity bounds for fragments
                  and variants of propositional linear logic. We show that
                  provability in the multiplicative exponential fragment is
                  Tower-hard already in the affine case---and hence
                  non-elementary. We match this lower bound for the full
                  propositional affine linear logic, proving its
                  Tower-completeness. We also show that provability in
                  propositional contractive linear logic is
                  Ackermann-complete.}
}
@inproceedings{BDH-post14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = {8414},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Abadi, Mart{\'\i}n and Kremer, Steve},
  acronym = {{POST}'14},
  booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on
  	   {P}rinciples of {S}ecurity and {T}rust 
           ({POST}'14)},
  author = {Baelde, David and Delaune, St{\'e}phanie and Hirschi, Lucca},
  title = {A~reduced semantics for deciding trace equivalence using constraint systems},
  pages = {1-21},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-post14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-post14.pdf},
  doi = {10.1007/978-3-642-54792-8_1},
  abstract = {Many privacy-type properties of security protocols can be
    modelled using trace equivalence properties in suitable process algebras.
    It has been shown that such properties can be decided for interesting
    classes of finite processes (i.e.,~without replication) by means of symbolic
    execution and constraint solving. However, this does not suffice to obtain
    practical tools. Current prototypes suffer from a classical combinatorial
    explosion problem caused by the exploration of many interleavings in the
    behaviour of processes. Modersheim et~al. have tackled this problem for
    reachability properties using partial order reduction techniques. We
    revisit their work, generalize it and adapt it for equivalence checking.
    We obtain an optimization in the form of a reduced symbolic semantics that
    eliminates redundant interleavings on the fly.}
}
@inproceedings{BM-sr14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = 146,
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Mogavero, Fabio and Murano, Aniello},
  acronym = {{SR}'14},
  booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}trategic 
  	   {R}easoning ({SR}'14)},
  author = {Berwanger, Dietmar and Mathew, Anup Basil},
  title = {Games with Recurring Certainty},
  pages = {91-96},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BM-sr14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BM-sr14.pdf},
  doi = {10.4204/EPTCS.146.12},
  abstract = {Infinite games where several players seek to coordinate under
    imperfect information are known to be intractable, unless the information
    flow is severely restricted. Examples of undecidable cases typically
    feature a situation where players become uncertain about the current state
    of the game, and this uncertainty lasts forever.\par
    Here we consider games where the players attain certainty about the
    current state over and over again along any play. For finite-state games,
    we note that this kind of \emph{recurring} certainty implies a stronger condition
    of \emph{periodic} certainty, that is, the events of state certainty ultimately
    occur at uniform, regular intervals. We show that it is decidable whether
    a given game presents recurring certainty, and that, if so, the problem of
    synthesising coordination strategies under \(\omega\)-regular winning conditions is
    solvable.}
}
@inproceedings{CDFR-sr14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = 146,
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Mogavero, Fabio and Murano, Aniello},
  acronym = {{SR}'14},
  booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}trategic 
  	   {R}easoning ({SR}'14)},
  author = {Chatterjee, Krishnendu and Doyen, Laurent and Filiot, Emmanuel and
                 Raskin, Jean-Fran{\c{c}}ois},
  title = {Doomsday Equilibria for Omega-Regular Games},
  pages = {43-48},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-sr14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-sr14.pdf},
  doi = {10.4204/EPTCS.146.6},
  abstract = {Two-player games on graphs provide the theoretical framework for
    many important problems such as reactive synthesis. While the traditional
    study of two-player zero-sum games has been extended to multi-player games
    with several notions of equilibria, they are decidable only for
    perfect-information games, whereas several applications require
    imperfect-information games.\par
    In this paper we propose a new notion of equilibria, called doomsday
    equilibria, which is a strategy profile such that all players satisfy
    their own objective, and if any coalition of players deviates and violates
    even one of the players objective, then the objective of every player is
    violated.\par
    We present algorithms and complexity results for deciding the existence of
    doomsday equilibria for various classes of \(\omega\)-regular objectives,
    both for imperfect-information games, and for perfect-information games.
