Publications : LSV

[BDJ+21]
D. Baelde, S. Delaune, C. Jacomme, A. Koutsos, and S. Moreau. An Interactive Prover for Protocol Verification in the Computational Model. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (S&P'21), online, May 2021. IEEE Press. To appear.
BibTex | Web page | PDF ]
[GH21]
S. Göller and M. Hilaire. Reachability in two-parametric timed automata with one parameter is EXPSPACE-complete. In Proceedings of the 38th Annual Symposium on Theoretical Aspects of Computer Science (STACS'21), volume 187 of Leibniz International Proceedings in Informatics, Saarbrücken, Germany, March 2021. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2021.36.
BibTex | DOI | Web page | PDF ]
[Bae21]
D. Baelde. Contributions to the Verification of Cryptographic Protocols. Mémoire d'habilitation, École Normale Supérieure Paris-Saclay, France, February 2021.
BibTex | Web page | PDF ]
[DLM21a]
S. Demri, É. Lozes, and A. Mansutti. A Complete Axiomatisation for Quantifier-Free Separation Logic. Research Report 2006.05156v2, Computing Research Repository, February 2021. 63 pages.
BibTex | Web page | PDF ]
[HB21]
G. Hondet and F. Blanqui. Encoding of Predicate Subtyping with Proof Irrelevance in the ΛΠ-Calculus Modulo Theory. In Proceedings of the 26th International Conference on Types for Proofs and Programs (TYPES'20), volume 188 of Leibniz International Proceedings in Informatics, pages 6:1--6:18, Turin, Italy, 2021. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.TYPES.2020.6.
BibTex | DOI | Web page | PDF ]
[BCC21b]
M. Boltenhagen, T. Chatain, and J. Carmona. Optimized SAT encoding of conformance checking artefacts. Computing, 103(1):29--50, 2021.
doi: 10.1007/s00607-020-00831-8.
BibTex | DOI | Web page ]
[BCC21a]
M. Boltenhagen, T. Chatain, and J. Carmona. Anti-alignments—Measuring the precision of process models and event logs. Information Systems, 98, 2021. To appear.
doi: https://doi.org/10.1016/j.is.2020.101708.
BibTex | DOI | Web page ]
[BLRPR21]
V. Bruyère, S. Le Roux, A. Pauly, and J. Raskin. On the existence of weak subgame perfect equilibria. 276, 2021.
doi: https://doi.org/10.1016/j.ic.2020.104553.
BibTex | DOI | Web page ]
[BBF+21]
G. Bacci, P. Bouyer, U. Fahrenberg, K. Larsen, N. Markey, and P. Reynier. Optimal and robust controller synthesis using energy timed automata with uncertainty. Formal Aspects of Computing, 33:3--25, 2021.
doi: 10.1007/s00165-020-00521-4.
BibTex | DOI | Web page ]
[DFM21]
S. Demri, R. Fervari, and A. Mansutti. Internal proof calculi for modal logics with separating conjunction. Journal of Logic and Computation, 2021. Accepted for publication to the Special issue of JLC on External and Internal Calculi for Non Classical Logics.
BibTex | Web page | PDF ]
[DLM21b]
S. Demri, É. Lozes, and A. Mansutti. The Effects of Adding Reachability Predicates in Quantifier-Free Separation Logic. ACM Transactions on Computational Logic, 2021. To appear.
BibTex | Web page | PDF ]
[DM21]
B. Dinis and É. Miquey. Realizability with stateful computations for nonstandard analysis. In Proceedings of the 29th Annual EACSL Conference on Computer Science Logic (CSL'21), Leibniz International Proceedings in Informatics, pages 19:1--19:23, Ljubljana, Slovenia, January 2021. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2021.19.
BibTex | DOI | Web page | PDF ]
[Lop21]
A. Lopez. Preservation Theorems Through the Lens of Topology. In Proceedings of the 29th Annual EACSL Conference on Computer Science Logic (CSL'21), Leibniz International Proceedings in Informatics, pages 32:1--32:17, Ljubljana, Slovenia, January 2021. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2021.32.
BibTex | DOI | Web page | PDF ]
[Sch21]
Ph. Schnoebelen. On flat lossy channel machines. In Proceedings of the 29th Annual EACSL Conference on Computer Science Logic (CSL'21), Leibniz International Proceedings in Informatics, pages 37:1--37:22, Ljubljana, Slovenia, January 2021. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2021.37.
BibTex | DOI | Web page | PDF ]
[BRS21]
B. Bollig, F. Ryabinin, and A. Sangnier. Reachability in Distributed Memory Automata. In Proceedings of the 29th Annual EACSL Conference on Computer Science Logic (CSL'21), Leibniz International Proceedings in Informatics, pages 13:1--13:16, Ljubljana, Slovenia, January 2021. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2021.13.
BibTex | DOI | Web page | PDF ]
[LRP21]
S. Le Roux and A. Pauly. Equilibria in multi-player multi-outcome infinite sequential games. Information and Computation, 276, 2021.
doi: https://doi.org/10.1016/j.ic.2020.104557.
BibTex | DOI | Web page ]
[Thi20]
F. Thiré. Meta-theory of Cumulative Types Systems and their embeddings to the ΛΠ-calculus modulo theory. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2020.
BibTex | Web page | PDF ]
[Man20b]
A. Mansutti. Reasoning with Separation Logics: Complexity, Expressive Power, Proof Systems. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2020.
BibTex | Web page | PDF ]
[Gen20a]
G. Genestier. Dependently-Typed Termination and Embedding of Extensional Universe-Polymorphic Type Theory using Rewriting. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2020.
BibTex ]
[HHSY20]
S. Haar, S. Haddad, S. Schwoon, and L. Ye. Active Prediction for Discrete Event Systems. In Proceedings of the 40th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'20), volume 182 of Leibniz International Proceedings in Informatics, pages 48:1--48:16, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi: https://doi.org/10.4230/LIPIcs.FSTTCS.2020.48.
BibTex | DOI | Web page | PDF ]
[BBM20]
N. Bertrand, P. Bouyer, and A. Majumdar. Synthesizing safe coalition strategies. In Proceedings of the 40th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'20), volume 182 of Leibniz International Proceedings in Informatics, pages 39:1--39:17, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi: https://doi.org/10.4230/LIPIcs.FSTTCS.2020.39.
BibTex | DOI | Web page | PDF ]
[GMS20]
P. Gastin, S. Mukherjee, and B. Srivathsan. Reachability for updatable timed automata made faster and more effective. In Proceedings of the 40th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'20), volume 182 of Leibniz International Proceedings in Informatics, pages 47:1--47:17, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi: https://doi.org/10.4230/LIPIcs.FSTTCS.2020.47.
BibTex | DOI | Web page | PDF ]
[AG20]
C. Aiswarya and P. Gastin. Weighted Tiling Systems for Graphs: Evaluation Complexity. In Proceedings of the 40th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'20), volume 182 of Leibniz International Proceedings in Informatics, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi: https://doi.org/10.4230/LIPIcs.FSTTCS.2020.34.
BibTex | DOI | Web page | PDF ]
[For20]
M. Fortin. Expressivity of first-order logic, star-free propositional dynamic logic and communicating automata. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2020.
BibTex | Web page | PDF ]
[CJS20b]
H. Comon, C. Jacomme, and G. Scerri. Oracle simulation: a technique for protocol composition with long term shared secrets. In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS'20), pages 1427--1444, Orlando, USA, November 2020. ACM Press.
doi: 10.1145/3372297.3417229.
BibTex | DOI ]
[BCH20]
M. Boltenhagen, B. Chetioui, and L. Huber. Cost-Based Classification of Log Traces Using Machine-Learning. In Process Mining Workshops (ICPM'20), pages 136--148, Padua, Italy, October 2020. SPRINGER.
doi: https://doi.org/10.1007/978-3-030-72693-5_11.
BibTex | DOI | Web page | PDF ]
[FP20]
A. Finkel and M. Praveen. Verification of Flat FIFO Systems. Logical Methods in Computer Science, 20(4), October 2020.
doi: 10.23638/LMCS-16(4:4)2020.
BibTex | DOI | Web page ]
[CFH+20]
D. Cho, M. Függer, C. Hopper, M. Kushwaha, T. Nowak, and Q. Soubeyran. Distributed Computation with Continual Population Growth. In Proceedings of the 34th International Symposium on Distributed Computing (DISC'20), Leibniz International Proceedings in Informatics, pages 7:1--7:17, Freiburg, Germany, October 2020. Leibniz-Zentrum für Informatik.
doi: https://doi.org/10.4230/LIPIcs.DISC.2020.7.
BibTex | DOI | Web page | PDF ]
[BKM+20]
P. Bouyer, O. Kupferman, N. Markey, B. Maubert, A. Murano, and G. Perelli. Reasoning About Quality and Fuzziness of Strategic Behaviours. In Proceedings of the 24th European Conference on Artificial Intelligence (ECAI'20), pages 2887--2888, Santiago de Compostela, Spain, September 2020. IOS Press.
doi: 10.3233/FAIA200437.
BibTex | DOI | Web page | PDF ]
[SBvdA20]
M. F. Sani, M. Boltenhagen, and W. M. van der Aalst. Prototype Selection using Clustering and Conformance Metrics for Process Discovery. In Business Process Management Workshops (BPM'20), Revised Selected Papers, volume 397 of Lecture Notes in Business Information Processing, pages 281--294, Sevilla, Spain, September 2020. Springer.
doi: https://doi.org/10.1007/978-3-030-66498-5_21.
BibTex | DOI | Web page | PDF ]
[KNR+20]
I. Khmelnitsky, D. Neider, R. Roy, B. Barbot, B. Bollig, A. Finkel, S. Haddad, M. Leucker, and L. Ye. Property-Directed Verification of Recurrent Neural Networks. Research Report 2009.10610, Computing Research Repository, September 2020.
BibTex | Web page | PDF ]
[HPS20]
S. Haar, L. Paulevé, and S. Schwoon. Drawing the Line: Basin Boundaries in Safe Petri Nets. In Proceedings of the 18th Conference on Computational Methods in System Biology (CMSB'20), volume 12314 of Lecture Notes in Bioinformatics, pages 321--336, held online, September 2020. Springer-Verlag.
doi: 10.1007/978-3-030-60327-4_17.
BibTex | DOI ]
[BBR+20]
P. Bouyer, T. Brihaye, M. Randour, C. Rivière, and P. Vandenhove. Decisiveness of Stochastic Systems and its Application to Hybrid Models. In Proceedings of the 11th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'20), volume 326 of Electronic Proceedings in Theoretical Computer Science, page 149?165, Brussels, Belgium, September 2020.
doi: 10.4204/EPTCS.326.10.
BibTex | DOI | Web page | PDF ]
[BBB+20]
B. Bérard, B. Bollig, P. Bouyer, M. Függer, and N. Sznajder. Synthesis in Presence of Dynamic Links. In Proceedings of the 11th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'20), volume 326 of Electronic Proceedings in Theoretical Computer Science, page 33?49, Brussels, Belgium, September 2020.
doi: 10.4204/EPTCS.326.3.
BibTex | DOI | Web page | PDF ]
[DH20b]
S. Donatelli and S. Haddad. Guarded Autonomous Transitions Increase Conciseness and Expressiveness of Timed Automata. In Proceedings of the 18th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'20), Lecture Notes in Computer Science, pages 215--230, Vienna, Austria, September 2020. Springer.
BibTex | Web page ]
[BLRO+20]
P. Bouyer, S. Le Roux, Y. Oualhadj, M. Randour, and P. Vandenhove. Games Where You Can Play Optimally with Arena-Independent Finite Memory. In Proceedings of the 31st International Conference on Concurrency Theory (CONCUR'20), volume 171 of Leibniz International Proceedings in Informatics, pages 24:1--24:22, Vienna, Austria, September 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2020.24.
BibTex | DOI | Web page ]
[AGSW20]
B. Adsul, P. Gastin, S. Sarkar, and P. Weil. Wreath/cascade products and related decomposition results for the concurrent setting of Mazurkiewicz traces. In Proceedings of the 31st International Conference on Concurrency Theory (CONCUR'20), volume 171 of Leibniz International Proceedings in Informatics, pages 19:1--19:17, Vienna, Austria, September 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2020.19.
BibTex | DOI | Web page ]
[BFS20]
B. Bollig, A. Finkel, and A. Suresh. Bounded Reachability Problems are Decidable in FIFO Machines. In Proceedings of the 31st International Conference on Concurrency Theory (CONCUR'20), volume 171 of Leibniz International Proceedings in Informatics, pages 49:1--49:17, Vienna, Austria, September 2020. Leibniz-Zentrum für Informatik.
BibTex | Web page ]
[BD20a]
F. Belardinelli and S. Demri. Reasoning with a Bounded Number of Resources in ATL+. In Proceedings of the 24th European Conference on Artificial Intelligence (ECAI'20), pages 624--631, Santiago de Compostela, Spain, September 2020. IOS Press.
doi: 10.3233/FAIA200147.
BibTex | DOI | Web page | PDF ]
[PKCH20]
L. Paulevé, J. Kolcák, T. Chatain, and S. Haar. Reconciling qualitative, abstract, and scalable modeling of biological networks. Nature Communications, 11(4256), August 2020.
doi: 10.1038/s41467-020-18112-5.
BibTex | DOI | Web page ]
[DTFG20]
G. Douéneau-Tabot, E. Filiot, and P. Gastin. Register transducers are marble transducers. In Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science (MFCS'20), volume 170 of Leibniz International Proceedings in Informatics, pages 29:1--29:14, Prague, Czech Republic, August 2020. Leibniz-Zentrum für Informatik.
doi: https://doi.org/10.4230/LIPIcs.MFCS.2020.29.
BibTex | DOI | Web page | PDF ]
[DD20]
A. Díaz-Caro and G. Dowek. Extensional proofs in a propositional logic modulo isomorphisms. Research Report 2002.03762v3, Computing Research Repository, July 2020.
BibTex | Web page | PDF ]
[BDM20a]
D. Baelde, S. Delaune, and S. Moreau. A Method for Proving Unlinkability of Stateful Protocols. In Proceedings of the 33rd IEEE Computer Security Foundations Symposium (CSF'20), pages 169--183, Boston, MA, USA, July 2020. IEEE Computer Society Press.
BibTex | Web page ]
[BDFM20]
B. Bednarczyk, S. Demri, R. Fervari, and A. Mansutti. Modal Logics with Composition on Finite Forests: Expressivity and Complexity. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'20), pages 167--180, Saarbrucken, Germany, July 2020. IEEE Press.
doi: https://dl.acm.org/doi/10.1145/3373718.3394787.
BibTex | DOI | PDF ]
[HM20]
H. Herbelin and É. Miquey. A calculus of expandable stores. Continuation-and-environment-passing style translations. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'20), pages 564--577, Saarbrucken, Germany, July 2020. IEEE Press.
BibTex | Web page ]
[JKB20]
C. Jacomme, S. Kremer, and G. Barthe. Universal equivalence and majority on probabilistic programs over finite fields. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'20), pages 155--166, Saarbrucken, Germany, July 2020. IEEE Press.
BibTex | Web page ]
[BDM20b]
B. Bednarczyk, S. Demri, and A. Mansutti. A Framework for Reasoning about Dynamic Axioms in Description Logics. In Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI'20). IJCAI organization, July 2020.
BibTex | Web page ]
[HK20]
S. Haddad and I. Khmelnitsky. Dynamic Recursive Petri Nets. In Proceedings of the 41st International Conference on Applications and Theory of Petri Nets (PETRI NETS'20), volume 12152 of Lecture Notes in Computer Science, pages 345--366, Paris, France, June 2020. Springer.
doi: 10.1007/978-3-030-51831-8_17.
BibTex | DOI | Web page ]
[Bla20]
F. Blanqui. Type safety of rewriting rules in dependent types. In Proceedings of the 5th International Conference on Formal Structures for Computation and Deduction (FSCD'20), Leibniz International Proceedings in Informatics, Paris, France, June 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2020.13.
BibTex | DOI | Web page | PDF ]
[Gen20b]
G. Genestier. Encoding Agda Programs using Rewriting. In Proceedings of the 5th International Conference on Formal Structures for Computation and Deduction (FSCD'20), Leibniz International Proceedings in Informatics, Paris, France, June 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2020.31.
BibTex | DOI | Web page | PDF ]
[HB20]
G. Hondet and F. Blanqui. The new rewriting engine of Dedukti (System Description). In Proceedings of the 5th International Conference on Formal Structures for Computation and Deduction (FSCD'20), Leibniz International Proceedings in Informatics, pages 35:1--35:16, Paris, France, June 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2020.35.
BibTex | DOI | Web page | PDF ]
[CFLS20]
S. Carpov, C. Fontaine, D. Ligier, and R. Sirdey. Illuminating the Dark or how to recover what should not be seen in FE-based classifiers. 2020:1--35, May 2020.
doi: 10.2478/popets-2020-0015.
BibTex | DOI | Web page ]
[BFL+20]
J. Bund, M. Függer, C. Lenzen, M. Medina, and W. Rosenbaum. PALS: Plesiochronous and Locally Synchronous Systems. In Proceedings of the 26th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'20), Publication only, May 2020. IEEE Computer Society.
BibTex | PDF ]
[KDH+20]
J. Kolcák, J. Dubut, I. Hasuo, S.-Y. Katsumata, D. Sprunger, and A. Yamada. Relational Differential Dynamic Logic. In Proceedings of the 26th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'20), volume 12078 of Lecture Notes in Computer Science, pages 191--208, Dublin, Ireland, April 2020. Springer.
doi: 10.1007/978-3-030-45190-5_11.
BibTex | DOI | Web page ]
[AGKR20]
S. Akshay, P. Gastin, S. N. Krishna, and S. Roychoudhary. Revisiting Underapproximate Reachability for Multipushdown Systems. In Proceedings of the 26th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'20), volume 12078 of Lecture Notes in Computer Science, pages 387--404, Dublin, Ireland, April 2020. Springer.
doi: 10.1007/978-3-030-45190-5_21.
BibTex | DOI | Web page | PDF ]
[Man20a]
A. Mansutti. An auxiliary logic on trees: on the Tower-hardness of logics featuring reachability and submodel reasoning. In Proceedings of the 23rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Lecture Notes in Computer Science, pages 462--481, Dublin, Ireland, April 2020. Springer.
doi: 10.1007/978-3-030-45231-5_24.
BibTex | DOI ]
[FHK20b]
A. Finkel, S. Haddad, and I. Khmelnitsky. Minimal coverability tree construction made complete and efficient. In Proceedings of the 23rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Lecture Notes in Computer Science, pages 237--256, Dublin, Ireland, April 2020. Springer.
doi: 10.1007/978-3-030-45231-5_13.
BibTex | DOI ]
[BBLS20]
B. Bérard, B. Bollig, M. Lehaut, and N. Sznajder. Parameterized Synthesis for Fragments of First-Order Logic over Data Words. In Proceedings of the 23rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Lecture Notes in Computer Science, pages 97--118, Dublin, Ireland, April 2020. Springer.
doi: 10.1007/978-3-030-45231-5_6.