    We provide optimal complexity bounds for imperfect-information games, and
    in most cases for perfect-information games.}
}
@inproceedings{BMV-sr14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = 146,
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Mogavero, Fabio and Murano, Aniello},
  acronym = {{SR}'14},
  booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}trategic 
  	   {R}easoning ({SR}'14)},
  author = {Bouyer, Patricia and Markey, Nicolas and Vester, Steen},
  title = {Nash Equilibria in Symmetric Games with Partial Observation},
  pages = {49-55},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-sr14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-sr14.pdf},
  doi = {10.4204/EPTCS.146.7},
  abstract = {We investigate a model for representing large multiplayer games,
    which satisfy strong symmetry properties. This model is made of multiple
    copies of an arena; each player plays in his own arena, and can partially
    observe what the other players do. Therefore, this game has partial
    information and symmetry constraints, which make the computation of Nash
    equilibria difficult. We show several undecidability results, and for
    bounded-memory strategies, we precisely characterize the complexity of
    computing pure Nash equilibria (for qualitative objectives) in this game
    model.}
}
@phdthesis{cyriac-phd2014,
  author = {Cyriac, Aiswarya},
  title = {Verification of Communicating Recursive Programs via Split-width},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = 2014,
  month = jan,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/cyriac-phd14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cyriac-phd14.pdf}
}
@inproceedings{AGHKO-fossacs14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = {8412},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Muscholl, Anca},
  acronym = {{FoSSaCS}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'14)},
  author = {Antonopoulos, Timos and Gorogiannis, Nikos and Haase, Christoph
                 and Kanovich, Max and Ouaknine, Jo{\"e}l},
  title = {Foundations for Decision Problems in Separation Logic with
                 General Inductive Predicates},
  pages = {411-425},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGHKO-fossacs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGHKO-fossacs14.pdf},
  doi = {10.1007/978-3-642-54830-7_27},
  abstract = {We establish foundational results on the computational
    complexity of deciding entailment in Separation Logic with general
    inductive predicates whose underlying base language allows for pure
    formulas, pointers and existentially quantified variables. We show that
    entailment is in general undecidable, and \textsc{ExpTime}-hard in a
    fragment recently shown to be decidable by Iosif~\emph{et~al.} Moreover,
    entailment in the base language is \(\Pi_2^{\text{P}}\)-complete, the
    upper bound even holds in the presence of list predicates. We additionally
    show that entailment in essentially any fragment of Separation Logic
    allowing for general inductive predicates is intractable even when strong
    syntactic restrictions are imposed.}
}
@inproceedings{BFHHH-fossacs14,
  address = {Grenoble, France},
  month = apr,
  year = 2014,
  volume = {8412},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Muscholl, Anca},
  acronym = {{FoSSaCS}'14},
  booktitle = {{P}roceedings of the 17th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'14)},
  author = {Bertrand, Nathalie and Fabre, {\'E}ric and Haar, Stefan and
                  Haddad, Serge and H{\'e}lou{\"e}t, Lo{\"\i}c},
  title = {Active diagnosis for probabilistic systems},
  pages = {29-42},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHHH-fossacs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHHH-fossacs14.pdf},
  doi = {10.1007/978-3-642-54830-7_4},
  abstract = {The diagnosis problem amounts to deciding whether some specific
    {"}fault{"} event occurred or not in a system, given the observations
    collected on a run of this system. This system is then diagnosable if the
    fault can always be detected, and the active diagnosis problem consists in
    controlling the system in order to ensure its diagnosability. We consider
    here a stochastic framework for this problem: once a control is selected,
    the system becomes a stochastic process. In this setting, the active
    diagnosis problem consists in deciding whether there exists some
    observation-based strategy that makes the system diagnosable with
    probability one. We prove that this problem is EXPTIME-complete, and that
    the active diagnosis strategies are belief-based. The safe active
    diagnosis problem is similar, but aims at enforcing diagnosability while
    preserving a positive probability to non faulty runs, i.e. without
    enforcing the occurrence of a fault. We prove that this problem requires
    non belief-based strategies, and that it is undecidable. However, it
    belongs to NEXPTIME when restricted to belief-based strategies. Our work
    also refines the decidability/undecidability frontier for verification