BibTex | DOI ]
[AVL+20]
N. Alexopoulos, E. Vasilomanolakis, S. Le Roux, S. Rowe, and M. Mühlhäuser. TRIDEnT: Towards a Decentralized Threat Indicator Marketplace. In Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), pages 332--341, Brno, Czech Republic, March 2020. ACM Press.
doi: 10.1145/3341105.3374020.
BibTex | DOI | Web page ]
[DH20a]
S. Donatelli and S. Haddad. Expressiveness and Conciseness of Timed Automata for the Verification of Stochastic Models. In Proceedings of the 14th International Conference on Language and Automata Theory and Applications (LATA'20), volume 12038 of Lecture Notes in Computer Science, pages 170--183, Milan, Italy, March 2020. Springer.
BibTex ]
[BD20b]
D. Berwanger and L. Doyen. Observation and Distinction. Representing Information in Infinite Games. In Proceedings of the 37th Annual Symposium on Theoretical Aspects of Computer Science (STACS'20), Leibniz International Proceedings in Informatics, pages 48:1--48:17, Montpellier, France, March 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2020.48.
BibTex | DOI ]
[ADL20]
N. Alechina, S. Demri, and B. Logan. Parameterised Resource-Bounded ATL. In Proceedings of the 34th AAAI Conference on Artificial Intelligence (AAAI'20), pages 7040--7046. AAAI Press, February 2020.
doi: https://doi.org/10.1609/aaai.v34i05.6189.
BibTex | DOI | Web page ]
[GM20]
J. Goubault-Larrecq and F. Mynard. Convergence without Points. Houston Journal of Mathematics, 46(1):227--282, 2020.
BibTex | PDF ]
[DLM20]
S. Demri, É. Lozes, and A. Mansutti. Internal Calculi for Separation Logics. In Proceedings of the 28th Annual EACSL Conference on Computer Science Logic (CSL'20), Leibniz International Proceedings in Informatics, Barcelona, Spain, January 2020. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2020.19.
BibTex | DOI | Web page ]
[CHK+20]
Th. Chatain, S. Haar, J. Kolcák, L. Paulevé, and A. Thakkar. Concurrency in Boolean networks. Natural Computing, 19:91--109, 2020.
BibTex | Web page | PDF ]
[GBM20]
P. Gardy, P. Bouyer, and N. Markey. Dependences in Strategy Logic. Theory of Computing Systems, 64(3), 2020.
BibTex | Web page | PDF ]
[CJS20a]
T. Chatain, R. Janicki, and N. Sidorova, editors. Proceedings of the 41st Conference on Petri Nets (PN'20), Paris, France, 2020. Springer.
BibTex | Web page ]
[JMS20]
L. Jezequel, A. Madalinski, and S. Schwoon. Distributed computation of vector clocks in Petri net unfoldings for test selection. Discrete Event Dynamic Systems: Theory and Applications, 30(3):441--464, 2020.
BibTex ]
[AMP20]
P. Arrighi, S. Martiel, and S. Perdrix. Reversible causal graph dynamics: invertibility, block representation, vertex-preservation. Natural Computing, 19(1):157--178, 2020.
doi: 10.1007/s11047-019-09768-0.
BibTex | DOI | Web page | PDF ]
[JFA20a]
J. Jerray, L. Fribourg, and É. André. Guaranteed phase synchronization of hybrid oscillators using symbolic Euler's method: The Brusselator and biped examples. Research Report 2006.09993, Computing Research Repository, 2020.
BibTex | Web page | PDF ]
[JFA20b]
J. Jerray, L. Fribourg, and É. André. Robust optimal control using dynamic programming and guaranteed Euler's method. Research Report 2007.13644, Computing Research Repository, 2020.
BibTex | Web page | PDF ]
[JF20]
J. Jerray and L. Fribourg. Generation of bounded invariants via stroboscopic set-valued maps: Application to the stability analysis of parametric time-periodic systems. Research Report 2012.09310, Computing Research Repository, 2020.
BibTex | Web page | PDF ]
[Lop20]
A. Lopez. Preservation Theorems Through the Lens of Topology. Research Report 2007.07879, Computing Research Repository, 2020.
BibTex | Web page | PDF ]
[BCC20]
M. Boltenhagen, T. Chatain, and J. Carmona. Model-based trace variant analysis of event logs. Information Systems, 2020. To appear.
doi: https://doi.org/10.1016/j.is.2020.101675.
BibTex | DOI | Web page ]
[BM20]
B. Barras and V. Maestracci. Implementation of Two Layers Type Theory in Dedukti and Application to Cubical Type Theory. In Proceedings of the 15th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'20), pages 54--67, Paris, France, 2020. ACM Press.
doi: 10.4204/EPTCS.332.4.
BibTex | DOI | Web page | PDF ]
[Fin20]
A. Finkel. From Well Structured Transition Systems to Program Verification. In Proceedings of 8th International Workshop on Verification and Program Transformation and 7th Workshop on Horn Clauses for Verification and Synthesis (VPT/HCVS@ETAPS 2020), pages 44--49, Dublin, Ireland, 2020. Electronic Proceedings in Theoretical Computer Science.
doi: 10.4204/EPTCS.320.3.
BibTex | DOI | Web page | PDF ]
[LR20]
S. Le Roux. Time-Aware Uniformization of Winning Strategies. In Proceedings of the 16th Conference on Computability in Europe (CiE 2020), volume 12098 of Lecture Notes in Computer Science, pages 193--204, Fisciano, Italy, 2020. Springer-Verlag.
doi: https://doi.org/10.1007/978-3-030-51466-2_17.
BibTex | DOI | Web page | PDF ]
[GMG20]
P. Gastin, A. Manuel, and R. Govind. Reversible Regular Languages: Logical and Algebraic Characterisations. Fundamenta Informaticae, 2020. To appear.
BibTex ]
[FHK20a]
A. Finkel, S. Haddad, and I. Khmelnitsky. Commodification of accelerations for the Karp and Miller Construction. Discrete Event Dynamic Systems: Theory and Applications, 2020.
doi: 10.1007/s10626-020-00331-z.
BibTex | DOI | Web page ]
[BHL20]
N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnosis and Degradation Control for Probabilistic Systems. Discrete Event Dynamic Systems: Theory and Applications, 30:695–723, 2020.
doi: 10.1007/s10626-020-00320-2.
BibTex | DOI | Web page ]
[FG20]
A. Finkel and J. Goubault-Larrecq. Forward analysis for WSTS, part I: completions. Mathematical Structures in Computer Science, 30(7):752--832, 2020.
doi: 10.1017/S0960129520000195.
BibTex | DOI | Web page | PDF ]
[GK20]
J. Goubault-Larrecq and B. König, editors. Proceedings of the 23rd Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Dublin, Ireland, 2020. Springer.
BibTex | Web page ]
[BJO20]
F. Blanqui, J. Jouannaud, and M. Okada. Corrigendum to Inductive-data-type systems [Theoret. Comput. Sci. 272 (1-2) (2002) 41-68]. Theoretical Computer Science, 817:81--82, 2020.
doi: 10.1016/j.tcs.2018.01.010.
BibTex | DOI | Web page ]
[BFG20a]
M. Blondin, A. Finkel, and J. Goubault-Larrecq. Forward Analysis for WSTS, Part III: Karp-Miller Trees. Logical Methods in Computer Science, 16(2), 2020.
doi: 10.23638/LMCS-16(2:13)2020.
BibTex | DOI | Web page ]
[DGK20]
V. Dave, P. Gastin, and S. N. Krishna. Regular Transducer Expressions for Regular Transformations. Information and Computation, 2020.
BibTex | Web page | PDF ]
[BFG20b]
B. Bollig, M. Fortin, and P. Gastin. Communicating Finite-State Machines, First-Order Logic, and Star-Free Propositional Dynamic Logic. Journal of Computer and System Sciences, pages 22--53, 2020.
doi: 10.1016/j.jcss.2020.06.006.
BibTex | DOI | PDF ]
[Gou20b]
J. Goubault-Larrecq. Some Topological Properties of Spaces of Lipschitz Continuous Maps on Quasi-Metric Spaces. Topology and its Applications, 282, 2020.
doi: 10.1016/j.topol.2020.107281.
BibTex | DOI | Web page ]
[LRP20]
S. Le Roux and A. Pauly. A Semi-Potential for Finite and Infinite Games in Extensive Form. Dynamic Games and Applications, 10(1):120--144, 2020.
doi: 10.1007/s13235-019-00301-7.
BibTex | DOI | Web page ]
[BFLM20]
J. Bund, M. Függer, C. Lenzen, and M. Medina. Synchronizer-free Digital Link Controller. IEEE Transactions on Circuits and Systems I, 67(10):3562--3573, 2020.
doi: 10.1109/TCSI.2020.2989552.
BibTex | DOI | Web page ]
[FKN20]
M. Függer, M. Kushwaha, and T. Nowak. Digital Circuit Design for Biological and Silicon Computers. In Advances in Synthetic Biology. Springer, 2020. To appear.
BibTex ]
[FNW20]
M. Függer, T. Nowak, and K. Winkler. On the radius of nonsplit graphs and information dissemination in dynamic networks. Discrete Applied Mathematics, 282:257--264, 2020.
doi: 10.1016/j.dam.2020.02.013.
BibTex | DOI | Web page ]
[ABF20]
P. Arrighi, C. Bény, and T. Farrelly. A quantum cellular automaton for one-dimensional QED. Quantum Information Processing, 19(88), 2020.
doi: 10.1007/s11128-019-2555-4.
BibTex | DOI | Web page ]
[MA20]
G. D. Molfetta and P. Arrighi. A quantum walk with both a continuous-time limit and a continuous-spacetime limit. Quantum Information Processing, 19(47), 2020.
doi: 10.1007/s11128-019-2549-2.
BibTex | DOI | Web page ]
[BFNS20]
D. Baelde, A. P. Felty, G. Nadathur, and A. Saurin. A special issue on structural proof theory, automated reasoning and computation in celebration of Dale Miller's 60th birthday. Mathematical Structures in Computer Science, 29(8):1007--1008, 2020.
doi: 10.1017/S0960129519000136.
BibTex | DOI ]
[BGHLR20]
T. Brihaye, G. Geeraerts, M. Hallet, and S. Le Roux. On the termination of dynamics in sequential games. Information and Computation, 272, 2020.
doi: 10.1016/j.ic.2019.104505.
BibTex | DOI ]
[JLDJ20]
Y. Jiang, J. Liu, G. Dowek, and K. Ji. Towards Combining Model Checking and Proof Checking. The Computer Journal, 62(9):1365--1402, 2020.
doi: 10.1093/comjnl/bxy112.
BibTex | DOI | PDF ]
[BBC+20]
G. Burel, G. Bury, R. Cauderlier, D. Delahaye, P. Halmagrand, and O. Hermant. First-Order Automated Reasoning with Theories: When Deduction Modulo Theory Meets Practice. Journal of Automated Reasoning, 64:1001--1050, 2020.
doi: 10.1007/s10817-019-09533-z.
BibTex | DOI | Web page | PDF ]
[GHK+20]
J. Goubault-Larrecq, S. Halfon, P. Karandikar, K. Narayan Kumar, and Ph. Schnoebelen. The Ideal Approach to Computing Closed Subsets in Well-Quasi-Orderings. In Well-Quasi Orders in Computation, Logic, Language and Reasoning, volume 53 of Trends In Logic, pages 55--105. Springer, 2020.
doi: 10.1007/978-3-030-30229-0_3.
BibTex | DOI ]
[DSS20]
M. Džamonja, S. Schmitz, and Ph. Schnoebelen. On Ordinal Invariants in Well Quasi Orders and Finite Antichain Orders. In Well-Quasi Orders in Computation, Logic, Language and Reasoning, volume 53 of Trends In Logic, pages 2--54. Springer, 2020.
doi: 10.1007/978-3-030-30229-0_2.
BibTex | DOI ]
[Gou20a]
J. Goubault-Larrecq. Π02 Subsets of Domain-Complete Spaces and Countably Correlated Spaces. Topology Proceedings, 58:13--22, 2020. E-published on March 24, 2020.
BibTex | PDF ]
[BHL19]
N. Bertrand, S. Haddad, and E. Lefaucheux. A Tale of Two Diagnoses in Probabilistic Systems. Information and Computation, 269, December 2019.
doi: 10.1016/j.ic.2019.104441.
BibTex | DOI | PDF ]
[GF19]
E. Gupta and A. Finkel. The well structured problem for Presburger counter machines. In Proceedings of the 39th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'19), Leibniz International Proceedings in Informatics, pages 41:1--41:15, Bombay, India, December 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2019.41.
BibTex | DOI | Web page | PDF ]
[BBM19a]
N. Bertrand, P. Bouyer, and A. Majumdar. Concurrent parameterized games. In Proceedings of the 39th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'19), Leibniz International Proceedings in Informatics, pages 31:1--31:15, Bombay, India, December 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2019.31.
BibTex | DOI | Web page | PDF ]
[Man19]
H. Mandon. Algorithms for Cell Reprogramming Strategies in Boolean Networks. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2019.
BibTex | Web page | PDF ]
[LF19a]
A. Le Coënt and L. Fribourg. Guaranteed Control of Sampled Switched Systems using Semi-Lagrangian Schemes and One-Sided Lipschitz Constants. In Proceedings of the 58th IEEE Conference on Decision and Control (CDC'19), pages 599--604, Nice, France, December 2019. IEEE Control System Society.
doi: 10.1109/CDC40024.2019.9029376.
BibTex | DOI | Web page | PDF ]
[CG19]
A. Chattopadhyay and P. Gastin, editors. Proceedings of the 39th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'19), Leibniz International Proceedings in Informatics, Bombay, India, December 2019. Leibniz-Zentrum für Informatik.
BibTex | Web page ]
[Gon19]
M. González. Stochastic Games on Graphs with Applications to Smart-Grids Optimization. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2019.
BibTex | Web page | PDF ]
[FHK19b]
A. Finkel, S. Haddad, and I. Khmelnitsky. Réification des accélérations pour la construction de Karp et Miller. In Actes du 12ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'19), Angers, France, November 2019. HAL.
BibTex | Web page | PDF ]
[DH19b]
S. Donatelli and S. Haddad. Autonomous Transitions Enhance CSLTA Expressiveness and Conciseness. Research Report hal-02306021, HAL, October 2019. 23 pages.
BibTex | Web page | PDF ]
[Sao19]
A. Saoud. Compositional and Efficient Controller Synthesis for Cyber-Physical Systems. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, October 2019.
BibTex | Web page | PDF ]
[LF19b]
A. Le Coënt and L. Fribourg. Guaranteed Optimal Reachability Control of Reaction-Diffusion Equations Using One-Sided Lipschitz Constants and Model Reduction. In 9th International Workshop on Cyber Physical Systems (CyPhy'19) and 15th International Workshop on Model-Based Design (WESE'19), Revised Selected Papers, volume 11971 of Lecture Notes in Computer Science, pages 181--202, New York City, NY, USA, October 2019. Springer.
doi: 10.1007/978-3-030-41131-2_9.
BibTex | DOI | Web page ]
[Bou19a]
P. Bouyer. A Note on Game Theory and Verification (Invited Talk). In Proceedings of the 17th International Symposium on Automated Technology for Verification and Analysis (ATVA'19), volume 11781 of Lecture Notes in Computer Science, pages 3--22, Taipei, Taiwan, October 2019. Springer.
doi: 10.1007/978-3-030-31784-3_1.
BibTex | DOI ]
[Bou19b]
P. Bouyer. On the Computation of Nash Equilibria in Games on Graphs (Invited Talk). In Proceedings of the 26th International Symposium on Temporal Representation and Reasoning (TIME'19), Leibniz International Proceedings in Informatics, pages 3:1--3:3, Málaga, Spain, October 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.TIME.2019.3.
BibTex | DOI ]
[MSH+19]
H. Mandon, C. Su, S. Haar, J. Pang, and L. Paulevé. Sequential Reprogramming of Boolean Networks Made Practical. In Proceedings of the 17th Conference on Computational Methods in System Biology (CMSB'19), volume 11773 of Lecture Notes in Bioinformatics, pages 3--19, Trieste, Italy, September 2019. Springer-Verlag.
doi: 10.1007/978-3-030-31304-3_1.
BibTex | DOI ]
[SZ19]
S. Schmitz and G. Zetzsche. Coverability Is Undecidable in One-Dimensional Pushdown Vector Addition Systems with Resets. In Proceedings of the 13th Workshop on Reachability Problems in Computational Models (RP'19), volume 11674 of Lecture Notes in Computer Science, pages 193--201, Brussels, Belgium, September 2019. Springer.
doi: 10.1007/978-3-030-30806-3_15.
BibTex | DOI | Web page | PDF ]
[DT19]
G. Douéneau-Tabot. Register Models for Pebble Transducers and Applications to Optimization. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2019.
BibTex ]
[Gri19]
E. Grienenberger. Concept alignment in Logipedia - Alignement of logical connectives between HOL Light and Dedukti. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2019.
BibTex ]
[Lop19]
A. Lopez. Théorèmes de préservation. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2019.
BibTex ]
[Sur19]
A. Suresh. Termination, boundedness and reachability for input-bounded FIFO Machines. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2019.
BibTex ]
[Jaz19]
S. Jaziri. Automata on Timed Structures. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, September 2019.
BibTex | Web page | PDF ]
[Kou19c]
A. Koutsos. Preuves symboliques de propriétés d'indistinguabilité calculatoire. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, September 2019.
BibTex | Web page | PDF ]
[BCC19a]
M. Boltenhagen, T. Chatain, and J. Carmona. Encoding Conformance Checking Artefacts in SAT. In Business Process Management Workshops (BPM'19), Revised Selected Papers, volume 362 of Lecture Notes in Business Information Processing, pages 160--171, Vienna, Austria, September 2019. Springer.
doi: 10.1007/978-3-030-37453-2_14.
BibTex | DOI | Web page | PDF ]
[EHBB19]
M. El Haddad, G. Burel, and F. Blanqui. Ekstrakto: A tool to reconstruct Dedukti proofs from TSTP files (extended abstract). In Proceedings of the 6th Workshop on Proof eXchange for Theorem Proving (PxTP'19), volume 301 of Electronic Proceedings in Theoretical Computer Science, pages 27--35, Natal, Brazil, August 2019.
BibTex | Web page | PDF ]
[GMG19]
P. Gastin, A. Manuel, and R. Govind. Logics for Reversible Regular Languages and Semigroups with Involution. In Proceedings of the 23th International Conference on Developments in Language Theory (DLT'19), volume 11647 of Lecture Notes in Computer Science, pages 182--191, Warsaw, Poland, August 2019. Springer.
doi: 10.1007/978-3-030-24886-4_13.
BibTex | DOI | Web page | PDF ]
[DG19]
M. Droste and P. Gastin. Aperiodic Weighted Automata and Weighted First-Order Logic. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'19), volume 138 of Leibniz International Proceedings in Informatics, pages 76:1--76:15, Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2019.76.
BibTex | DOI | Web page | PDF ]
[BT19]
P. Bouyer and N. Thomasset. Nash equilibria in games over graphs equipped with a communication mechanism. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'19), volume 138 of Leibniz International Proceedings in Informatics, pages 9:1--9:14, Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2019.9.