    problems on partially observed Markov decision processes.}
}
@article{ABGMN-fi13,
  publisher = {{IOS} Press},
  journal = {Fundamenta Informaticae},
  author = {Akshay, S. and Bollig, Benedikt and Gastin, Paul and 
  	   	    Mukund, Madhavan and Narayan Kumar, K.},
  title = {Distributed Timed Automata with Independently Evolving Clocks},
  volume = {130},
  number = {4},
  month = apr,
  year = 2014,
  pages = {377-407},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGMN-fi13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGMN-fi13.pdf},
  doi = {10.3233/FI-2014-996},
  abstract = {We propose a model of distributed timed systems where each
    component is a timed automaton with a set of local clocks that evolve at a
    rate independent of the clocks of the other components. A~clock can be
    read by any component in the system, but it can only be reset by the
    automaton it belongs~to.\par
    There are two natural semantics for such systems. The \emph{universal}
    semantics captures behaviors that hold under any choice of clock rates for
    the individual components. This is a natural choice when checking that a
    system always satisfies a positive specification. To check if a system
    avoids a negative specification, it is better to use the
    \emph{existential} semantics—the set of behaviors that the system
    can possibly exhibit under some choice of clock rates.\par
    We show that the existential semantics always describes a regular set of
    behaviors. However, in the case of universal semantics, checking emptiness
    or universality turns out to be undecidable. As an alternative to the
    universal semantics, we propose a \emph{reactive} semantics that allows us
    to check positive specifications and yet describes a regular set of
    behaviors.}
}
@article{BGMZ-tocl13,
  publisher = {ACM Press},
  journal = {ACM Transactions on Computational Logic},
  author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc},
  title = {Pebble Weighted Automata and Weighted Logics},
  volume = 15,
  number = {2:15},
  month = apr,
  year = 2014,
  nopages = {},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-tocl13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-tocl13.pdf},
  doi = {10.1145/2579819},
  abstract = {We introduce new classes of weighted automata on words. Equipped
    with pebbles, they go beyond the class of recognizable formal power
    series: they capture weighted first-order logic enriched with a
    quantitative version of transitive closure. In contrast to previous work,
    this calculus allows for unrestricted use of existential and universal
    quantifications over positions of the input word. We actually consider
    both two-way and one-way pebble weighted automata. The latter class
    constrains the head of the automaton to walk left-to-right, resetting it
    each time a pebble is dropped. Such automata have already been considered
    in the Boolean setting, in the context of data words. Our main result
    states that two-way pebble weighted automata, one-way pebble weighted
    automata, and our weighted logic are expressively equivalent. We also give
    new logical characterizations of standard recognizable series.}
}
@article{SBM-ic14,
  publisher = {Elsevier Science Publishers},
  journal = {Information and Computation},
  author = {Sankur, Ocan and Bouyer, Patricia and Markey, Nicolas},
  title = {Shrinking Timed Automata},
  volume = 234,
  month = feb,
  year = 2014,
  pages = {107-132},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-ic14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-ic14.pdf},
  doi = {10.1016/j.ic.2014.01.002},
  abstract = {We define and study a new approach to the implementability of
    timed automata, where the semantics is perturbed by imprecisions and
    finite frequency of the hardware. In order to circumvent these effects, we
    introduce \emph{parametric shrinking} of clock constraints, which
    corresponds to tightening the guards. We propose symbolic procedures to
    decide the existence of (and then compute) parameters under which the
    shrunk version of a given timed automaton is non-blocking and can
    time-abstract simulate the exact semantics. We then define an
    implementation semantics for timed automata with a digital clock and
    positive reaction times, and show that for shrinkable timed automata,
    non-blockingness and time-abstract simulation are preserved in
    implementation.}
}
@article{GM-tcs14,
  publisher = {Elsevier Science Publishers},
  journal = {Theoretical Computer Science},
  author = {Gastin, Paul and Monmege, Benjamin},
  title = {Adding Pebbles to Weighted Automata~-- Easy Specification
                  {\&} Efficient Evaluation},
  volume = {534},
  month = may,
  year = 2014,
  pages = {24-44},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-tcs14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-tcs14.pdf},
  doi = {10.1016/j.tcs.2014.02.034},
  abstract = {We extend weighted automata and weighted rational expressions