BibTex | DOI | Web page | PDF ]
[BBM19b]
N. Bertrand, P. Bouyer, and A. Majumdar. Reconfiguration and message losses in parameterized broadcast networks. In Proceedings of the 30th International Conference on Concurrency Theory (CONCUR'19), volume 140 of Leibniz International Proceedings in Informatics, pages 32:1--32:15, Amsterdam, The Netherlands, August 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2019.32.
BibTex | DOI | Web page | PDF ]
[FP19]
A. Finkel and M. Praveen. Verification of Flat FIFO Systems. In Proceedings of the 30th International Conference on Concurrency Theory (CONCUR'19), volume 140 of Leibniz International Proceedings in Informatics, pages 12:1--12:17, Amsterdam, The Netherlands, August 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2019.12.
BibTex | DOI | Web page | PDF ]
[DFKN19]
J. Danger, L. Fribourg, U. Kühne, and M. Naceur. LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection. In Proceedings of the 22nd Euromicro Conference on Digital System Design (DSD'19), pages 269--276, Kallithea, Greece, August 2019. IEEE Press.
doi: 10.1109/DSD.2019.00047.
BibTex | DOI | Web page ]
[Kou19b]
A. Koutsos. Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. In Proceedings of the 32nd IEEE Computer Security Foundations Symposium (CSF'19), pages 48--61, Hoboken, NJ, USA, July 2019. IEEE Computer Society Press.
doi: 10.1109/CSF.2019.00011.
BibTex | DOI | PDF ]
[GMS19]
P. Gastin, S. Mukherjee, and B. Srivathsan. Fast algorithms for handling diagonal constraints in timed automata. In Proceedings of the 31st International Conference on Computer Aided Verification (CAV'19), volume 11561 of Lecture Notes in Computer Science, pages 41--59, New York, USA, July 2019. Springer.
doi: 10.1007/978-3-030-25540-4_3.
BibTex | DOI | Web page | PDF ]
[BKM+19]
P. Bouyer, O. Kupferman, N. Markey, B. Maubert, A. Murano, and G. Perelli. Reasoning about Quality and Fuzziness of Strategic Behaviours. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19), pages 1588--1594. IJCAI organization, July 2019.
doi: 10.24963/ijcai.2019/220.
BibTex | DOI | Web page | PDF ]
[Sch19]
S. Schmitz. The Parametric Complexity of Lossy Counter Machines. In Proceedings of the 46th International Colloquium on Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz International Proceedings in Informatics, pages 129:1--129:15, Patras, Greece, July 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2019.129.
BibTex | DOI | Web page | PDF ]
[For19]
M. Fortin. FO = FO3 for linear orders with monotone binary relations. In Proceedings of the 46th International Colloquium on Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz International Proceedings in Informatics, pages 116:1--116:13, Patras, Greece, July 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2019.116.
BibTex | DOI | Web page | PDF ]
[BGJ+19]
G. Barthe, B. Grégoire, C. Jacomme, S. Kremer, and P.-Y. Strub. Symbolic methods in computational cryptography proofs. In Proceedings of the 32nd IEEE Computer Security Foundations Symposium (CSF'19), pages 136--151, Hoboken, NJ, USA, July 2019. IEEE Computer Society Press.
doi: 10.1109/CSF.2019.00017.
BibTex | DOI | Web page | PDF ]
[Lic19]
A. Lick. XPath-like Query Logics: Proof Systems and Real-World Applicability. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, July 2019.
BibTex | Web page | PDF ]
[ÖMFS19]
D. Öhlinger, J. Maier, M. Függer, and U. Schmid. The Involution Tool for Accurate Digital Timingand Power Analysis. In Proceedings of the 29th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS'19), pages 1--8, Rhodes, Greece, July 2019. IEEE Press.
doi: 10.1109/PATMOS.2019.8862165.
BibTex | DOI | Web page ]
[BLS19]
D. Baelde, A. Lick, and S. Schmitz. Decidable XPath Fragments in the Real World. In Proceedings of the 38th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'19), pages 285--302, Amsterdam, Netherlands, June-July 2019. ACM Press.
doi: 10.1145/3294052.3319685.
BibTex | DOI | Web page ]
[Gen19]
G. Genestier. SizeChangeTool: A Termination Checker for Rewriting Dependent Types. In Proceedings of the 10th International Workshop on Higher-Order Rewriting (HOR'19), pages 14--19, Dortmund, Germany, June 2019.
BibTex | PDF ]
[dBGJL19]
M. de Brecht, J. Goubault-Larrecq, X. Jia, and Z. Lyu. Domain-complete and LCS-complete Spaces. In Proceedings of the International Symposium on Domain Theory (ISDT'19), volume 345 of Electronic Notes in Theoretical Computer Science, pages 3--35, Yangzhou, China, June 2019. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2019.07.014.
BibTex | DOI ]
[GJ19]
J. Goubault-Larrecq and X. Jia. Algebras of the Extended Probabilistic Powerdomain Monad. In Proceedings of the International Symposium on Domain Theory (ISDT'19), volume 345 of Electronic Notes in Theoretical Computer Science, pages 37--61, Yangzhou, China, June 2019. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2019.07.015.
BibTex | DOI ]
[BGH19]
F. Blanqui, G. Genestier, and O. Hermant. Dependency Pairs Termination in Dependent Type Theory Modulo Rewriting. In Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz International Proceedings in Informatics, pages 9:1--9:21, Dortmund, Germany, June 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2019.9.
BibTex | DOI | Web page | PDF ]
[DD19]
A. Díaz-Caro and G. Dowek. Proof Normalisation in a Logic Identifying Isomorphic Propositions. In Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz International Proceedings in Informatics, pages 14:1--14:23, Dortmund, Germany, June 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2019.14.
BibTex | DOI | Web page | PDF ]
[Gas19]
P. Gastin. Modular Descriptions of Regular Functions. In Proceedings of the 8th International Conference on Algebraic Informatics (CAI'19), volume 11545 of Lecture Notes in Computer Science, pages 3--9, Nis, Serbia, June 2019. Springer. Invited talk.
doi: 10.1007/978-3-030-21363-3_1.
BibTex | DOI | PDF ]
[Kou19a]
A. Koutsos. The 5G-AKA Authentication Protocol Privacy. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), pages 464--479, Stockholm, Sweden, June 2019. IEEE Press.
doi: 10.1109/EuroSP.2019.00041.
BibTex | DOI | PDF ]
[BCC19b]
M. Boltenhagen, T. Chatain, and J. Carmona. Generalized Alignment-Based Trace Clustering of Process Behavior. In Proceedings of the 40th International Conference on Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, pages 237--257, Aachen, Germany, June 2019. Springer.
doi: 10.1007/978-3-030-21571-2_14.
BibTex | DOI | Web page | PDF ]
[BD19b]
F. Belardinelli and S. Demri. Resource-bounded ATL: the Quest for Tractable Fragments. In Proceedings of the 18th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS'19), pages 206--214, Montreal, Canada, June 2019. ACM Press.
BibTex | Web page | PDF ]
[DFM19]
S. Demri, R. Fervari, and A. Mansutti. Axiomatising logics with separating conjunctions and modalities. In Proceedings of the 16th European Conference on Logics in Artificial Intelligence (JELIA'19), volume 11468 of Lecture Notes in Artificial Intelligence, pages 692--708, Rende, Italy, June 2019. Springer.
doi: 10.1007/978-3-030-19570-0_45.
BibTex | DOI | Web page | PDF ]
[FHK19a]
A. Finkel, S. Haddad, and I. Khmelnitsky. Coverability and Termination in Recursive Petri Nets. In Proceedings of the 40th International Conference on Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, pages 429--448, Aachen, Germany, June 2019. Springer.
doi: 10.1007/978-3-030-21571-2_23.
BibTex | DOI | Web page | PDF ]
[Gou19c]
J. Goubault-Larrecq. A Probabilistic and Non-Deterministic Call-by-Push-Value Language. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785809.
BibTex | DOI ]
[AGJK19]
S. Akshay, P. Gastin, V. Jugé, and S. N. Krishna. Timed systems through the lens of logic. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785684.
BibTex | DOI | Web page | PDF ]
[BD19a]
B. Bednarczyk and S. Demri. Why propositional quantification makes modal logics on trees robustly hard ? In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785656.
BibTex | DOI | PDF ]
[CD19]
K. Chatterjee and L. Doyen. Graph Planning with Expected Finite Horizon. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785706.
BibTex | DOI ]
[LS19b]
J. Leroux and S. Schmitz. Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785796.
BibTex | DOI | Web page ]
[JS19]
P. Jančar and S. Schmitz. Bisimulation Equivalence of First-Order Grammars is ACKERMANN-Complete. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--12, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785848.
BibTex | DOI | Web page ]
[ZSGF19]
D. Zonetti, A. Saoud, A. Girard, and L. Fribourg. A symbolic approach to voltage stability and power sharing in time-varyingDC microgrids. In Proceedings of the 18th European Control Conference (ECC'19), pages 903--909, Naples, Italy, June 2019. IEEE Press.
doi: 10.23919/ECC.2019.8796095.
BibTex | DOI | Web page ]
[ACF+19]
É. André, E. Coquard, L. Fribourg, J. Jerray, and D. Lesens. Parametric Schedulability Analysis of a Launcher Flight Control System Under Reactivity Constraints. In Proceedings of the 19th International Conference on Application of Concurrency to System Design (ACSD'19), pages 13--22, Aachen, Germany, June 2019. IEEE Computer Society Press.
doi: 10.1109/ACSD.2019.00006.
BibTex | DOI | Web page ]
[DH19a]
S. Donatelli and S. Haar, editors. Proceedings of the 40th International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, Aachen, Germany, June 2019. Springer.
doi: 10.1007/978-3-030-21571-2.
BibTex | DOI | Web page ]
[MFNS19]
J. Maier, M. Függer, T. Nowak, and U. Schmid. Transistor-Level Analysis of Dynamic Delay Models. In Proceedings of the 25th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'19), pages 76--85, Hirosaki, Japan, May 2019. IEEE Computer Society.
doi: 10.1109/ASYNC.2019.00019.
BibTex | DOI ]
[Bur19]
G. Bury. Integrating rewriting, tableau and superposition into SMT. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, May 2019.
BibTex | Web page | PDF ]
[KS19]
P. Karandikar and Ph. Schnoebelen. The height of piecewise-testable languages and the complexity of the logic of subwords. Logical Methods in Computer Science, 15(2):6:1--6:27, April 2019.
BibTex | Web page | PDF ]
[BBR19]
B. Bollig, P. Bouyer, and F. Reiter. Identifiers in Registers - Describing Network Algorithms with Logic. In Proceedings of the 22nd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'19), volume 11425 of Lecture Notes in Computer Science, pages 115--132, Prague, Czech Republic, April 2019. Springer.
doi: 10.1007/978-3-030-17127-8.
BibTex | DOI | Web page | PDF ]
[CLS19]
S. Colin, R. Lepigre, and G. Scherer. Unboxing Mutually Recursive Type Definitions. In Actes des 30èmes Journées Francophones sur les Langages Applicatifs (JFLA'19), Lamoura, France, January 2019. To appear.
BibTex | PDF ]
[AFMS19]
É. André, L. Fribourg, J.-M. Mota, and R. Soulat. Verification of an industrial asynchronous leader election algorithm using abstractions and parametric model checking. In Proceedings of the 20th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'19), Lecture Notes in Computer Science, pages 409--424, Cascais/Lisbon, Portugal, January 2019. Springer.
BibTex | PDF ]
[HKP19]
S. Haar, J. Kolcák, and L. Paulevé. Combining Refinement of Parametric Models with Goal-Oriented Reduction of Dynamics. In Proceedings of the 20th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'19), Lecture Notes in Computer Science, pages 555--576, Cascais/Lisbon, Portugal, January 2019. Springer.
BibTex | Web page | PDF ]
[Gou19d]
J. Goubault-Larrecq. A semantics for nabla. Mathematical Structures in Computer Science, 29:1250--1274, 2019.
doi: 10.1017/S0960129518000063.
BibTex | DOI | Web page ]
[KŠHP19]
J. Kolcák, D. Šafránek, S. Haar, and L. Paulevé. Parameter Space Abstraction and Unfolding Semantics of Discrete Regulatory Networks. Theoretical Computer Science, 765:120--144, 2019.
doi: 10.1016/j.tcs.2018.03.009.
BibTex | DOI | Web page | PDF ]
[Gou19a]
J. Goubault-Larrecq. Fooling the Parallel or Tester with Probability 8/27. In The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy---Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday, volume 11760 of Lecture Notes in Computer Science, pages 313--328. Springer, 2019. Updated version on arXiv:1903.12653.
BibTex | Web page ]
[BQS19]
B. Bollig, K. Quaas, and A. Sangnier. The Complexity of Flat Freeze LTL. Logical Methods in Computer Science, 15(3):32:1--32:26, 2019.
doi: 10.23638/LMCS-15(3:32)2019.
BibTex | DOI | Web page | PDF ]
[DF19]
S. Demri and R. Fervari. The power of modal separation logics. Journal of Logic and Computation, 29(8):1139--1184, 2019.
BibTex | PDF ]
[Gou19b]
J. Goubault-Larrecq. Formal Ball Monads. Topology and its Applications, 263:372--391, 2019.
doi: 10.1016/j.topol.2019.06.044.
BibTex | DOI | Web page ]
[HBD19]
L. Hirschi, D. Baelde, and S. Delaune. A method for unbounded verification of privacy-type properties. Journal of Computer Security, 27(3):277--342, 2019.
doi: 10.3233/JCS-171070.
BibTex | DOI | Web page | PDF ]
[MSP+19]
H. Mandon, C. Su, J. Pang, S. Paul, S. Haar, and L. Paulevé. Algorithms for the Sequential Reprogramming of Boolean Networks. IEEE/ACM Transaction on Computational Biology and Bioinformatics, 16(5):1610--1619, 2019.
BibTex | Web page | PDF ]
[HS19]
S. Halfon and Ph. Schnoebelen. On shuffle products, acyclic automata and piecewise-testable languages. Information Processing Letters, 145:68--73, 2019.
doi: 10.1016/j.ipl.2019.01.012.
BibTex | DOI ]
[LS19a]
R. Lazić and S. Schmitz. The Ideal View on Rackoff's Coverability Technique. Information and Computation, 2019. To appear.
BibTex | Web page ]
[DDR19]
A. Díaz-Caro, G. Dowek, and J. P. Rinaldi. Two linearities for quantum computing in the lambda calculus. Biosystems, 186, 2019.
doi: 10.1016/j.biosystems.2019.104012.
BibTex | DOI | Web page ]
[vdACCvD19]
W. M. P. van der Aalst, J. Carmona, T. Chatain, and B. F. van Dongen. A Tour in Process Mining: From Practice to Algorithmic Challenges. Transactions on Petri Nets and Other Models of Concurrency, 14:1--35, 2019.
doi: 10.1007/978-3-662-60651-3_1.
BibTex | DOI | Web page ]
[FNNS19]
M. Függer, R. Najvirt, T. Nowak, and U. Schmid. A faithful binary circuit model. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019.
doi: 10.1109/TCAD.2019.2937748.
BibTex | DOI | Web page ]
[LPSS19]
J. Leroux, M. Praveen, G. Sutre, and Ph. Schnoebelen. On Functions Weakly Computable by Pushdown Petri Nets and Related Systems. Logical Methods in Computer Science, 15(4), 2019.
doi: 10.23638/LMCS-15(4:15)2019.
BibTex | DOI | PDF ]
[LPR18]
S. Le Roux, A. Pauly, and M. Randour. Extending finite-memory determinacy to Boolean combinations of winning conditions. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 38:1--38:20, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.38.
BibTex | DOI | Web page | PDF ]
[Man18]
A. Mansutti. Extending propositional separation logic for robustness properties. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 42:1--42:23, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.42.
BibTex | DOI | Web page | PDF ]
[BHH18]
B. Bérard, S. Haar, and L. Hélouët. Hyper Partial Order Logic. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 20:1--20:21, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.20.
BibTex | DOI | Web page | PDF ]
[FLS18]
A. Finkel, J. Leroux, and G. Sutre. Reachability for Two-Counter Machines with One Test and One Reset. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 31:1--31:14, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.31.
BibTex | DOI | Web page | PDF ]
[BLS18b]
D. Baelde, A. Lick, and S. Schmitz. A Hypersequent Calculus with Clusters for Tense Logic over Ordinals. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 15:1--15:19, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.15.
BibTex | DOI | Web page | PDF ]
[Dal18]
A. Dallon. Verification of indistinguishability properties in cryptographic protocols -- Small attacks and efficient decision with SAT-Equiv. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2018.
BibTex | Web page | PDF ]
[Dup18]
Y. Duplouy. Applying Formal Methods to Autonomous Vehicle Control. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2018.
BibTex | Web page ]
[BJM18]
P. Bouyer, S. Jaziri, and N. Markey. Efficient Timed Diagnosis Using Automata with Timed Domains. In Proceedings of the 18th Workshop on Runtime Verification (RV'18), volume 11237 of Lecture Notes in Computer Science, pages 205--221, Limassol, Cyprus, November 2018. Springer.
doi: 10.1007/978-3-030-03769-7_12.
BibTex | DOI | Web page | PDF ]
[Dem18a]
S. Demri. On temporal and separation logics. In Proceedings of the 25th International Symposium on Temporal Representation and Reasoning (TIME'18), Leibniz International Proceedings in Informatics, pages 1:1--1:4, Warsaw, Poland, October 2018. Leibniz-Zentrum für Informatik.
BibTex | Web page ]
[CHK+18]
Th. Chatain, S. Haar, J. Kolcák, A. Thakkar, and L. Paulevé. Concurrency in Boolean networks. Research Report hal-01893106, HAL, October 2018. 33 pages.
BibTex | Web page | PDF ]
[BFG+18a]
G. Barthe, X. Fan, J. Gancher, B. Grégoire, C. Jacomme, and E. Shi. Symbolic Proofs for Lattice-Based Cryptography. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18), pages 538--555, Toronto, Canada, October 2018. ACM Press.
BibTex | Web page | PDF ]
[FN18]
M. Függer and Th. Nowak. Fast Multidimensional Asymptotic and Approximate Consensus. In Proceedings of the 32nd International Symposium on Distributed Computing (DISC'18), volume 121 of Leibniz International Proceedings in Informatics, pages 27:1--27:15, New Orleans, USA, October 2018. Leibniz-Zentrum für Informatik.
BibTex | Web page ]
[BLS18c]
B. Bollig, M. Lehaut, and N. Sznajder. Round-Bounded Control of Parameterized Systems. In Proceedings of the 16th International Symposium on Automated Technology for Verification and Analysis (ATVA'18), volume 11138 of Lecture Notes in Computer Science, pages 370--386, Los Angeles, California, USA, October 2018. Springer.
doi: 10.1007/978-3-030-01090-4_22.
BibTex | DOI | Web page ]
[BBBC18]
N. Bertrand, P. Bouyer, T. Brihaye, and P. Carlier. When are Stochastic Transition Systems Tameable? Journal of Logic and Algebraic Methods in Programming, 99:41--96, October 2018.
doi: 10.1016/j.jlamp.2018.03.004.
BibTex | DOI | Web page | PDF ]
[BGMR18]
P. Bouyer, M. González, N. Markey, and M. Randour. Multi-weighted Markov Decision Processes with Reachability Objectives. In Proceedings of the 9th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'18), volume 277 of Electronic Proceedings in Theoretical Computer Science, pages 250--264, Saarbrücken, Germany, September 2018.
doi: 10.4204/EPTCS.277.18.
BibTex | DOI | Web page | PDF ]
[BDH18]
D. Baelde, S. Delaune, and L. Hirschi. POR for Security Protocol Equivalences - Beyond Action-Determinism. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 385--405, Barcelona, Spain, September 2018. Springer.
doi: 10.1007/978-3-319-99073-6_19.
BibTex | DOI | Web page ]
[CDD18]
V. Cortier, A. Dallon, and S. Delaune. Efficiently Deciding Equivalence for Standard Primitives and Phases. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 491--511, Barcelona, Spain, September 2018. Springer.
doi: 10.1007/978-3-319-99073-6_24.
BibTex | DOI | Web page | PDF ]
[Hil18]
M. Hilaire. Complexity of the reachability problem for parametric timed automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2018.
BibTex | PDF ]
[Lef18]
E. Lefaucheux. Controlling Information in Probabilistic Systems. Thèse de doctorat, Université Rennes 1, Rennes, France, September 2018.
BibTex | Web page | PDF ]
[Gro18]
N. Grosshans. The limits of Nečiporuk's method and the power of programs over monoids taken from small varieties of finite monoids. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, September 2018.
BibTex | Web page | PDF ]
[BBJ18]
B. Bérard, P. Bouyer, and V. Jugé. Finite bisimulations for dynamical systems with overlapping trajectories. In Proceedings of the 27th Annual EACSL Conference on Computer Science Logic (CSL'18), Leibniz International Proceedings in Informatics, Birmingham, UK, September 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2018.26.
BibTex | DOI | Web page | PDF ]
[GMS18]
P. Gastin, S. Mukherjee, and B. Srivathsan. Reachability in timed automata with diagonal constraints. In Proceedings of the 29th International Conference on Concurrency Theory (CONCUR'18), volume 118 of Leibniz International Proceedings in Informatics, pages 28:1--28:17, Beijing, China, September 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2018.28.
BibTex | DOI | Web page | PDF ]
[BFG18c]
B. Bollig, M. Fortin, and P. Gastin. It Is Easy to Be Wise After the Event: Communicating Finite-State Machines Capture First-Order Logic with ”Happened Before”. In Proceedings of the 29th International Conference on Concurrency Theory (CONCUR'18), volume 118 of Leibniz International Proceedings in Informatics, pages 7:1--7:17, Beijing, China, September 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2018.7.
BibTex | DOI | Web page | PDF ]
[GL18]
J. Goubault-Larrecq and J.-P. Lachance. On the Complexity of Monitoring Orchids Signatures, and Recurrence Equations. Formal Methods in System Design, 53(1):6--32, August 2018. Special issue of RV'16.
doi: 10.1007/s10703-017-0303-x.
BibTex | DOI | Web page ]
[Bur18a]
G. Burel. Linking Focusing and Resolution with Selection. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'18), volume 117 of Leibniz International Proceedings in Informatics, pages 9:1--9:14, Liverpool, UK, August 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2018.9.
BibTex | DOI | Web page | PDF ]
[CHP18b]
Th. Chatain, S. Haar, and L. Paulevé. Most Permissive Semantics of Boolean Networks. Research Report 1808.10240, Computing Research Repository, August 2018. 15 pages.
BibTex | Web page | PDF ]
[BLS18a]
D. Baelde, A. Lick, and S. Schmitz. A Hypersequent Calculus with Clusters for Linear Frames. In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'18), pages 36--55, Bern, Switzerland, August 2018. College Publications.
BibTex | Web page ]
[DF18]
S. Demri and R. Fervari. On the complexity of modal separation logics. In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'18), pages 179--198, Bern, Switzerland, August 2018. College Publications.
BibTex | Web page | PDF ]
[FFL18]
S. Friedrichs, M. Függer, and C. Lenzen. Metastability-Containing Circuits. IEEE Transactions on Computers, 67(8):1167--1183, August 2018.
doi: 10.1109/TC.2018.2808185.
BibTex | DOI | Web page ]
[BMR+18]
P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and S. Laursen. Average-energy games. Acta Informatica, 55(2):91--127, July 2018.
doi: 10.1007/s00236-016-0274-1.
BibTex | DOI | Web page | PDF ]
[HM18]
S. Haddad and B. Monmege. Interval iteration algorithm for MDPs and IMDPs. Theoretical Computer Science, 735:111--131, July 2018.
doi: 10.1016/j.tcs.2016.12.003.
BibTex | DOI | Web page ]
[BG18]
F. Blanqui and G. Genestier. Termination of λΠ modulo rewriting using the size-change principle. In Proceedings of the 16th International Workshop on Termination (WST'18), pages 10--14, Oxford, UK, July 2018.
BibTex | PDF ]
[Thi18]
F. Thiré. Sharing a Library between Proof Assistants: Reaching out to the HOL Family *. In Proceedings of the 13th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'18), pages 57--71, Oxford, UK, July 2018. ACM Press.
doi: 10.4204/EPTCS.274.4.
BibTex | DOI | Web page | PDF ]
[LR18a]
R. Lepigre and C. Raffalli. Abstract Representation of Binders in OCaml using the Bindlib Library. In Proceedings of the 13th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'18), pages 42--56, Oxford, UK, July 2018. ACM Press.
doi: 10.4204/EPTCS.274.4.
BibTex | DOI | Web page | PDF ]
[FNS18]
M. Függer, Th. Nowak, and M. Schwarz. Tight Bounds for Asymptotic and Approximate Consensus. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC'18), pages 325--334, Egham, UK, July 2018. ACM Press.
doi: 10.1145/3212734.3212762.
BibTex | DOI | Web page ]
[BBF+18a]
G. Bacci, P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and P.-A. Reynier. Optimal and Robust Controller Synthesis Using Energy Timed Automata with Uncertainty. In Proceedings of the 22nd International Symposium on Formal Methods (FM'18), Lecture Notes in Computer Science, pages 203--221, Oxford, UK, July 2018. Springer. Best paper award.
doi: 10.1007/978-3-319-95582-7_12.
BibTex | DOI | Web page | PDF ]
[JK18]
C. Jacomme and S. Kremer. An extensive formal analysis of multi-factor authentication protocols. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18), pages 1--15, Oxford, UK, July 2018. IEEE Computer Society Press.
doi: 10.1109/CSF.2018.00008.
BibTex | DOI | Web page | PDF ]
[DGK18]
V. Dave, P. Gastin, and S. N. Krishna. Regular Transducer Expressions for Regular Transformations. In Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'18), pages 315--324, Oxford, UK, July 2018. ACM Press.
doi: 10.1145/3209108.3209182.
BibTex | DOI | Web page | PDF ]
[LFV18]
A. Le Coënt, L. Fribourg, and J. Vacher. Control Synthesis for Stochastic Switched Systems using the Tamed Euler Method. In Proceedings of the 6th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'18), volume 51 of IFAC-PapersOnLine, pages 259--264, Oxford, UK, July 2018. Elsevier Science Publishers.
doi: 10.1016/j.ifacol.2018.08.044.
BibTex | DOI | Web page | PDF ]
[FHLM18]
É. Fabre, L. Hélouët, E. Lefaucheux, and H. Marchand. Diagnosability of Repairable Faults. Discrete Event Dynamic Systems: Theory and Applications, 28(2):183--213, June 2018.
doi: 10.1007/s10626-017-0255-8.
BibTex | DOI | PDF ]
[Hal18]
S. Halfon. On Effective Representations of Well Quasi-Orderings. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, June 2018.
BibTex | Web page | PDF ]
[CGR18]
O. Carton, B. Guillon, and F. Reiter. Counter Machines and Distributed Automata. In Proceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875 of Lecture Notes in Computer Science, pages 13--28, Ghent, Belgium, June 2018. Springer.
doi: 10.1007/978-3-319-92675-9_2.
BibTex | DOI | PDF ]
[CHP18a]
Th. Chatain, S. Haar, and L. Paulevé. Boolean Networks: Beyond Generalized Asynchronicity. In Proceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875 of Lecture Notes in Computer Science, pages 29--42, Ghent, Belgium, June 2018. Springer.
doi: 10.1007/978-3-319-92675-9_3.
BibTex | DOI | Web page ]
[LGS18]
E. Lefaucheux, A. Giua, and C. Seatzu. Basis Coverability Graph for Partially Observable Petri Nets with Application to Diagnosability Analysis. In Proceedings of the 39th International Conference on Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877 of Lecture Notes in Computer Science, pages 164--183, Bratislava, Slovakia, June 2018. Springer.
BibTex | PDF ]
[BBDH18]
B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad. Integrating Simulink Models into the Model Checker Cosmos. In Proceedings of the 39th International Conference on Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877 of Lecture Notes in Computer Science, pages 363--373, Bratislava, Slovakia, June 2018. Springer.
doi: 10.1007/978-3-319-91268-4_19.
BibTex | DOI | Web page | PDF ]
[SGF18b]
A. Saoud, A. Girard, and L. Fribourg. On the Composition of Discrete and Continuous-time Assume-Guarantee Contracts for Invariance. In Proceedings of the European Control Conference (ECC'18), pages 435--440, Limassol, Cyprus, June 2018. IEEE Press.
doi: 10.23919/ECC.2018.8550622.
BibTex | DOI | Web page | PDF ]
[AGK18]
S. Akshay, P. Gastin, and S. N. Krishna. Analyzing Timed Systems Using Tree Automata. Logical Methods in Computer Science, 14(2):1--35, May 2018.
doi: 10.23638/LMCS-14(2:8)2018.
BibTex | DOI | Web page | PDF ]
[FKLW18]
M. Függer, A. Kinali, C. Lenzen, and B. Wiederhake. Fast All-Digital Clock Frequency Adaptation Circuit for Voltage Droop Tolerance. In Proceedings of the 24th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'18), pages 68--77, Vienna, Austria, May 2018. IEEE Computer Society.
doi: 10.1109/ASYNC.2018.00025.
BibTex | DOI | Web page ]
[JMS18]
L. Jezequel, A. Madalinski, and S. Schwoon. Distributed computation of vector clocks in Petri nets unfolding for test selection. In Proceedings of the 14th Workshop on Discrete Event Systems (WODES'18), volume 51(7) of IFAC-PapersOnLine, pages 106--111, Sorrento Coast, Italy, May-June 2018. Elsevier Science Publishers.
BibTex | PDF ]
[ABG18]
C. Aiswarya, B. Bollig, and P. Gastin. An Automata-Theoretic Approach to the Verification of Distributed Algorithms. Information and Computation, 259:305--327, April 2018.
doi: 10.1016/j.ic.2017.05.006.
BibTex | DOI | PDF ]
[Gil18]
F. Gilbert. Extending higher-order logic with predicate subtyping. Thèse de doctorat, Université Paris 7, Paris, France, April 2018.
BibTex | PDF ]
[Bur18b]
G. Burel. Linking Focusing and Resolution with Selection. Research Report hal-01670476, HAL Research Report, April 2018.
BibTex | Web page | PDF ]
[SGF18a]
A. Saoud, A. Girard, and L. Fribourg. Contract based Design of Symbolic Controllers for Vehicle Platooning. In Proceedings of the 21st ACM International Conference on Hybrid Systems: Computation and Control (HSCC'18), pages 277--278, Porto, Portugal, April 2018. ACM Press. Poster.
doi: 10.1145/3178126.3187001.
BibTex | DOI | PDF ]
[Bla18]
F. Blanqui. Size-based termination of higher-order rewriting. Journal of Functional Programming, 28, April 2018.
doi: 10.1017/S0956796818000072.
BibTex | DOI | Web page | PDF ]
[JKS18]
C. Jacomme, S. Kremer, and G. Scerri. Symbolic Models for Isolated Execution Environments. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pages 530--545, Paris, France, April 2018. IEEE Press.
doi: 10.1109/EuroSP.2017.16.
BibTex | DOI | Web page ]
[Had18]
S. Haddad. Memoryless determinacy of finite parity games: Another simple proof. Information Processing Letters, 132:19--21, April 2018.
doi: 10.1016/j.ipl.2017.11.012.
BibTex | DOI | PDF ]
[CCD+18]
Th. Chatain, M. Comlan, D. Delfieu, L. Jezequel, and O. H. Roux. Pomsets and Unfolding of Reset Petri Nets. In Proceedings of the 12th International Conference on Language and Automata Theory and Applications (LATA'18), volume 10792 of Lecture Notes in Computer Science, pages 258--270, Bar-Ilan, Israel, April 2018. Springer.
doi: 10.1007/978-3-319-77313-1_20.
BibTex | DOI | Web page ]
[DLM18]
S. Demri, É. Lozes, and A. Mansutti. The Effects of Adding Reachability Predicates in Propositional Separation Logic. In Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages 476--493, Thessaloniki, Greece, April 2018. Springer.
BibTex | PDF ]
[Bou18]
P. Bouyer. Games on graphs with a public signal monitoring. In Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages 530--547, Thessaloniki, Greece, April 2018. Springer.
doi: 10.1007/978-3-319-89366-2_29.
BibTex | DOI | Web page | PDF ]
[FMN+18]
M. Függer, J. Maier, R. Najvirt, Th. Nowak, and U. Schmid. A Faithful Binary Circuit Model with Adversarial Noise. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'18), pages 1327--1332, Dresden, Germany, March 2018. IEEE Computer Society Press.
doi: 10.23919/DATE.2018.8342219.
BibTex | DOI | Web page | PDF ]
[BBF+18b]
B. Barbot, M. Beccuti, G. Franceschinis, S. Haddad, and C. Picaronny. Bounds Computation for Symmetric Nets. Research Report hal-01726011, HAL-Inria, March 2018.
BibTex | Web page | PDF ]
[GBM18]
P. Gardy, P. Bouyer, and N. Markey. Dependences in Strategy Logic. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 34:1--34:15, Caen, France, February 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2018.34.
BibTex | DOI | Web page | PDF ]
[BFG18b]
B. Bollig, M. Fortin, and P. Gastin. Communicating Finite-State Machines and Two-Variable Logic. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 17:1--17:14, Caen, France, February 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2018.17.
BibTex | DOI | Web page | PDF ]
[GKLZ18]
M. Ganardi, D. König, M. Lohrey, and G. Zetzsche. Knapsack problems for wreath products. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 32:1--32:13, Caen, France, February 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2018.32.
BibTex | DOI | Web page | PDF ]
[Bv18]
D. Berwanger and M. van den Bogaard. Consensus Game Acceptors and Iterated Transductions. International Journal of Foundations of Computer Science, 29(02):165--185, February 2018.
doi: 10.1142/S0129054118400026.
BibTex | DOI | Web page | PDF ]
[GM18]
P. Gastin and B. Monmege. A unifying survey on weighted logics and weighted automata. Soft Computing, 22(4):1047--1065, February 2018.
doi: 10.1007/s00500-015-1952-6.
BibTex | DOI | Web page | PDF ]
[BFL+18]
P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, J. Ouaknine, and J. Worrell. Model Checking Real-Time Systems. In Handbook of Model Checking, pages 1001--1046. Springer, 2018.
doi: 10.1007/978-3-319-10575-8_29.
BibTex | DOI | Web page | PDF ]
[BFM18]
M. Blondin, A. Finkel, and P. McKenzie. Handling Infinitely Branching Well-structured Transition Systems. Information and Computation, 258:28--49, 2018.
doi: 10.1016/j.ic.2017.11.001.
BibTex | DOI ]
[BGH18]
B. Bollig, M.-L. Grindei, and P. Habermehl. Realizability of Concurrent Recursive Programs. Formal Methods in System Design, 53(3):339--362, 2018.
doi: 10.1007/s10703-017-0282-y.
BibTex | DOI ]
[LR18b]
R. Lepigre and C. Raffalli. Practical Subtyping for Curry-Style Languages. ACM Transactions on Programming Languages and Systems, 41(1):5:1--5:58, 2018.
doi: 10.1145/3285955.
BibTex | DOI | PDF ]
[Lep18]
R. Lepigre. PML_2: Integrated Program Verification in ML. In Proceedings of the 23rd International Conference on Types for Proofs and Programs (TYPES'17, volume 104 of Leibniz International Proceedings in Informatics, pages 4:1--4:27, Budapest, Hungary, 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.TYPES.2017.4.
BibTex | DOI | Web page | PDF ]
[Dem18b]
S. Demri. Reasoning about reversal-bounded counter machines. In Ewa Orlowska on Relational Methods in Logic and Computer Science, volume 17 of Outstanding Contributions to Logic, pages 441--479. Springer, 2018.
BibTex | Web page | PDF ]
[BLMP18]
V. Brattka, S. Le Roux, J. S. Miller, and A. Pauly. Connected Choice and Brouwer's Fixed Point Theorem. Journal of Mathematical Logic, 2018. To appear.
BibTex ]
[CYFFMF18]
R. Chane-Yack-Fa, M. Frappier, A. Mammar, and A. Finkel. Parameterized Verification of Monotone Information Systems. Formal Aspects of Computing, 30(3-4):463--489, 2018.
doi: 10.1007/s00165-018-0460-8.
BibTex | DOI | Web page ]
[Zet18]
G. Zetzsche. The Emptiness Problem for Valence Automata over Graph Monoids. Information and Computation, 2018. To appear.
BibTex ]
[LZ18]
M. Lohrey and G. Zetzsche. Knapsack in Graph Groups. Theory of Computing Systems, 62(1):192--246, January 2018.
doi: 10.1007/s00224-017-9808-3.
BibTex | DOI ]
[BHSS18]
B. Bérard, S. Haar, S. Schmitz, and S. Schwoon. The Complexity of Diagnosability and Opacity Verification for Petri Nets. Fundamenta Informaticae, 161(4):317--349, 2018.
doi: 10.3233/FI-2018-1706.
BibTex | DOI | Web page ]
[LFM+18]
A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and L. Chamoin. Compositional synthesis of state-dependent switching control. Theoretical Computer Science, 750:53--68, 2018.
doi: 10.1016/j.tcs.2018.01.021.
BibTex | DOI | Web page | PDF ]
[LACF18]
A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, and L. Fribourg. An improved algorithm for the control synthesis of nonlinear sampled switched systems. Formal Methods in System Design, 53(3):363--383, 2018.
doi: 10.1007/s10703-017-0305-8.
BibTex | DOI | Web page | PDF ]
[ABDL18]
N. Alechina, N. Bulling, S. Demri, and B. Logan. On the Complexity of Resource-Bounded Logics. Theoretical Computer Science, 750:69--100, 2018.
doi: 10.1016/j.tcs.2018.01.019.
BibTex | DOI | PDF ]
[HGLJX18]
W. K. Ho, J. Goubault-Larrecq, A. Jung, and X. Xi. The Ho-Zhao Problem. Logical Methods in Computer Science, 14(1):1--19, January 2018.
doi: 10.23638/LMCS-14(1:7)2018.