    with 2-way moves and reusable pebbles. We show with examples from natural
    language modeling and quantitative model-checking that weighted
    expressions and automata with pebbles are more expressive and allow much
    more natural and intuitive specifications than classical ones. We extend
    Kleene-Sch{\"u}tzenberger theorem showing that weighted expressions and
    automata with pebbles have the same expressive power. We focus on an
    efficient translation from expressions to automata. We also prove that the
    evaluation problem for weighted automata can be done very efficiently if
    the number of reusable pebbles is low.}
}
@article{BLM-peva13,
  publisher = {Elsevier Science Publishers},
  journal = {Performance Evaluation},
  author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas},
  title = {Lower-Bound Constrained Runs in Weighted Timed Automata},
  volume = 73,
  month = mar,
  year = 2014,
  pages = {91-109},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-peva13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-peva13.pdf},
  doi = {	10.1016/j.peva.2013.11.002},
  abstract = {We investigate a number of problems related to infinite runs of
    weighted timed automata (with a single weight variable), subject to
    lower-bound constraints on the accumulated weight. Closing an open problem
    from an earlier paper, we show that the existence of an infinite
    lower-bound-constrained run is--for us somewhat unexpectedly--undecidable
    for weighted timed automata with four or more clocks.\par
    This undecidability result assumes a fixed and known initial credit. We
    show that the related problem of existence of an initial credit for which
    there exists a feasible run is decidable in PSPACE. We also investigate
    the variant of these problems where only bounded-duration runs are
    considered, showing that this restriction makes our original problem
    decidable in NEXPTIME. We prove that the universal versions of all those
    problems (i.e, checking that all the considered runs satisfy the
    lower-bound constraint) are decidable in PSPACE.\par
    Finally, we extend this study to multi-weighted timed automata: the
    existence of a feasible run becomes undecidable even for bounded duration,
    but the existence of initial credits remains decidable (in~PSPACE).}
}
@inproceedings{KL-pdp14,
  address = {Turin, Italy},
  month = feb,
  year = 2014,
  publisher = {{IEEE} Computer Society Press},
  editor = {Aldinucci, Marco and D'Agostino, Daniele and Kilpatrick, Peter},
  acronym = {{PDP}'14},
  booktitle = {{P}roceedings of the 22nd {E}uromicro {I}nternational {C}onference
                  on {P}arallel, {D}istributed, and {N}etwork-{B}ased
                  {P}rocessing ({PDP}'14)},
  author = {Kumar, Sunil and Lipari, Giuseppe},
  title = {Latency Analysis of Network-On-Chip-based Many-Core Processors},
  pages = {432-439},
  doi = {10.1109/PDP.2014.107},
  abstract = {The next generation of processor will contain an increasing
    number of cores, connected to the main memory and to each other using fast
    Network-on-Chip (NoC) organised in complex mesh structures. In order to
    analyse real-time programs running on such architectures, it is necessary
    to estimate the communication latency between processes running on
    different cores. The goal of this paper is to propose an analytic model
    for bounding the communication latency on NoC for many-core architectures.
    In particular, we introduce a new approach to analyse the communication
    latency on NoC with wormhole switching and credit-based virtual channel
    flow control. The proposed model is evaluated by comparing the results
    predicted by the model with real measurements obtained running a set of
    experiments on an Intel SCC platform.}
}
@article{ACD-icomp13,
  publisher = {Elsevier Science Publishers},
  journal = {Information and Computation},
  author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie},
  title = {Modeling and Verifying Ad~Hoc Routing Protocols},
  volume = 238,
  pages = {30-67},
  month = nov,
  year = 2014,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-icomp13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-icomp13.pdf},
  doi = {10.1016/j.ic.2014.07.004},
  abstract = {Mobile ad hoc networks consist of mobile wireless devices which
    autonomously organize their infrastructure. In such networks, a central
    issue, ensured by routing protocols, is to find a route from one device to
    another. Those protocols use cryptographic mechanisms in order to prevent
    malicious nodes from compromising the discovered route.\par
    Our contribution is twofold. We first propose a calculus for modeling and
    reasoning about security protocols, including in particular secured
    routing protocols. Our calculus extends standard symbolic models to take
    into account the characteristics of routing protocols and to model
    wireless communication in a more accurate way. Our second main
    contribution is a decision procedure for analyzing routing protocols for
    any network topology. By using constraint solving techniques, we show that
    it is possible to automatically discover (in~NPTIME) whether there exists
    a network topology that would allow malicious nodes to mount an attack
    against the protocol, for a bounded number of sessions. We also provide a
    decision procedure for detecting attacks in case the network topology is
    given a priori. We demonstrate the usage and usefulness of our approach by
    analyzing protocols of the literature, such as SRP applied to DSR and
    SDMSR.}
}
@inproceedings{HHM-tgc13,
  address = {Buenos Aires, Argentina},
  month = mar,
  year = 2014,
  volume = {8358},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Abadi, Mart{\'\i}n and Lluch{ }Lafuente, Alberto},
  acronym = {{TGC}'13},
  booktitle = {{R}evised {S}elected {P}apers of the 8th {S}ymposium on {T}rustworthy {G}lobal 
	   {C}omputing ({TGC}'13)},
  author = {Haddad, Serge and Hennicker, Rolf and M{\o}ller, Mikael H.},
  title = {Specification of Asynchronous Component Systems with 
  		 Modal {I}{{\slash}}{O}-{P}etri Nets},
  pages = {219-234},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHM-tgc13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHM-tgc13.pdf},
  doi = {10.1007/978-3-319-05119-2_13},
  abstract = {We consider Petri nets with distinguished labels for
    inputs, outputs, internal communications and silent actions and
    with {"}must{"} and {"}may{"} modalities for transitions. The
    input\slash output labels show the interaction capabilities of a
    net to the outside used to build larger nets by asynchronous
    composition via communication channels.  The modalities express
    constraints for Petri net refinement taking into account
    observational abstraction from silent transitions.  Modal
    I\slash O-Petri nets are equipped with a modal transition system
    semantics.  We show that refinement is preserved by asynchronous
    composition and by hiding of communication channels.  We study
    conformance properties which express communication requirements
    for composed systems and we show that those properties are
    preserved by refinement.  On this basis we propose a methodology
    for the specification of distributed systems in terms of modal
    I\slash O-Petri nets which supports incremental design, encapsulation of
    components and stepwise refinement.  Finally we show that our
    communication properties are decidable.}
}
@article{GL-acs13,
  publisher = {Springer},
  journal = {Applied Categorical Structures},
  author = {Goubault{-}Larrecq, Jean},
  title = {Exponentiable streams and prestreams},
  volume = {22},
  number = {3},
  year = 2014,
  month = jun,
  pages = {515-549},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13.pdf},
  corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf},
  doi = { 10.1007/s10485-013-9315-x},
  note = {Errata 1: \url{http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf};
           Errata 2: \url{http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum2.pdf}},
  abstract = {Inspired by a construction of Escard{\'o}, Lawson, and Simpson,
    we give a general construction of \(\mathcal C\)-generated objects in a
    topological construct. When \(\mathcal C\) consists of exponentiable
    objects, the resulting category is Cartesian-closed. This generalizes the
    familiar construction of compactly-generated spaces, and we apply this to
    Krishnan's categories of streams and prestreams, as well as to Haucourt
    streams. For that, we need to identify the exponentiable objects in these
    categories: for prestreams, we show that these are the preordered
    core-compact topological spaces, and for streams, these are the
    core-compact streams.}
}
@article{BCD-icomp13,
  publisher = {Elsevier Science Publishers},
  journal = {Information and Computation},
  author = {Bursuc, Sergiu and Comon{-}Lundh, Hubert and Delaune,
                  St{\'e}phanie},
  title = {Deducibility constraints and blind signatures},
  year = {2014},
  month = nov,
  volume = 238,
  pages = {106-127},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCD-icomp13.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCD-icomp13.pdf},
  nonote = {32~pages},
  doi = {10.1016/j.ic.2014.07.006},
  abstract = {Deducibility constraints represent in a symbolic way the
    infinite set of possible executions of a finite protocol. Solving a
    deducibility constraint amounts to finding all possible ways of filling
    the gaps in a proof. For finite local inference systems, there is an
    algorithm that reduces any deducibility constraint to a finite set of
    solved forms. This allows one to decide any trace security property of
    cryptographic protocols.\par
    We investigate here the case of infinite local inference systems, through
    the case study of blind signatures. We show that, in this case again, any
    deducibility constraint can be reduced to finitely many solved forms
    (hence we can decide trace security properties). We sketch also another
    example to which the same method can be applied.}
}
@article{BCGMNTW-jfr14,
  publisher = {University of Bologna},