BibTex | DOI | Web page | PDF ]
[CMvR+17]
W. Czerwiński, W. Martens, L. van Rooijen, M. Zeitoun, and G. Zetzsche. A Characterization for Decidable Separability by Piecewise Testable Languages. Discrete Mathematics & Theoretical Computer Science, 19(4), December 2017.
doi: 10.23638/DMTCS-19-4-1.
BibTex | DOI | Web page | PDF ]
[HKZ17]
M. Huschenbett, D. Kuske, and G. Zetzsche. The Monoid of Queue Actions. Semigroup Forum, 95(3):475--508, December 2017.
doi: 10.1007/s00233-016-9835-4.
BibTex | DOI ]
[BHL17a]
B. Bérard, S. Haddad, and E. Lefaucheux. Probabilistic Disclosure: Maximisation vs. Minimisation. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 13:1--13:14, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2017.13.
BibTex | DOI | Web page | PDF ]
[BFG17]
M. Blondin, A. Finkel, and J. Goubault-Larrecq. Forward Analysis for WSTS, Part III: Karp-Miller Trees. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 16:1--16:15, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2017.16.
BibTex | DOI | Web page | PDF ]
[DLL17]
S. Demri, É. Lozes, and D. Lugiez. On Symbolic Heaps Modulo Permission Theories. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 25:1--25:14, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2017.25.
BibTex | DOI | Web page | PDF ]
[CHKP17]
K. Chatzikokolakis, S. Haddad, A. Kassem, and C. Palamidessi. Trading Optimality for Performance in Location Privacy. In Proceedings of the 11th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'17), pages 221--222, Venice, Italy, December 2017.
doi: 10.1145/3150928.3150962.
BibTex | DOI | Web page | PDF ]
[Thi17]
F. Thiré. Exporting an Arithmetic Library from Dedukti to HOL. Research Report hal-01668250, HAL Research Report, December 2017.
BibTex | Web page | PDF ]
[Car17]
P. Carlier. Verification of Stochastic Timed Automata. Thèse de doctorat, Ecole Normale Supérieure de Cachan (ENS Paris-Saclay) and Université de Mons, December 2017.
BibTex | Web page | PDF ]
[FS17]
D. Figueira and L. Segoufin. Bottom-up automata on data trees and vertical XPath. Logical Methods in Computer Science, 13(4:5), November 2017.
doi: 10.23638/LMCS-13(4:5)2017.
BibTex | DOI ]
[Sch17a]
S. Schmitz. Algorithmic Complexity of Well-Quasi-Orders. Mémoire d'habilitation, École Normale Supérieure Paris-Saclay, France, November 2017.
BibTex | Web page ]
[GN17]
J. Goubault-Larrecq and K. M. Ng. A Few Notes on Formal Balls. Logical Methods in Computer Science, 13(4):1--34, November 2017. Special Issue of the Domains XII Workshop.
doi: 10.23638/LMCS-13(4:18)2017.
BibTex | DOI | Web page | PDF ]
[CCvD17]
Th. Chatain, J. Carmona, and B. van Dongen. Alignment-Based Trace Clustering. In Proceedings of the 36th International Conference on Conceptual Modeling (ER'17), volume 10650 of Lecture Notes in Computer Science, pages 295--308, Valencia, Spain, November 2017. Springer. To appear.
doi: 10.1007/978-3-319-69904-2_24.
BibTex | DOI | Web page | PDF ]
[BHL17b]
N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnostic et contrôle de la dégradation des systèmes probabilistes. In Actes du 11ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'17), Marseille, France, November 2017. HAL.
BibTex | PDF ]
[DGG17]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. Directed homology theories and Eilenberg-Steenrod axioms. Applied Categorical Structures, 25(5):775--807, October 2017.
doi: doi:10.1007/s10485-016-9438-y.
BibTex | DOI | Web page | PDF ]
[CDD17b]
V. Cortier, A. Dallon, and S. Delaune. A typing result for trace inclusion (for pair and symmetric encryption only). Research Report hal-01615265, HAL, October 2017.
BibTex | Web page | PDF ]
[FNS17]
M. Függer, Th. Nowak, and M. Schwarz. Brief Announcement: Lower Bounds for Asymptotic Consensus in Dynamic Networks. In Proceedings of the 31st International Symposium on Distributed Computing (DISC'17), volume 91 of Leibniz International Proceedings in Informatics, pages 51:1--51:3, Vienna, Austria, October 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.DISC.2017.51.
BibTex | DOI | Web page | PDF ]
[Gou17a]
J. Goubault-Larrecq. Isomorphism theorems between models of mixed choice. Mathematical Structures in Computer Science, 27(6):1032--1067, September 2017.
doi: 10.1017/S0960129515000547.
BibTex | DOI | Web page | PDF ]
[Gil17b]
F. Gilbert. Proof Certificates in PVS. In Proceedings of the 8th International Conference on Interactive Theorem Proving (ITP'17), volume 10499 of Lecture Notes in Computer Science, pages 262--268, Brasília, Brazil, September 2017. Springer.
doi: 10.1007/978-3-319-66107-0_17.
BibTex | DOI | Web page | PDF ]
[Bur17]
G. Bury. mSAT: An OCaml SAT Solver. In OCaml Users and Developers Workshop, Oxford, UK, September 2017. Poster.
BibTex | Web page | PDF ]
[BFM17]
M. Blondin, A. Finkel, and P. McKenzie. Well Behaved Transition Systems. Logical Methods in Computer Science, 13(3):1--19, September 2017.
doi: 10.23638/LMCS-13(3:24)2017.
BibTex | DOI | Web page ]
[MHP17]
H. Mandon, S. Haar, and L. Paulevé. Temporal Reprogramming of Boolean Networks. In Proceedings of the 15th Conference on Computational Methods in System Biology (CMSB'17), volume 10545 of Lecture Notes in Bioinformatics, pages 179--195, Darmstadt, Germany, September 2017. Springer-Verlag.
doi: 10.1007/978-3-319-67471-1_11.
BibTex | DOI | PDF ]
[Doy17]
L. Doyen. The Multiple Dimensions of Mean-Payoff Games. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 1--8, London, UK, September 2017. Springer.
doi: 10.1007/978-3-319-67089-8_1.
BibTex | DOI | Web page | PDF ]
[Fri17]
L. Fribourg. Euler's Method Applied to the Control of Switched Systems. In Proceedings of the 15th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419 of Lecture Notes in Computer Science, pages 3--21, Berlin, Germany, September 2017. Springer.
doi: 10.1007/978-3-319-65765-3_1.
BibTex | DOI | Web page | PDF ]
[BLL17]
F. Bruse, M. Lange, and É. Lozes. Space-Efficient Fragments of Higher-Order Fixpoint Logic. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 26--41, London, UK, September 2017. Springer.
doi: 10.1007/978-3-319-67089-8_3.
BibTex | DOI | Web page ]
[LAC+17]
A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, L. Fribourg, F. De Vuyst, and L. Chamoin. Distributed Control Synthesis Using Euler's Method. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 118--131, London, UK, September 2017. Springer.
doi: 10.1007/978-3-319-67089-8_9.
BibTex | DOI | Web page | PDF ]
[Dub17]
J. Dubut. Directed homotopic and homologic theories for geometric models of true concurrency. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2017.
BibTex | Web page | PDF ]
[GBB+17]
M. González, O. Beaude, P. Bouyer, S. Lasaulce, and N. Markey. Stratégies d'ordonnancement de consommation d'énergie en présence d'information imparfaite de prévision. In Actes du XXVIème colloque GRETSI, Juan-les-Pins, France, September 2017.
BibTex | Web page | PDF ]
[CP17]
Th. Chatain and L. Paulevé. Goal-Driven Unfolding of Petri Nets. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 18:1--18:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.18.
BibTex | DOI | Web page | PDF ]
[BHJ17]
P. Bouyer, S. Haddad, and V. Jugé. Unbounded product-form Petri nets. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 31:1--31:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.31.
BibTex | DOI | Web page | PDF ]
[AGKS17]
S. Akshay, P. Gastin, S. N. Krishna, and I. Sarkar. Towards an Efficient Tree Automata based technique for Timed Systems. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 39:1--39:15, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.39.
BibTex | DOI | Web page | PDF ]
[BQS17]
B. Bollig, K. Quaas, and A. Sangnier. The Complexity of Flat Freeze LTL. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 33:1--33:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.33.
BibTex | DOI | Web page | PDF ]
[BJM17]
P. Bouyer, S. Jaziri, and N. Markey. On the Determinization of Timed Systems. In Proceedings of the 15th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419 of Lecture Notes in Computer Science, pages 25--41, Berlin, Germany, September 2017. Springer.
doi: 10.1007/978-3-319-65765-3_2.
BibTex | DOI | Web page ]
[Sub17]
C. L. Subramaniam. Cubical Type Theory in Dedukti. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2017.
BibTex ]
[Gen17]
G. Genestier. Termination checking in the λΠ-calculus modulo theory. Rapport de Master, Université Paris 7, Paris, France, September 2017.
BibTex | Web page | PDF ]
[Def17]
A. Defourné. Proof Tactics in Dedukti. Rapport de Master, Inria Saclay, September 2017.
BibTex | Web page | PDF ]
[Dow17a]
G. Dowek. Analyzing Individual Proofs as the Basis of Interoperability between Proof Systems. In Proceedings of the 5th Workshop on Proof eXchange for Theorem Proving (PxTP'17), volume 262 of Electronic Proceedings in Theoretical Computer Science, pages 3--12, Brasília, Brazil, September 2017.
doi: 10.4204/EPTCS.262.1.
BibTex | DOI | Web page | PDF ]
[Rie17]
M. Riesner. Regularity of deterministic pushdown automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2017.
BibTex ]
[Sch17b]
Ph. Schnoebelen. Ideal-Based Algorithms for the Symbolic Verification of Well-Structured Systems (Invited Talk). In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'17), volume 83 of Leibniz International Proceedings in Informatics, pages 85:1--85:4, Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2017.85.
BibTex | DOI | Web page | PDF ]
[CDH17]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. The Cost of Exactness in Quantitative Reachability. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pages 367--381. Springer, August 2017.
doi: 10.1007/978-3-319-63121-9_18.
BibTex | DOI | PDF ]
[BDGK17]
D. Baelde, S. Delaune, I. Gazeau, and S. Kremer. Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 234--248, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.22.
BibTex | DOI | Web page | PDF ]
[CDD17a]
V. Cortier, A. Dallon, and S. Delaune. SAT-Equiv: An Efficient Tool for Equivalence Properties. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 481--494, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.15.
BibTex | DOI | Web page | PDF ]
[GMS17]
N. Grosshans, P. McKenzie, and L. Segoufin. The power of programs over monoids in DA. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'17), volume 83 of Leibniz International Proceedings in Informatics, pages 2:1--2:20, Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2017.2.
BibTex | DOI | Web page | PDF ]
[CK17]
H. Comon and A. Koutsos. Formal Computational Unlinkability Proofs of RFID Protocols. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 100--114, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.9.
BibTex | DOI | Web page | PDF ]
[CGKM17]
S. Calzavara, I. Grishchenko, A. Koutsos, and M. Maffei. A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 22--36, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.19.
BibTex | DOI | Web page | PDF ]
[BLM+17]
P. Bouyer, F. Laroussinie, N. Markey, J. Ouaknine, and J. Worrell. Timed temporal logics. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pages 211--230. Springer, August 2017.
doi: 10.1007/978-3-319-65764-6_11.
BibTex | DOI | Web page | PDF ]
[Seg17]
L. Segoufin. A survey on guarded negation. SIGLOG News, 4(3):12--26, July 2017.
doi: 10.1145/3129173.3129178.
BibTex | DOI ]
[FL17]
A. Finkel and É. Lozes. Synchronizability of Communicating Finite State Machines is not Decidable. In Proceedings of the 44th International Colloquium on Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz International Proceedings in Informatics, pages 122:1--122:14, Warsaw, Poland, July 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2017.122.
BibTex | DOI | Web page | PDF ]
[Dow17c]
G. Dowek. Models and termination of proof reduction in the λΠ-calculus modulo theory. In Proceedings of the 44th International Colloquium on Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz International Proceedings in Informatics, pages 109:1--109:14, Warsaw, Poland, July 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2017.109.
BibTex | DOI | Web page | PDF ]
[FMW17]
M. Fortin, A. Muscholl, and I. Walukiewicz. Model-checking linear-time properties of parametrized asynchronous shared-memory pushdown systems. In Proceedings of the 29th International Conference on Computer Aided Verification (CAV'17), volume 10427 of Lecture Notes in Computer Science, pages 155--175, Heidelberg, Germany, July 2017. Springer.
doi: 10.1007/978-3-319-63390-9_9.
BibTex | DOI | Web page ]
[BR17]
D. Berwanger and R. Ramanujam. Deviator Detection under Imperfect Monitoring. In Proceedings of the 5th International Workshop on Strategic Reasoning (SR'17), Liverpool, UK, July 2017.
BibTex | Web page | PDF ]
[BFRR17]
V. Bruyère, E. Filiot, M. Randour, and J.-F. Raskin. Meet Your Expectations With Guarantees: Beyond Worst-Case Synthesis in Quantitative Games. Information and Computation, 254(2):259--295, June 2017. To appear.
doi: 10.1016/j.ic.2016.10.011.
BibTex | DOI ]
[BMV17b]
P. Bouyer, N. Markey, and S. Vester. Nash Equilibria in Symmetric Graph Games with Partial Observation. Information and Computation, 254(2):238--258, June 2017.
doi: 10.1016/j.ic.2016.10.010.
BibTex | DOI | Web page | PDF ]
[KGH+17]
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, B. Berthomieu, G. Ciardo, M. Colange, S. Dal Zilio, E. Amparore, M. Beccuti, T. Liebke, J. Meijer, A. Miner, C. Rohr, J. Srba, Y. Thierry-Mieg, J. van de Pol, and K. Wolf. Complete Results for the 2017 Edition of the Model Checking Contest, June 2017.
BibTex | Web page ]
[Dou17a]
A. Doumane. Constructive completeness for the linear-time μ-calculus. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--12, Reykjavik, Iceland, June 2017. IEEE Press.
doi: 10.1109/LICS.2017.8005075.
BibTex | DOI ]
[Dou17b]
A. Doumane. On the infinitary proof theory of logics with fixed points. Thèse de doctorat, Université Paris-Diderot, Paris, France, June 2017.
BibTex | Web page | PDF ]
[Gar17]
P. Gardy. Semantics of Strategy Logic. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2017.
BibTex | Web page | PDF ]
[Had17]
S. Haddad. Memoryless Determinacy of Finite Parity Games: Another Simple Proof. Research Report hal-01541508, HAL-inria, June 2017. 7 pages.
BibTex | Web page | PDF ]
[KV17]
A. Koutsos and V. Vianu. Process-centric views of data-driven business artifacts. Journal of Computer and System Sciences, 86(1):82--107, June 2017.
doi: 10.1016/j.jcss.2016.11.012.
BibTex | DOI | Web page | PDF ]
[HSZ17]
S. Halfon, Ph. Schnoebelen, and G. Zetzsche. Decidability, complexity, and expressiveness of first-order logic over the subword ordering. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--12, Reykjavik, Iceland, June 2017. IEEE Press.
doi: 10.1109/LICS.2017.8005141.
BibTex | DOI | Web page ]
[CJLS17]
Th. Colcombet, M. Jurdziński, R. Lazić, and S. Schmitz. Perfect Half Space Games. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--11, Reykjavik, Iceland, June 2017. IEEE Press.
doi: 10.1109/LICS.2017.8005105.
BibTex | DOI | Web page ]
[vCCT17]
B. van Dongen, J. Carmona, Th. Chatain, and F. Taymouri. Aligning Modeled and Observed Behavior: A Compromise Between Complexity and Quality. In Proceedings of the 29th International Conference on Advanced Information Systems Engineering (CAiSE'17), volume 10253 of Lecture Notes in Computer Science, pages 94--109, Essen, Germany, June 2017. Springer.
doi: 10.1007/978-3-319-59536-8_7.
BibTex | DOI | PDF ]
[BHSS17]
B. Bérard, S. Haar, S. Schmitz, and S. Schwoon. The Complexity of Diagnosability and Opacity Verification for Petri Nets. In Proceedings of the 38th International Conference on Applications and Theory of Petri Nets (PETRI NETS'17), volume 10258 of Lecture Notes in Computer Science, pages 200--220, Zaragoza, Spain, June 2017. Springer.
doi: 10.1007/978-3-319-57861-3_13.
BibTex | DOI | Web page ]
[BM17]
D. Berwanger and A. B. Mathew. Infinite games with finite knowledge gaps. Information and Computation, 254:217--237, June 2017.
doi: 10.1016/j.ic.2016.10.009.
BibTex | DOI | Web page | PDF ]
[BMv17a]
D. Berwanger, A. B. Mathew, and M. van den Bogaard. Hierarchical information and the synthesis of distributed strategies. Acta Informatica, June 2017.
doi: 10.1007/s00236-017-0306-5.
BibTex | DOI | Web page | PDF ]
[JS17]
J.-P. Jouannaud and P.-Y. Strub. Coq without Type Casts: A Complete Proof of Coq Modulo Theory. In Proceedings of the 21st International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'17), volume 46 of EPiC Series in Computing, pages 474--489, Maun, Botswana, May 2017. EasyChair.
BibTex | Web page | PDF ]
[TFL17]
G. Tarawneh, M. Függer, and C. Lenzen. Metastability Tolerant Computing. In Proceedings of the 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'17), pages 25--32, San Diego, California, USA, May 2017. IEEE Computer Society.
doi: 10.1109/ASYNC.2017.9.
BibTex | DOI | Web page | PDF ]
[FKLP17]
M. Függer, A. Kinali, C. Lenzen, and T. Polzer. Metastability-Aware Memory-Efficient Time-to-Digital Converter. In Proceedings of the 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'17), pages 49--56, San Diego, California, USA, May 2017. IEEE Computer Society.
doi: 10.1109/ASYNC.2017.12.
BibTex | DOI | Web page | PDF ]
[OBH17]
P. O'Hanlon, R. Borgaonkar, and L. Hirschi. Mobile subscriber WiFi privacy. In Proceedings of Mobile Security Technologies (MoST'17), held as part of the IEEE Computer Society Security and Privacy Workshops, San Jose, CA, USA, May 2017.
BibTex | PDF ]
[BJ17]
P. Bouyer and V. Jugé. Dynamic Complexity of the Dyck Reachability. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 265--280, Uppsala, Sweden, April 2017. Springer.
doi: 10.1007/978-3-662-54458-7_16.
BibTex | DOI | Web page | PDF ]
[BHM+17]
P. Bouyer, P. Hofman, N. Markey, M. Randour, and M. Zimmermann. Bounding Average-energy Games. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 179--195, Uppsala, Sweden, April 2017. Springer.
doi: 10.1007/978-3-662-54458-7_11.
BibTex | DOI | Web page | PDF ]
[ZKL17]
G. Zetzsche, D. Kuske, and M. Lohrey. On Boolean closed full trios and rational Kripke frames. Theory of Computing Systems, 60(3):438--472, April 2017.
doi: 10.1007/s00224-016-9694-0.