  journal = {Journal of Formalized Reasoning},
  author = {Baelde, David and Chaudhuri, Kaustuv and Gacek, Andrew and
                  Miller, Dale and Nadathur, Gopalan and Tiu, Alwen and Wang,
                  Yuting},
  title = {Abella: A~System for Reasoning about Relational Specifications},
  volume = {7},
  number = {2},
  year = {2014},
  pages = {1-89},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGMNTW-jfr14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGMNTW-jfr14.pdf},
  doi = {10.6092/issn.1972-5787/4650},
  abstract = {The Abella interactive theorem prover is based on an
    intuitionistic logic that allows for inductive and co-inductive reasoning
    over relations. Abella supports the \(\lambda\)-tree approach to treating
    syntax containing binders: it~allows simply typed \(\lambda\)-terms to be
    used to represent such syntax and it provides higher-order (pattern)
    unification, the \(\nabla\) quantifier, and nominal constants for
    reasoning about these representations. As such, it is a suitable vehicle
    for formalizing the meta-theory of formal systems such as logics and
    programming languages. This tutorial exposes Abella incrementally,
    starting with its capabilities at a first-order logic level and gradually
    presenting more sophisticated features, ending with the support it offers
    to the \emph{two-level logic approach} to meta-theoretic reasoning. Along
    the way, we show how Abella can be used prove theorems involving natural
    numbers, lists, and automata, as well as involving typed and untyped
    \(\lambda\)-calculi and the \(\pi\)-calculus.}
}
@techreport{KNS-arxiv14,
  author = {Karandikar, Prateek and Niewerth, Matthias and Schnoebelen, {\relax Ph}ilippe},
  title = {On the state complexity of closures and interiors of regular languages with subwords},
  institution = {Computing Research Repository},
  number = {1406.0690},
  year = {2014},
  month = nov,
  type = {Research Report},
  url = {http://arxiv.org/abs/1406.0690},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KNS-arxiv14.pdf},
  note = {24~pages},
  abstract = {We study the state complexity of the set of subwords and
    superwords of regular languages, and provide new lower bounds in the case
    of languages over a two-letter alphabet. We also consider the dual
    interior sets, for which the nondeterministic state complexity has a
    doubly-exponential upper bound. We prove a matching doubly-exponential
    lower bound for downward interiors in the case of an unbounded alphabet.}
}
@article{AFG-sif15,
  publisher = {SIF},
  journal = {1024~-- Bulletin de la soci{\'e}t{\'e} informatique de France},
  author = {Abiteboul, Serge and Fribourg, Laurent and
                  Goubault{-}Larrecq, Jean},
  title = {{G}{\'e}rard {B}erry~: un~informaticien m{\'e}daille d'or du {CNRS}~2014},
  volume = 4,
  pages = {139-142},
  month = oct,
  year = 2014,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFG-sif15.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFG-sif15.pdf},
  abstract = {C'est un chercheur en informatique qui vient de recevoir la
    m{\'e}daille d'or du CNRS, la plus haute distinction scientifique fran{\c
    c}aise toutes disciplines confondues. Les informaticiens sont rares {\`a}
    avoir {\'e}t{\'e} ainsi honor{\'e}s : ce n'est que la seconde fois
    apr{\`e}s Jacques Stern en~2006.}
}
@inproceedings{MA-bda14,
  address = {Autrans, France},
  month = oct,
  year = 2014,
  editor = {Gross-Amblard, David and Collet, {\relax Ch}ristine and
                  Bobineau, {\relax Ch}ristophe and Jouanot, Fabrice},
  acronym = {{BDA}'14},
  booktitle = {{A}ctes de la 30{\`e}me {C}onf{\'e}rence sur la {G}estion de
                  {D}onn{\'e}es~-- {P}rincipes, {T}echnologies et
                  {A}pplications ({BDA}'14)},
  author = {Montoya, David and Abiteboul, Serge},
  title = {Inf{\'e}rence d'itin{\'e}raires multimodaux {\`a}~partir de donn{\'e}es
                  smartphone},
  pages = {38-42},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/MA-bda14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MA-bda14.pdf},
  abstract = {We designed a system to infer the multimodal itineraries
    traveled by a user from a combination of smartphone sensor data (e.g.,
    GPS, Wi-Fi, inertial sensors), personal information, and knowledge of the
    transport network topology (e.g., maps, transportation timetables). The
    system operates with a Multimodal Transport Network that captures the set
    of admissible multimodal itineraries, i.e., paths of this network with
    weights providing the statistics (expected time and variance) of the
    paths. The network takes into account public transportation schedules. Our
    Multimodal Transport Network is constructed from publicly available
    transport data of Paris and its neighbourhoods published by different
    transport agencies and map organizations. The system models sensor
    uncertainty with probabilities, and the likelihood that a multimodal
    itinerary was taken by the user is captured in a Dynamic Bayesian Network.
    For this demonstration, we captured data from users travelling over the
    Paris region who were asked to record data for different trips via an
    Android application. After uploading their data into our system, a set of
    most likely itineraries is computed for each trip. For each trip, the
    system displays recognized multimodal itineraries and their estimated
    likelihood over an interactive map.}
}
@comment{{B-arxiv16,
  author =		Bollig, Benedikt, 
  affiliation = 	aff-LSVmexico,
  title =    		One-Counter Automata with Counter Visibility, 
  institution = 	Computing Research Repository, 
  number =    		1602.05940, 
  month = 		feb, 
  nmonth =     		2,
  year = 		2016, 
  type = 		RR, 
  axeLSV = 		mexico,
  NOcontrat = 		"",
  
  url =			http://arxiv.org/abs/1602.05940, 
  PDF =			"http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf",
  lsvdate-new =  	20160222,
  lsvdate-upd =  	20160222,
  lsvdate-pub =  	20160222,
  lsv-category = 	"rapl",
  wwwpublic =    	"public and ccsb",
  note = 		18~pages, 

  abstract = "In a one-counter automaton (OCA), one can read a letter
    from some finite alphabet, increment and decrement the counter by
    one, or test it for zero. It is well-known that universality and
    language inclusion for OCAs are undecidable. We consider here OCAs
    with counter visibility: Whenever the automaton produces a letter,
    it outputs the current counter value along with~it. Hence, its
    language is now a set of words over an infinite alphabet. We show
    that universality and inclusion for that model are in PSPACE, thus
    no harder than the corresponding problems for finite automata, which
    can actually be considered as a special case. In fact, we show that
    OCAs with counter visibility are effectively determinizable and
    closed under all boolean operations. As~a~strict generalization, we
    subsequently extend our model by registers. The general nonemptiness
    problem being undecidable, we impose a bound on the number of
    register comparisons and show that the corresponding nonemptiness
    problem is NP-complete.",
}}
@misc{mcc:2014,
  author = {F. Kordon and H. Garavel and L.-M. Hillah and Hulin{-}Hubard, Francis
and A. Linard and M. Beccuti and S. Evangelista and A. Hamez and N.
Lohmann and E. Lopez and E. Paviot-Adet and C. Rodriguez and C. Rohr and
J. Srba},
  month = jun,
  title = {{Results for the MCC @ Petri Nets 2014}},
  year = {2014},
  url = {http://mcc.lip6.fr/2014}
}
@mastersthesis{m2-doumane,
  author = {Doumane, Amina},
  title = {{\'E}tudes des automates en ludique},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2014},
  month = sep
}
@misc{JGL:lls14,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {Matinale de l'innovation Logiciels Libres et S{\'e}curit{\'e}, Paris, France},
  month = dec,
  title = {D{\'e}tection d'intrusions avec {OrchIDS}},
  year = {2014}
}
@misc{JGL:ccc14,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {Invited talk, Continuity, Computability, Constructivity workshop (CCC), Ljubljana, Slovenia},
  month = sep,
  title = {Noetherian spaces},
  year = {2014}
}
@misc{JGL:cps14,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {CPS Summer School, Grenoble, France},
  month = jul,
  title = {{OrchIDS}: on the value of rigor in intrusion detection},
  year = {2014}
}
@misc{GSM:dga-inria-2-14,
  author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric},
  howpublished = {Fourniture 2 du contrat DGA-INRIA Orchids},
  month = may,
  title = {Techniques et m{\'e}thodes de g{\'e}n{\'e}ration de signatures pour la d{\'e}tection d'intrusions},
  year = {2014}
}
@misc{GSM:dga-inria-1-14,
  author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric},
  howpublished = {Fourniture 1 du contrat DGA-INRIA Orchids},
  month = may,
  title = {Politiques de s{\'e}curit{\'e} syst{\`e}me},
  year = {2014}
}
@mastersthesis{m2-Jaziri,
  author = {Jaziri, Samy},
  title = {{Robustness issues in priced timed automata}},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2014},
  month = sep
}

This file was generated by bibtex2html 1.98.