BibTex | DOI ]
[Gil17a]
F. Gilbert. Automated Constructivization of Proofs. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 480--495, Uppsala, Sweden, April 2017. Springer.
doi: 10.1007/978-3-662-54458-7_28.
BibTex | DOI | Web page | PDF ]
[LDCF17]
A. Le Coënt, F. De Vuyst, L. Chamoin, and L. Fribourg. Control Synthesis of Nonlinear Sampled Switched Systems using Euler's Method. In Proceedings of the 3rd International Workshop on Symbolic and Numerical Methods for Reachability Analysis (SNR'17), volume 247 of Electronic Proceedings in Theoretical Computer Science, pages 18--33, Uppsala, Sweden, April 2017.
doi: 10.4204/EPTCS.247.2.
BibTex | DOI | Web page | PDF ]
[Hir17]
L. Hirschi. Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2017.
BibTex | Web page | PDF ]
[BGHH17]
S. Böhm, S. Göller, S. Halfon, and P. Hofman. On Büchi one-counter automata. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 14:1--14:13, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2017.14.
BibTex | DOI | Web page | PDF ]
[CG17]
A. Carayol and S. Göller. On long words avoiding Zimin patterns. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 19:1--19:13, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2017.19.
BibTex | DOI | Web page | PDF ]
[LZ17]
M. Lohrey and G. Zetzsche. The Complexity of Knapsack in Graph Groups. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 52:1--52:14, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2017.52.
BibTex | DOI ]
[Mon17]
D. Montoya. Une base de connaissance personnelle intégrant les données d'un utilisateur et une chronologie de ses activités. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, March 2017.
BibTex | Web page | PDF ]
[SV17]
L. Segoufin and A. Vigny. Constant Delay Enumeration for FO Queries over Databases with Local Bounded Expansion. In Proceedings of the 18th International Conference on Database Theory (ICDT'17), volume 68 of Leibniz International Proceedings in Informatics, pages 20:1--20:16, Venice, Italy, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICDT.2017.20.
BibTex | DOI | Web page | PDF ]
[Sta17]
D. Stan. Randomized Strategies in Concurrent Games. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2017.
BibTex | Web page | PDF ]
[BBDH17]
B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad. Statistical Model-Checking for Autonomous Vehicle Safety Validation. In SIA Simulation Numérique, Montigny-le-Bretonneux, France, March 2017.
BibTex | Web page | PDF ]
[CFNS17]
B. Charron-Bost, M. Függer, Th. Nowak, and M. Schwarz. New transience bounds for max-plus linear systems. Discrete Applied Mathematics, 219:83--99, March 2017.
doi: 10.1016/j.dam.2016.11.003.
BibTex | DOI | Web page | PDF ]
[Dow17b]
G. Dowek. Lineal: A linear-algebraic Lambda-calculus. Logical Methods in Computer Science, 13(1):1--33, March 2017.
doi: 10.23638/LMCS-13(1:8)2017.
BibTex | DOI | Web page | PDF ]
[Jug17]
V. Jugé. The Relaxation Normal Form of Braids is Regular. International Journal of Algebra and Computation, 27(1):61--106, February 2017.
doi: 10.1142/S0218196717500059.
BibTex | DOI | Web page ]
[BMJ17]
P. Bouyer, N. Markey, and V. Jugé. Courcelle's Theorem Made Dynamic. Research Report 1702.05183, Computing Research Repository, February 2017. 14 pages.
BibTex | Web page | PDF ]
[HHMS17]
S. Haar, S. Haddad, T. Melliti, and S. Schwoon. Optimal constructions for active diagnosis. Journal of Computer and System Sciences, 83(1):101--120, 2017.
doi: 10.1016/j.jcss.2016.04.007.
BibTex | DOI | PDF ]
[BKM17]
B. Bollig, D. Kuske, and R. Mennicke. The Complexity of Model Checking Multi-Stack Systems. Theory of Computing Systems, 60(4):695--736, 2017.
doi: 10.1007/s00224-016-9700-6.
BibTex | DOI | Web page ]
[BMPS17]
P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber-Caissier. Timed automata abstraction of switched dynamical systems using control funnels. Real-Time Systems, 53(3):327--353, 2017.
doi: 10.1007/s11241-016-9262-3.
BibTex | DOI | Web page | PDF ]
[DGLWM17]
S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Mery. Separation Logic with One Quantified Variable. Theory of Computing Systems, 61(2):371--461, 2017.
doi: 10.1007/s00224-016-9713-1.
BibTex | DOI | Web page | PDF ]
[Gou17b]
J. Goubault-Larrecq. A Non-Hausdorff Minimax Theorem. Minimax Theory and its Applications, 3(1):73--80, 2017.
BibTex ]
[DDS17]
S. Demri, A. Dhar, and A. Sangnier. Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic. Theoretical Computer Science, 735:2--23, 2017.
BibTex | PDF ]
[CDFR17]
K. Chatterjee, L. Doyen, E. Filiot, and J. Raskin. Doomsday equilibria for omega-regular games. Information and Computation, 254:296--315, 2017.
doi: 10.1016/j.ic.2016.10.012.
BibTex | DOI | PDF ]
[BCMW17]
D. Baelde, A. Carayol, R. Matthes, and I. Walukiewicz. Preface: Special Issue of Fixed Points in Computer Science (FICS'13). Fundamenta Informaticae, 150(3-4):i--ii, 2017.
doi: 10.3233/FI-2017-1468.
BibTex | DOI | Web page ]
[BDH17]
D. Baelde, S. Delaune, and L. Hirschi. A Reduced Semantics for Deciding Trace Equivalence. Logical Methods in Computer Science, 13(2:8):1--48, 2017.
doi: 10.23638/LMCS-13(2:8)2017.
BibTex | DOI | Web page | PDF ]
[BFHH17]
M. Blondin, A. Finkel, C. Haase, and S. Haddad. The Logical View on Continuous Petri Nets. ACM Transactions on Computational Logic, 18(3):24:1--24:28, 2017.
doi: 10.1145/3105908.
BibTex | DOI | Web page | PDF ]
[HPV17]
S. Haar, S. Perchy, and F. Valencia. D-SPACES: Implementing Declarative Semantics for Spatially Structured Information. In Proceedings of the 11th International Conference on Semantic Computing (ICSC'17), volume 11 of IEEE ICSC, pages 227--233, San Diego, CA, USA, January 2017. IEEE Press.
doi: 10.1109/ICSC.2017.34.
BibTex | DOI | Web page | PDF ]
[GHP+17]
M. Guzmán, S. Haar, S. Perchy, C. Rueda, and F. Valencia. Belief, Knowledge, Lies and Other Utterances in an Algebra for Space and Extrusion. Journal of Logic and Algebraic Methods in Programming, 86(1):107--133, January 2017.
doi: 10.1016/j.jlamp.2016.09.001.
BibTex | DOI | Web page | PDF ]
[ABH17]
M. F. Atig, B. Bollig, and P. Habermehl. Emptiness of ordered multi-pushdown automata is 2ETIME-complete. International Journal of Foundations of Computer Science, 28(8):945--975, 2017.
doi: 10.1142/S0129054117500332.
BibTex | DOI | Web page | PDF ]
[DKW17]
S. Demri, D. Kapur, and C. Weidenbach. Special Issue of Selected Extended Papers of IJCAR 2014. Journal of Automated Reasoning, 58(1), 2017.
BibTex | Web page ]
[ACR17]
É. André, Th. Chatain, and C. Rodríguez. Preserving Partial-Order Runs in Parametric Time Petri Nets. ACM Transactions in Embedded Computing Systems, 16(2):43:1--43:26, 2017.
doi: 10.1145/3012283.
BibTex | DOI | PDF ]
[AM17]
P. Arrighi and S. Martiel. Quantum causal graph dynamics. Physical Review D, 96(2), 2017.
BibTex | PDF ]
[AD17]
S. Abiteboul and G. Dowek. Le temps des algorithmes. Editions Le Pommier, 2017.
BibTex | Web page ]
[CCD17]
V. Cheval, H. Comon-Lundh, and S. Delaune. A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255:94--125, 2017.
doi: 10.1016/j.ic.2017.05.004.
BibTex | DOI | Web page ]
[DD17]
A. Díaz-Caro and G. Dowek. Typing Quantum Superpositions and Measurement. In Proceedings of the 6th International Conference on Theory and Practice of Natural Computing (TPNC'17), volume 10687 of Lecture Notes in Computer Science, pages 281--293, Prague, Czech Republic, 2017. Springer.
doi: 10.1007/978-3-319-71069-3_22.
BibTex | DOI | Web page ]
[Dow17d]
G. Dowek. Rules and derivations in an elementary logic course. IfCoLoG Journal of Logics and their Applications, 4(1):21--32, 2017. Special Issue: Tools for Teaching Logic.
BibTex | PDF ]
[BKM16]
M. Blondin, A. Krebs, and P. McKenzie. The Complexity of Intersecting Finite Automata Having Few Final States. Computational Complexity, 25(4):775--814, December 2016. To appear.
doi: 10.1007/s00037-014-0089-9.
BibTex | DOI | Web page | PDF ]
[The16]
S. Theissing. Supervision in Multi-Modal Transportation System. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2016.
BibTex | Web page | PDF ]
[Bol16]
B. Bollig. One-Counter Automata with Counter Observability. In Proceedings of the 36th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'16), volume 65 of Leibniz International Proceedings in Informatics, pages 20:1--20:14, Chennai, India, December 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2016.20.
BibTex | DOI | Web page ]
[Gou16d]
J. Goubault-Larrecq. A semantics for . Invited talk, Dale Miller Festschrift, Paris Diderot University, Paris, December 2016.
BibTex ]
[AD16b]
P. Arrighi and G. Dowek. What is the Planck constant the magnitude of? preprint, December 2016.
BibTex | Web page | PDF ]
[Hal16a]
P. Halmagrand. Automated Deduction and Proof Certification for the B Method. Thèse de doctorat, Conservatoire National Des Arts et Métiers, Paris, December 2016.
BibTex | Web page ]
[BGMS16b]
P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin. Nondeterminism and An Abstract Formulation of Nečiporuk's Lower Bound Method. ACM Transactions on Computation Theory, 9(1):5:1--5:34, December 2016.
doi: 10.1145/3013516.
BibTex | DOI ]
[Van16]
M. Van den Bogaard. Motifs de Flot d'Information dans les Jeux à Information Imparfaite. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2016.
BibTex | Web page | PDF ]
[MPTAS16]
D. Montoya, T. Pellissier Tanon, S. Abiteboul, and F. Suchanek. Thymeflow, A Personal Knowledge Base with Spatio-temporal Data. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16), pages 2477--2480, Indianapolis, Indiana, USA, October 2016. ACM.
doi: 10.1145/2983323.2983337.
BibTex | DOI | PDF ]
[Moh16]
S. Mohamed. Une méthode topologique pour la recherche d'ensembles invariants de systèmes continus et à commutation. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2016.
BibTex | Web page | PDF ]
[Cau16b]
R. Cauderlier. Object-Oriented Mechanisms for Interoperability between Proof Systems. Thèse de doctorat, Conservatoire National Des Arts et Métiers, Paris, October 2016.
BibTex | Web page | PDF ]
[DGL16]
S. Demri, V. Goranko, and M. Lange. Temporal Logics in Computer Science, volume 58 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, October 2016.
BibTex | Web page ]
[Hal16b]
P. Halmagrand. Soundly Proving B Method Formulae Using Typed Sequent Calculus. In Proceedings of the 13th International Colloquium on Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture Notes in Computer Science, pages 196--213, Taipei, Taiwan, October 2016. Springer.
doi: 10.1007/978-3-319-46750-4_12.
BibTex | DOI | Web page | PDF ]
[vDCC16a]
B. van Dongen, J. Carmona, and Th. Chatain. Alignment-based Quality Metrics in Conformance Checking. In Proceedings of the 7th Int. Workshop on Enterprise Modelling and Information Systems Architectures (EMISA'16), volume 1701 of CEUR Workshop Proceedings, pages 87--90, Vienna, Austria, October 2016. CEUR-WS.org.
BibTex | DOI | Web page | PDF ]
[MHP16]
H. Mandon, S. Haar, and L. Paulevé. Relationship between the Reprogramming Determinants of Boolean Networks and their Interaction Graph. In Proceedings of the 5th International Workshop on Hybrid Systems Biology, Lecture Notes in Computer Science, pages 113--127, Grenoble France, October 2016. Springer.
doi: 10.1007/978-3-319-47151-8_8.
BibTex | DOI | Web page | PDF ]
[BMJ16]
P. Bouyer, N. Markey, and V. Jugé. Dynamic Complexity of Parity Games with Bounded Tree-Width. Research Report 1610.00571, Computing Research Repository, October 2016. 33 pages.
BibTex | Web page | PDF ]
[CD16a]
R. Cauderlier and C. Dubois. ML Pattern-Matching, Recursion, and Rewriting: From FoCaLiZe to Dedukti. In Proceedings of the 13th International Colloquium on Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture Notes in Computer Science, pages 459--468, Taipei, Taiwan, October 2016. Springer.
BibTex | Web page | PDF ]
[Haa16]
S. Haar. Cyclic Ordering through Partial Orders. Journal of Multiple-Valued Logic and Soft Computing, 27(2-3):209--228, September 2016.
BibTex | Web page | PDF ]
[Jac16]
C. Jacomme. Automated applications of Cryptographic Assumptions. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2016.
BibTex | PDF ]
[HHK+16a]
M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and É. Lozes. Multi-Buffer Simulations for Trace Language Inclusion. In Proceedings of the 7th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'16), volume 226 of Electronic Proceedings in Theoretical Computer Science, pages 213--227, Catania, Italy, September 2016.
doi: 10.4204/EPTCS.226.15.
BibTex | DOI | Web page | PDF ]
[GL16]
J. Goubault-Larrecq and J. Lachance. On the Complexity of Monitoring Orchids Signatures. In Proceedings of the 16th Conference on Runtime Verification (RV'16), volume 10012 of Lecture Notes in Computer Science, pages 169--164, Madrid, Spain, September 2016. Springer.
doi: 10.1007/978-3-319-46982-9_11.
BibTex | DOI ]
[KŠHP16]
J. Kolcák, D. Šafránek, S. Haar, and L. Paulevé. Unfolding of Parametric Logical Regulatory Networks. In Proceedings of The Seventh International Workshop on Static Analysis and Systems Biology (SASB 2016), Electronic Notes in Theoretical Computer Science, Edinburgh, UK, September 2016. Elsevier Science Publishers. To appear.
BibTex | Web page | PDF ]
[BDM16]
L. Beklemishev, S. Demri, and A. Maté, editors. Proceedings of the 11th Conference on Advances in Modal Logic (AiML'16), Budapest, Hungary, September 2016. College Publications.
BibTex | Web page ]
[BMS16]
P. Bouyer, N. Markey, and D. Stan. Stochastic Equilibria under Imprecise Deviations in Terminal-Reward Concurrent Games. In Proceedings of the 7th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'16), volume 226 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Catania, Italy, September 2016.
doi: 10.4204/EPTCS.226.5.
BibTex | DOI | Web page | PDF ]
[Fin16]
A. Finkel. The Ideal Theory for WSTS. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 1--22, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_1.
BibTex | DOI | Web page | PDF ]
[ABDL16]
N. Alechina, N. Bulling, S. Demri, and B. Logan. On the Complexity of Resource-Bounded Logics. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 36--50, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_3.
BibTex | DOI | Web page | PDF ]
[LFS16]
A. Le Coënt, L. Fribourg, and R. Soulat. Compositional analysis of Boolean networks using local fixed-point iterations. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 134--147, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_10.
BibTex | DOI | Web page | PDF ]
[LFM+16]
A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and L. Chamoin. Distributed Synthesis of State-Dependent Switching Control. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 119--133, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_9.
BibTex | DOI | Web page | PDF ]
[vDCC16b]
B. F. van Dongen, J. Carmona, and Th. Chatain. A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments. In Proceedings of the 14th International Conference on Business Process Management (BPM'16), volume 9850 of Lecture Notes in Computer Science, pages 39--56, Rio de Janeiro, Brazil, September 2016. Springer.
doi: 10.1007/978-3-319-45348-4_3.
BibTex | DOI | Web page | PDF ]
[KS16]
P. Karandikar and Ph. Schnoebelen. The height of piecewise-testable languages with applications in logical complexity. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 37:1--37:22, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.37.
BibTex | DOI | Web page | PDF ]
[GGL16]
M. Ganardi, S. Göller, and M. Lohrey. On the Parallel Complexity of Bisimulation over Finite Systems. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 12:1--12:17, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.12.
BibTex | DOI ]
[DGG16b]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. The Directed Homotopy Hypothesis. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 9:1--9:16, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.9.
BibTex | DOI | Web page | PDF ]
[DBS16]
A. Doumane, D. Baelde, and A. Saurin. Infinitary proof theory: the multiplicative additive case. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 42:1--42:17, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.42.
BibTex | DOI ]
[BLS16]
D. Baelde, S. Lunel, and S. Schmitz. A Sequent Calculus for a Modal Logic on Finite Data Trees. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 32:1--32:16, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.32.
BibTex | DOI | Web page ]
[Leh16]
M. Lehaut. PDL on infinite alphabet. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 19 pages.
BibTex | Web page | PDF ]
[BGMS16a]
P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin. Nondeterminism and an abstract formulation of Neciporuk's lower bound method. Research Report 1608.01932, Computing Research Repository, August 2016. 34 pages.
BibTex | Web page | PDF ]
[Lic16]
A. Lick. Systèmes de preuves pour logiques modales. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 20 pages.
BibTex | Web page | PDF ]
[BFM16]
M. Blondin, A. Finkel, and P. McKenzie. Well Behaved Transition Systems. Research Report 1608.02636, Computing Research Repository, August 2016. 18 pages.
BibTex | Web page | PDF ]
[FM16]
M. Fränzle and N. Markey, editors. Proceedings of the 14th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'16), volume 9884 of Lecture Notes in Computer Science, Québec City, Canada, August 2016. Springer.
doi: 10.1007/978-3-319-44878-7.
BibTex | DOI | Web page ]
[HT16b]
S. Haar and S. Theissing. Decoupling Passenger Flows for Improved Load Prediction. In Proceedings of the 13th International Conference on Quantitative Evaluation of Systems (QEST'16), volume 9826 of Lecture Notes in Computer Science, pages 364--379, Québec City, Canada, August 2016. Springer.
doi: 10.1007/978-3-319-43425-4_24.
BibTex | DOI | Web page | PDF ]
[Bou16]
P. Bouyer. Optimal Reachability in Weighted Timed Automata and Games. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 3:1--3:3, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2016.3.
BibTex | DOI | Web page | PDF ]
[ABK+16]
S. Akshay, P. Bouyer, S. N. Krishna, L. Manasa, and A. Trivedi. Stochastic Timed Games Revisited. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 8:1--8:14, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2016.8.
BibTex | DOI | Web page | PDF ]
[NPR16]
R. Niskanen, I. Potapov, and J. Reichert. Undecidability of Two-dimensional Robot Games. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 73:1--73:13, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2016.73.
BibTex | DOI | Web page | PDF ]
[DGG16a]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. Bisimulations and unfolding in P-accessible categorical models. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 25:1--25:14, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.25.
BibTex | DOI | Web page | PDF ]
[AGK16]
S. Akshay, P. Gastin, and S. N. Krishna. Analyzing Timed Systems Using Tree Automata. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 27:1--27:14, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.27.
BibTex | DOI | Web page | PDF ]
[BHL16b]
N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnosis in Infinite-State Probabilistic Systems. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 37:1--37:15, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.37.
BibTex | DOI | Web page | PDF ]
[DLM16]
A. David, F. Laroussinie, and N. Markey. On the expressiveness of QCTL. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 28:1--28:15, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.28.
BibTex | DOI | Web page | PDF ]
[DFP16]
S. Demri, D. Figueira, and M. Praveen. Reasoning about Data Repetitions with Counter Systems. Logical Methods in Computer Science, 12(3):1:1--1:55, August 2016.
doi: 10.2168/LMCS-12(3:1)2016.
BibTex | DOI | Web page | PDF ]
[Gou16a]
J. Goubault-Larrecq. A few things on Noetherian spaces. Invited talk (plenary speaker), Summer Topology Conference, Leicester, UK, August 2016.
BibTex ]
[Gou16b]
J. Goubault-Larrecq. An introduction to asymmetric topology and domain theory: why, what, and how. Invited talk, Galway Symposium, Leicester, UK, August 2016.
BibTex ]
[Thi16]
F. Thiré. Reverse engineering on arithmetic proofs. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 26 pages.
BibTex | Web page | PDF ]
[BDJ+16]
Th. Brihaye, B. Delahaye, L. Jezequel, N. Markey, and J. Srba, editors. Proceedings of the Cassting Workshop on Games for the Synthesis of Complex Systems (Cassting'16) and of the 3rd International Workshop on Synthesis of Complex Parameters (SynCoP'16), volume 220 of Electronic Proceedings in Theoretical Computer Science, Eindhoven, The Netherlands, July 2016.
doi: 10.4204/EPTCS.220.
BibTex | DOI | Web page ]
[HT16d]
S. Haar and S. Theissing. Predicting Traffic Load in Public Transportation Networks. In Proceedings of the 35th American Control Conference (ACC'16), pages 821--826, Boston, Massachusetts, USA, July 2016. IEEE Control System Society.
doi: 10.1109/ACC.2016.7525015.
BibTex | DOI | Web page | PDF ]
[BBBC16]
N. Bertrand, P. Bouyer, Th. Brihaye, and P. Carlier. Analysing Decisive Stochastic Processes. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 101:1--101:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.101.
BibTex | DOI | Web page | PDF ]
[CH16]
D. Chistikov and C. Haase. The Taming of the Semi-Linear Set. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 128:1--128:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.128.
BibTex | DOI | Web page | PDF ]
[Zet16]
G. Zetzsche. The complexity of downward closure comparisons. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 123:1--123:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.123.
BibTex | DOI | Web page | PDF ]
[CD16b]
K. Chatterjee and L. Doyen. Computation Tree Logic for Synchronization Properties. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 98:1--98:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.98.
BibTex | DOI | Web page | PDF ]
[GS16]
J. Goubault-Larrecq and S. Schmitz. Deciding Piecewise Testable Separability for Regular Tree Languages. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 97:1--97:15, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.97.
BibTex | DOI | Web page ]
[GHLT16]
S. Göller, C. Haase, R. Lazić, and P. Totzke. A Polynomial-Time Algorithm for Reachability in Branching VASS in Dimension One. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 105:1--105:13, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.105.
BibTex | DOI | Web page ]
[BCM16]
P. Bouyer, M. Colange, and N. Markey. Symbolic Optimal Reachability in Weighted Timed Automata. In Proceedings of the 28th International Conference on Computer Aided Verification (CAV'16) -- Part I, volume 9779 of Lecture Notes in Computer Science, pages 513--530, Toronto, Canada, July 2016. Springer.
doi: 10.1007/978-3-319-41528-4_28.
BibTex | DOI | Web page ]
[BMR+16]
P. Bouyer, N. Markey, M. Randour, A. Sangnier, and D. Stan. Reachability in Networks of Register Protocols under Stochastic Schedulers. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 106:1--106:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.106.
BibTex | DOI | Web page ]
[LS16a]
R. Lazić and S. Schmitz. The Complexity of Coverability in ν-Petri Nets. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 467--476, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2933593.
BibTex | DOI | Web page ]
[DBHS16]
A. Doumane, D. Baelde, L. Hirschi, and A. Saurin. Towards Completeness via Proof Search in the Linear Time μ-calculus. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 377--386, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2933598.
BibTex | DOI | Web page | PDF ]
[CG16]
Th. Colcombet and S. Göller. Games with bound guess actions. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 257--266, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934502.
BibTex | DOI | Web page | PDF ]
[CD16c]
K. Chatterjee and L. Doyen. Perfect-information Stochastic Games with Generalized Mean-Payoff Objectives. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 247--256, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934513.
BibTex | DOI | Web page ]
[DMZ16]
E. D'Osualdo, R. Meyer, and G. Zetzsche. First-order logic with reachability for infinite-state systems. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 457--466, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934552.
BibTex | DOI | Web page | PDF ]
[ACH+16]
M. F. Atig, D. Chistikov, P. Hofman, K. N. Kumar, P. Saivasan, and G. Zetzsche. Complexity of regular abstractions of one-counter languages. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 207--216, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934561.
BibTex | DOI | Web page | PDF ]
[CFS16]
P. Chambart, A. Finkel, and S. Schmitz. Forward Analysis and Model Checking for Trace Bounded WSTS. Theoretical Computer Science, 637:1--29, July 2016.
doi: 10.1016/j.tcs.2016.04.020.
BibTex | DOI | Web page ]
[AMP16]
P. Arrighi, S. Martiel, and S. Perdrix. Reversible Causal Graph Dynamics. In 8th Conference on Reversible Computation (RC'16), volume 9720 of Lecture Notes in Computer Science, pages 73--88, Bologna, Italy, July 2016. Springer.
doi: 10.1007/978-3-319-40578-0_5.
BibTex | DOI | Web page ]
[PHL16]
H. Ponce de León, S. Haar, and D. Longuet. Model-based Testing for Concurrent Systems: Unfolding-based Test Selection. International Journal on Software Tools for Technology Transfer, 18(3):305--318, June 2016.
doi: 10.1007/s10009-014-0353-y.
BibTex | DOI | Web page | PDF ]
[Sch16c]
S. Schmitz. Implicational Relevance Logic is 2-ExpTime-Complete. Journal of Symbolic Logic, 81(2):641--661, June 2016.
doi: 10.1017/jsl.2015.7.
BibTex | DOI | Web page | PDF ]
[DLV16]
A. Deutsch, Y. Li, and V. Vianu. Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS'16). In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS'16), pages 179--194, San Francisco, California, USA, June 2016. ACM Press.
doi: 10.1145/2902251.2902275.
BibTex | DOI ]
[Blo16]
M. Blondin. Algorithmique et complexité des systèmes à compteurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Université de Montréal, June 2016.
BibTex | Web page ]
[PS16]
T. Place and L. Segoufin. Decidable Characterization of FO2(<, +1) and locality of DA. Research Report 1606.03217, Computing Research Repository, June 2016. 8 pages.
BibTex | Web page | PDF ]
[DG16a]
S. Delaune and I. Gazeau. Combination issues. Deliverable VIP 4.2 (ANR-11-JS02-0006), June 2016. 5 pages.
BibTex | Web page | PDF ]
[DG16b]
S. Delaune and I. Gazeau. Results on the case studies. Deliverable VIP 2.2 (ANR-11-JS02-0006), June 2016. 8 pages.
BibTex | Web page | PDF ]
[BBCM16]
P. Bouyer, Th. Brihaye, P. Carlier, and Q. Menet. Compositional Design of Stochastic Timed Automata. In Proceedings of the 11th International Computer Science Symposium in Russia (CSR'16), volume 9691 of Lecture Notes in Computer Science, pages 117--130, St Petersburg, Russia, June 2016. Springer.
doi: 10.1007/978-3-319-34171-2_9.
BibTex | DOI | Web page | PDF ]
[CC16]
J. Carmona and Th. Chatain. Anti-Alignments in Conformance Checking -- The Dark Side of Process Models. In Proceedings of the 37th International Conference on Applications and Theory of Petri Nets (PETRI NETS'16), volume 9698 of Lecture Notes in Computer Science, pages 240--258, Torún, Poland, June 2016. Springer.
doi: 10.1007/978-3-319-39086-4_15.
BibTex | DOI | Web page | PDF ]
[KGH+16a]
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, G. Chiardo, A. Hamez, L. Jezequel, A. Miner, J. Meijer, E. Paviot-Adet, D. Racordon, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, G. Trinh, and K. Wolf. Complete Results for the 2016 Edition of the Model Checking Contest, June 2016.
BibTex | Web page ]
[Cau16a]
R. Cauderlier. A Rewrite System for Proof Constructivization. In Proceedings of the 11th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'16), pages 2:1--2:7, Porto, Portugal, June 2016. ACM Press.
doi: 10.1007/978-3-319-40578-0_5.
BibTex | DOI | Web page | PDF ]
[LBB+16]
A. Linard, B. Barbot, D. Buchs, M. Colange, C. Démoulins, L. Hillah, and A. Martin. Layered Data: A Modular Formal Definition without Formalisms. In Proceedings of the 10th International Workshop on Petri Nets and Software Engineering (PNSE'16), volume 1591 of CEUR Workshop Proceedings, pages 287--306, Torun, Poland, June 2016. CEUR-WS.org.
BibTex | Web page | PDF ]
[BCEZ16]
T. Brough, L. Ciobanu, M. Elder, and G. Zetzsche. Permutations of context-free, ET0L and indexed languages. Discrete Mathematics & Theoretical Computer Science, 17(3):167--178, May 2016.
BibTex | Web page | PDF ]
[HT16a]
S. Haar and S. Theissing. A Passenger-centric Multi-agent System Model for Multimodal Public Transportation. Research Report hal-01322956, HAL-inria, May 2016. 12 pages.
BibTex | Web page | PDF ]
[FHLM16]
É. Fabre, L. Hélouët, E. Lefaucheux, and H. Marchand. Diagnosability of Repairable Faults. In Proceedings of the 13th Workshop on Discrete Event Systems (WODES'16), pages 230--236, Xi'an, China, May-June 2016. IEEE Control System Society.
doi: 10.1109/WODES.2016.7497853.
BibTex | DOI | Web page | PDF ]
[GR16]
G. Grefenstette and K. Rafes. Transforming Wikipedia into an Ontology-based Information Retrieval Search Engine for Local Experts using a Third-Party Taxonomy. In Proceedings of the Joint 2nd Workshop on Language and Ontology & Terminology and Knowledge Structures (LangOnto+TermiKS'16), Portorož, Slovenia, May 2016. To appear.
BibTex | Web page | PDF ]
[HBD16]
L. Hirschi, D. Baelde, and S. Delaune. A method for verifying privacy-type properties: the unbounded case. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P'16), pages 564--581, San Jose, California, USA, May 2016. IEEECSP.
doi: 10.1109/SP.2016.40.
BibTex | DOI | Web page | PDF ]
[GLSHHM16]
J. Goubault-Larrecq, P.-A. Sentucq, F. Hulin-Hubard, and F. Majorczyk. Etat final des travaux engagés sur Orchids. Rapport final et fourniture 4 du contrat DGA-INRIA Orchids, May 2016.
BibTex ]
[GLM16]
J. Goubault-Larrecq and F. Majorczyk. Génération de signatures pour le suivi de flux d'informations. Fourniture 3 du contrat DGA-INRIA Orchids, May 2016.
BibTex ]
[HHK+16b]
M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and É. Lozes. Two-Buffer Simulation Games. In Proceedings of the Cassting Workshop on Games for the Synthesis of Complex Systems and 3rd International Workshop on Synthesis of Complex Parameters (Cassting/SYNCOP'16), volume 220 of Electronic Proceedings in Theoretical Computer Science, pages 213--227, Eindhoven, The Netherlands, April 2016.
doi: 10.4204/EPTCS.220.3.
BibTex | DOI | Web page | PDF ]
[HT16c]
S. Haar and S. Theissing. Forecasting Passenger Loads in Transportation Networks. In Proceedings of the 8th International Workshop on Practical Applications of Stochastic Modelling (PASM'16), volume 327 of Electronic Notes in Theoretical Computer Science, pages 49--69, Münster, Germany, April 2016. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2016.09.023.
BibTex | DOI | Web page | PDF ]
[LACF16]
A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, and L. Fribourg. Control of Nonlinear Switched Systems Based on Validated Simulation. In Proceedings of the 2nd International Workshop on Symbolic and Numerical Methods for Reachability Analysis (SNR'16), pages 1--6, Vienna, Austria, April 2016. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[FGMP16]
L. Fribourg, É. Goubault, S. Mohamed, and S. Putot. A Topological Method for Finding Invariant Sets of Switched Systems. In Proceedings of the 19th ACM International Conference on Hybrid Systems: Computation and Control (HSCC'16), pages 61--70, Vienna, Austria, April 2016. ACM Press.
doi: 10.1145/2883817.2883822.
BibTex | DOI | Web page | PDF ]
[CCH+16]
D. Chistikov, W. Czerwiński, P. Hofman, M. Pilipczuk, and M. Wehar. Shortest paths in one-counter systems. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 462--478, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49630-5_27.
BibTex | DOI | Web page | PDF ]
[HLL+16]
P. Hofman, S. Lasota, R. Lazić, J. Leroux, S. Schmitz, and P. Totzke. Coverability Trees for Petri Nets with Unordered Data. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 445--461, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49630-5_26.
BibTex | DOI | Web page ]
[FG16]
M. Fortin and P. Gastin. Verification of parameterized communicating automata via split-width. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 197--213, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49630-5_12.
BibTex | DOI | Web page | PDF ]
[CDD16]
V. Cortier, A. Dallon, and S. Delaune. Bounding the number of agents, for equivalence too. In Proceedings of the 5th International Conference on Principles of Security and Trust (POST'16), volume 9635 of Lecture Notes in Computer Science, pages 211--232, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49635-0_11.
BibTex | DOI | Web page | PDF ]
[BFHH16a]
M. Blondin, A. Finkel, C. Haase, and S. Haddad. Approaching the Coverability Problem Continuously. In Proceedings of the 22th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'16), volume 9636 of Lecture Notes in Computer Science, pages 480--496, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49674-9_28.
BibTex | DOI | Web page | PDF ]
[BHJL16]
B. Bérard, S. Haddad, A. Jovanović, and D. Lime. Interrupt Timed Automata with Auxiliary Clocks and Parameters. Fundamenta Informaticae, 143(3-4):235--259, March 2016.
doi: 10.3233/FI-2016-1313.
BibTex | DOI | Web page | PDF ]
[BHL16a]
N. Bertrand, S. Haddad, and E. Lefaucheux. Accurate Approximate Diagnosability of Stochastic Systems. In Proceedings of the 10th International Conference on Language and Automata Theory and Applications (LATA'16), volume 9618 of Lecture Notes in Computer Science, pages 549--561, Prague, Czech Republic, March 2016. Springer.
doi: 10.1007/978-3-319-30000-9_42.
BibTex | DOI | Web page | PDF ]
[DD16a]
S. Demri and M. Deters. Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction. ACM Transactions on Computational Logic, 17(2):12:1--12:44, March 2016.
doi: 10.1145/2835490.
BibTex | DOI | Web page | PDF ]
[AD16a]
P. Arrighi and G. Dowek. Free fall and cellular automata. In Proceedings of the 11th International Workshop on Developments in Computational Models (DCM'15), volume 204 of Electronic Proceedings in Theoretical Computer Science, pages 1--10, Cali, Colombia, March 2016.
doi: 10.4204/EPTCS.204.1.
BibTex | DOI | Web page ]
[BGM16]
P. Bouyer, P. Gardy, and N. Markey. On the semantics of Strategy Logic. Information Processing Letters, 116(2):75--79, February 2016.
doi: 10.1016/j.ipl.2015.10.004.
BibTex | DOI | Web page | PDF ]
[HK16]
C. Haase and S. Kiefer. The Complexity of the Kth Largest Subset Problem and Related Problems. Information Processing Letters, 116(2):111--115, February 2016.
doi: 10.1016/j.ipl.2015.09.015.
BibTex | DOI | Web page | PDF ]
[LS16b]
J. Leroux and S. Schmitz. Ideal Decompositions for Vector Addition Systems. In Proceedings of the 33rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'16), volume 47 of Leibniz International Proceedings in Informatics, pages 1:1--1:13, Orléans, France, February 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2016.1.
BibTex | DOI | Web page ]
[Sch16b]
S. Schmitz. Complexity Hierarchies Beyond Elementary. ACM Transactions on Computation Theory, 8(1:3), February 2016.
doi: 10.1145/2858784.
BibTex | DOI | Web page ]
[HH16]
C. Haase and P. Hofman. Tightening the Complexity of Equivalence Problems for Commutative Grammars. In Proceedings of the 33rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'16), volume 47 of Leibniz International Proceedings in Informatics, pages 41:1--14, Orléans, France, February 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2016.41.
BibTex | DOI | Web page | PDF ]
[KNS16]
P. Karandikar, M. Niewerth, and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords and superwords. Theoretical Computer Science, 610(A):91--107, January 2016.
doi: 10.1016/j.tcs.2015.09.028.
BibTex | DOI | Web page | PDF ]
[DD16b]
S. Demri and M. Deters. Temporal Logics on Strings with Prefix Relation. Journal of Logic and Computation, 26(3):989--1017, 2016.
doi: 10.1093/logcom/exv028.
BibTex | DOI | Web page | PDF ]
[BFHH16b]
M. Blondin, A. Finkel, C. Haase, and S. Haddad. QCover: an efficient coverability verifier for discrete and continuous Petri nets, 2016.
BibTex | Web page ]
[DH16]
S. Delaune and L. Hirschi. A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols. Journal of Logic and Algebraic Methods in Programming, 87:127--144, 2016. To appear.
doi: 10.1016/j.jlamp.2016.10.005.
BibTex | DOI | Web page | PDF ]
[JSD16]
F. Jacquemard, L. Segoufin, and J. Dimino. FO2(<, +1,) on data trees, data tree automata and branching vector addition systems. Logical Methods in Computer Science, 12(2):1--28, 2016.
doi: 10.2168/LMCS-12(2:3)2016.
BibTex | DOI | Web page | PDF ]
[GSSW16]
J. Goubault-Larrecq, M. Seisenberger, V. Selivanov, and A. Weiermann. Well Quasi-Orders in Computer Science (Dagstuhl Seminar 16031). Dagstuhl Reports, 6(1):69--98, January 2016.
doi: 10.4230/DagRep.6.1.69.
BibTex | DOI | Web page | PDF ]
[KGH+16b]
F. Kordon, H. Garavel, L. Hillah, E. Paviot-Adet, L. Jezequel, C. Rodríguez, and F. Hulin-Hubard. MCC'2015 - The Fifth Model Checking Contest. Transactions on Petri Nets and Other Models of Concurrency, 11:262--273, 2016.
doi: 10.1007/978-3-662-53401-4_12.
BibTex | DOI | Web page | PDF ]
[ADF+16]
P. A. Abdulla, S. Demri, A. Finkel, J. Leroux, and I. Potapov. Selected papers of Reachability Problems Workshop 2012 (Bordeaux) and 2013 (Uppsala). Fundamenta Informaticae, 143(3--4), 2016.
BibTex | Web page ]
[LDR+16]
A. Le Coënt, F. De Vuyst, C. Rey, L. Chamoin, and L. Fribourg. Control of mechanical systems using set-based methods. International Journal of Dynamics and Control, pages 1--17, 2016.
doi: 10.1007/s40435-016-0245-y.
BibTex | DOI | Web page | PDF ]
[DD16c]
A. Díaz-Caro and G. Dowek. Quantum superpositions and projective measurement in the lambda calculus. Research Report 1601.04294, Computing Research Repository, January 2016. 22 pages.
BibTex | Web page | PDF ]
[Chr16]
R. Chrétien. Analyse automatique de propriétés d'équivalence pour les protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2016.
BibTex | Web page | PDF ]
[Sch16a]
S. Schmitz. Automata column: The complexity of reachability in vector addition systems. SIGLOG News, 3(1):3--21, January 2016.
doi: 10.1145/2893582.2893585.
BibTex | DOI | Web page ]
[HOW16]
C. Haase, J. Ouaknine, and J. Worrell. Relating Reachability Problems in Timed and Counter Automata. Fundamenta Informaticae, 143(3-4):317--338, January 2016.
doi: 10.3233/FI-2016-1316.
BibTex | DOI | Web page | PDF ]
[Gou16c]
J. Goubault-Larrecq. Les méthodes formelles: l'autre arme de la cybersécurité. Encart dans l'article ”S'adapter à la cyberguerre”, de Karen Elazari, Pour La Science 459, January 2016.
BibTex ]
[ADJL16a]
A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu. Encoding Proofs in Dedukti: the case of Coq proofs. In Preliminary Proceedings of the 1st International Workshop on Hammers for Type Theories (HaTT'16), Coimbra, Portugal, 2016.
BibTex | Web page | PDF ]
[ADJL16b]
A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu. Untyped Confluence in Dependent Type Theories. In Proceedings of the 8th International Workshop on Higher-Order Rewriting (HOR'16), Porto, Portugal, 2016.
BibTex | Web page | PDF ]
[ABC+16]
A. Assaf, G. Burel, R. Cauderlier, D. Delahaye, G. Dowek, C. Dubois, F. Gilbert, P. Halmagrand, O. Hermant, and R. Saillard. Expressing theories in the λΠ-calculus modulo theory and in the Dedukti system. In Proceedings of the 22nd International Conference on Types for Proofs and Programs (TYPES'16), volume 97 of Leibniz International Proceedings in Informatics, Novi Sad, Serbia, 2016. Leibniz-Zentrum für Informatik. To appear.
BibTex ]
[Dow16]
G. Dowek. Rules and derivations in an elementary logic course. preprint, January 2016.
BibTex | Web page | PDF ]
[CDGH15]
K. Chatterjee, L. Doyen, H. Gimbert, and T. A. Henzinger. Randomness for free. Information and Computation, 245:3--16, December 2015.
doi: 10.1016/j.ic.2015.06.003.
BibTex | DOI | Web page | PDF ]
[LM15]
F. Laroussinie and N. Markey. Augmenting ATL with strategy contexts. Information and Computation, 245:98--123, December 2015.
doi: 10.1016/j.ic.2014.12.020.
BibTex | DOI | Web page | PDF ]
[GHKS15]
V. Germanos, S. Haar, V. Khomenko, and S. Schwoon. Diagnosability under Weak Fairness. ACM Transactions in Embedded Computing Systems, 14(4:69), December 2015.
doi: 10.1145/2832910.
BibTex | DOI | Web page | PDF ]
[BGH+15]
Th. Brihaye, G. Geeraerts, A. Haddad, E. Lefaucheux, and B. Monmege. Simple Priced Timed Games Are Not That Simple. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 278--292, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.278.
BibTex | DOI | Web page | PDF ]
[BHH+15]
S. Böhm, S. Haar, S. Haddad, P. Hofman, and S. Schwoon. Active Diagnosis with Observable Quiescence. In Proceedings of the 54th IEEE Conference on Decision and Control (CDC'15), pages 1663--1668, Osaka, Japan, December 2015. IEEE Control System Society.
doi: 10.1109/CDC.2015.7402449.
BibTex | DOI | Web page | PDF ]
[BV15b]
D. Berwanger and M. Van den Bogaard. Games with Delays. A Frankenstein Approach. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 307--319, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.307.
BibTex | DOI | Web page | PDF ]
[KS15a]
P. Karandikar and Ph. Schnoebelen. Decidability in the logic of subsequences and supersequences. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 84--97, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.84.
BibTex | DOI | Web page | PDF ]
[BGM15]
P. Bouyer, P. Gardy, and N. Markey. Weighted strategy logic with boolean goals over one-counter games. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 69--83, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.69.
BibTex | DOI | Web page | PDF ]
[Fra15b]
N. Francis. View-based Query Determinacy and Rewritings over Graph Databases. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2015.
BibTex | Web page ]
[FSS15]
N. Francis, L. Segoufin, and C. Sirangelo. Datalog Rewritings of Regular Path Queries using Views. Logical Methods in Computer Science, 11(4:14), December 2015.
doi: 10.2168/LMCS-11(4:14)2015.
BibTex | DOI | Web page | PDF ]
[Gon15]
M. González. Constructions d'Information Parfaite pour certains Jeux à Information Imparfaite. Quelques Algorithmes. Rapport de Master, Université Pierre et Marie Curie, Paris, France, December 2015.
BibTex ]
[ABV15]
S. Abiteboul, P. Bourhis, and V. Vianu. Highly Expressive Query Languages for Unordered Data Trees. Theory of Computing Systems, 57(4):927--966, November 2015.
doi: 10.1007/s00224-015-9617-5.
BibTex | DOI | Web page | PDF ]
[AAD+15]
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and P. Senellart. Optimal Probabilistic Generation of XML Documents. Theory of Computing Systems, 57(4):806--842, November 2015.
doi: 10.1007/s00224-014-9581-5.
BibTex | DOI | Web page | PDF ]
[MAS15]
D. Montoya, S. Abiteboul, and P. Senellart. Hup-Me: Inferring and Reconciling a Timeline of User Activity with Smartphone and Personal Data. In Proceedings of the 23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS'15), pages 62:1--4, Seattle, Washington, USA, November 2015.
doi: 10.1145/2820783.2820852.
BibTex | DOI | Web page | PDF ]
[CHH15]
D. Chistikov, C. Haase, and S. Halfon. Context-Free Commutative Grammars with Integer Counters and Resets. Research Report 1511-04893, Computing Research Repository, November 2015. 31 pages.
BibTex | Web page | PDF ]
[HT15]
S. Haar and S. Theissing. A Hybrid-Dynamical Model for Passenger-flow in Transportation Systems. In Proceedings of the 5th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'15), volume 48 of IFAC-PapersOnLine, pages 236--241, Atlanta, Georgia, USA, October 2015. Elsevier Science Publishers.
doi: 10.1016/j.ifacol.2015.11.181.
BibTex | DOI | Web page | PDF ]
[BMV15]
D. Berwanger, A. B. Mathew, and M. Van den Bogaard. Hierarchical Information Patterns and Distributed Strategy Synthesis. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15), volume 9364 of Lecture Notes in Computer Science, pages 378--393, Shanghai, China, October 2015. Springer.
doi: 10.1007/978-3-319-24953-7_28.
BibTex | DOI | Web page | PDF ]
[PRC+15]
H. Ponce de León, C. Rodríguez, J. Carmona, K. Heljanko, and S. Haar. Unfolding-Based Process Discovery. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15), volume 9364 of Lecture Notes in Computer Science, Shanghai, China, October 2015. Springer.
doi: 10.1007/978-3-319-24953-7_4.
BibTex | DOI | Web page | PDF ]
[Loz15]
É. Lozes. A Type-Directed Negation Elimination. In Proceedings of the 10th Workshop on Fixed Points in Computer Science (FICS'15), volume 191 of Electronic Proceedings in Theoretical Computer Science, pages 132--142, Berlin, Germany, September 2015.
doi: 10.4204/EPTCS.191.12.
BibTex | DOI | Web page | PDF ]
[Dal15]
A. Dallon. Verification of Cryptographic Protocols : a bound on the number of agents. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2015. 38 pages.
BibTex | Web page | PDF ]
[MDB15]
N. Markey, L. Doyen, and D. Berwanger. Models for large-scale systems. Cassting deliverable D1.3 (FP7-ICT-601148), September 2015. 17 pages.
BibTex | Web page | PDF ]
[MLB+15b]
A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and K. Barkaoui. State Space Reduction Strategie for Model Checking Concurrent C Programs. In Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems(VECoS'15), volume 1431 of CEUR Workshop Proceedings, pages 65--76, Bucharest, Romania, September 2015. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[CCD15c]
R. Chrétien, V. Cortier, and S. Delaune. From security protocols to pushdown automata. ACM Transactions on Computational Logic, 17(1:3), September 2015.
doi: 10.1145/2811262.
BibTex | DOI | Web page | PDF ]
[CCD15a]
R. Chrétien, V. Cortier, and S. Delaune. Checking trace equivalence: How to get rid of nonces? In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15), Lecture Notes in Computer Science, pages 230--251, Vienna, Austria, September 2015. Springer.
doi: 10.1007/978-3-319-24177-7_12.
BibTex | DOI | Web page | PDF ]
[FGM+15]
L. Fribourg, É. Goubault, S. Mohamed, M. Mrozek, and S. Putot. A Topological Method for Finding Invariants of Continuous Systems. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 63--75, Warsaw, Poland, September 2015. Springer.
doi: 10.1007/978-3-319-24537-9_7.
BibTex | DOI | Web page | PDF ]
[LS15a]
R. Lazić and S. Schmitz. The Ideal View on Rackoff's Coverability Technique. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 76--88, Warsaw, Poland, September 2015. Springer.
doi: 10.1007/978-3-319-24537-9_8.
BibTex | DOI | Web page | PDF ]
[BHP+15]
B. Bérard, S. Haddad, C. Picaronny, M. Safey El Din, and M. Sassolas. Polynomial Interrupt Timed Automata. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 20--32, Warsaw, Poland, September 2015. Springer.
doi: 10.1007/978-3-319-24537-9_3.
BibTex | DOI | Web page | PDF ]
[BFM15]
P. Bouyer, E. Fang, and N. Markey. Permissive strategies in timed automata and games. In Proceedings of the 15th International Workshop on Automated Verification of Critical Systems (AVoCS'15), volume 72 of Electronic Communications of the EASST, Edinburgh, UK, September 2015. European Association of Software Science and Technology.
doi: 10.14279/tuj.eceasst.72.1015.
BibTex | DOI | Web page | PDF ]
[Bol15c]
B. Bollig. Towards Formal Verification of Distributed Algorithms. In Proceedings of the 22nd International Symposium on Temporal Representation and Reasoning (TIME'15), page 3, Kassel, Germany, September 2015. IEEE Computer Society Press.
doi: 10.1109/TIME.2015.23.
BibTex | DOI | Web page | PDF ]
[RG15]
K. Rafes and C. Germain. A platform for scientific data sharing. In Actes de la 31ème Conférence sur la Gestion de Données -- Principes, Technologies et Applications (BDA'15), Île de Porquerolles, France, September 2015.
BibTex | Web page | PDF ]
[BMR+15]
P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and S. Laursen. Average-energy games. In Proceedings of the 6th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'15), volume 193 of Electronic Proceedings in Theoretical Computer Science, pages 1--15, Genova, Italy, September 2015.
doi: 10.4204/EPTCS.193.1.
BibTex | DOI | Web page | PDF ]
[LMS15]
F. Laroussinie, N. Markey, and A. Sangnier. ATL_sc with partial observation. In Proceedings of the 6th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'15), volume 193 of Electronic Proceedings in Theoretical Computer Science, pages 43--57, Genova, Italy, September 2015.
doi: 10.4204/EPTCS.193.4.
BibTex | DOI | Web page | PDF ]
[BDS15]
D. Baelde, A. Doumane, and A. Saurin. Least and Greatest Fixed Points in Ludics. In Proceedings of the 24th Annual EACSL Conference on Computer Science Logic (CSL'15), volume 41 of Leibniz International Proceedings in Informatics, pages 549--566, Berlin, Germany, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2015.549.
BibTex | DOI | Web page | PDF ]
[BMPS15]
P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber. Timed automata abstraction of switched dynamical systems using control funnels. In Proceedings of the 13th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268 of Lecture Notes in Computer Science, pages 60--75, Madrid, Spain, September 2015. Springer.
doi: 10.1007/978-3-319-22975-1_5.
BibTex | DOI | Web page | PDF ]
[AM15]
É. André and N. Markey. Language Preservation Problems in Parametric Timed Automata. In Proceedings of the 13th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268 of Lecture Notes in Computer Science, pages 27--43, Madrid, Spain, September 2015. Springer.
doi: 10.1007/978-3-319-22975-1_3.
BibTex | DOI | Web page | PDF ]
[ABG15]
C. Aiswarya, B. Bollig, and P. Gastin. An Automata-Theoretic Approach to the Verification of Distributed Algorithms. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 340--353, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2015.340.
BibTex | DOI | Web page | PDF ]
[BDH15]
D. Baelde, S. Delaune, and L. Hirschi. Partial Order Reduction for Security Protocols. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 497--510, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2015.497.
BibTex | DOI | Web page | PDF ]
[BJM15]
P. Bouyer, S. Jaziri, and N. Markey. On the Value Problem in Weighted Timed Games. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 311--324, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2015.311.
BibTex | DOI | Web page | PDF ]
[BDK15]
D. Baelde, S. Delaune, and S. Kremer. Decision procedures for equivalence based properties (part II). Deliverable VIP 3.2 (ANR-11-JS02-0006), September 2015. 9 pages.
BibTex | Web page | PDF ]
[DK15]
S. Delaune and S. Kremer. Composition results for equivalence-based security properties. Deliverable VIP 3.1 (ANR-11-JS02-0006), September 2015. 6 pages.
BibTex | Web page | PDF ]
[PS15]
Th. Place and L. Segoufin. Deciding definability in FO^2(<_h,<_v) on trees. Logical Methods in Computer Science, 11(3:5), September 2015.
doi: 10.2168/LMCS-11(3:5)2015.
BibTex | DOI | Web page | PDF ]
[DS15]
A. Dawar and L. Segoufin. Capturing MSO with one quantifier. In Fields of Logic and Computation II -- Essays Dedicated to Yuri Gurevich on the Occasion of His 75th Birthday, volume 9300 of Lecture Notes in Computer Science, pages 142--152. Springer, September 2015.
doi: 10.1007/978-3-319-23534-9_8.
BibTex | DOI | Web page | PDF ]
[Abi15]
S. Abiteboul. The Story of Webdamlog. In Proceedings of the 19th East-European Conference on Advances in Databases and Information Systems (ADBIS'15), Poitiers, France, September 2015.
BibTex | Web page | PDF ]
[For15]
M. Fortin. Verification of distributed systems with parameterized network topology. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2015.
BibTex ]
[LL15]
M. Lange and É. Lozes. Conjunctive Visibly-Pushdown Path Queries. In Proceedings of the 20th International Symposium on Fundamentals of Computation Theory (FCT'15), volume 9210 of Lecture Notes in Computer Science, pages 327--338, Gdańsk, Poland, August 2015. Springer.
doi: 10.1007/978-3-319-22177-9_25.
BibTex | DOI | Web page | PDF ]
[AGMK15]
S. Akshay, P. Gastin, M. Mukund, and K. N. Kumar. Checking conformance for time-constrained scenario-based specifications. Theoretical Computer Science, 594:24--43, August 2015.
doi: 10.1016/j.tcs.2015.03.030.
BibTex | DOI | Web page | PDF ]
[Bou15]
P. Bouyer. On the optimal reachability problem in weighted timed automata and games. In Proceedings of the 7th Workshop on Non-Classical Models of Automata and Applications (NCMA'15), volume 318 of books@ocg.at, pages 11--36, Porto, Portugal, August 2015. Austrian Computer Society.
BibTex | Web page | PDF ]
[Bol15a]
B. Bollig. Automata and Logics for Concurrent Systems: Five Models in Five Pages. In Proceedings of the 20th International Conference on Implementation and Application of Automata (CIAA'15), volume 9223 of Lecture Notes in Computer Science, pages 3--12, Umeå, Sweden, August 2015. Springer-Verlag.
doi: 10.1007/978-3-319-22360-5_1.
BibTex | DOI | Web page | PDF ]
[BBD+15]
P. Ballarini, B. Barbot, M. Duflot, S. Haddad, and N. Pekergin. HASL: A New Approach for Performance Evaluation and Model Checking from Concepts to Experimentation. Performance Evaluation, 90:53--77, August 2015.
doi: 10.1016/j.peva.2015.04.003.
BibTex | DOI | Web page | PDF ]
[Gou15b]
J. Goubault-Larrecq. Formal balls. Invited talk, Domains XII workshop, Cork, Ireland, August 2015.
BibTex ]
[Rei15]
J. Reichert. Décidabilité et complexité de jeux d'accessibilité sur des systèmes à compteurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2015.
BibTex | Web page | PDF ]
[BV15a]
D. Berwanger and M. Van den Bogaard. Consensus Game Acceptors. In Proceedings of the 19th International Conference on Developments in Language Theory (DLT'15), volume 9168 of Lecture Notes in Computer Science, pages 108--119, Liverpool, UK, July 2015. Springer.
doi: 10.1007/978-3-319-21500-6_8.
BibTex | DOI | Web page | PDF ]
[HPRV15]
S. Haar, S. Perchy, C. Rueda, and F. Valencia. An Algebraic View of SpaceashBelief and ExtrusionashUtterance for ConcurrencyashEpistemic Logic. In Proceedings of the 17th International Conference on Principles and Practice of Declarative Programming (PPDP'15), pages 161--172, Siena, Italy, July 2015. ACM Press.
doi: 10.1007/978-3-319-19488-2_6.
BibTex | DOI | Web page | PDF ]
[CDV15]
K. Chatterjee, L. Doyen, and M. Vardi. The Complexity of Synthesis from Probabilistic Components. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 108--120, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_9.
BibTex | DOI | Web page | PDF ]
[JLS15]
M. Jurdziński, R. Lazić, and S. Schmitz. Fixed-Dimensional Energy Games are in Pseudo Polynomial Time. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 260--272, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_21.
BibTex | DOI | Web page | PDF ]
[CCD15b]
R. Chrétien, V. Cortier, and S. Delaune. Decidability of trace equivalence for protocols with nonces. In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF'15), pages 170--184, Verona, Italy, July 2015. IEEE Computer Society Press.
doi: 10.1109/CSF.2015.19.
BibTex | DOI | Web page | PDF ]
[RRS15a]
M. Randour, J.-F. Raskin, and O. Sankur. Percentile Queries in Multi-Dimensional Markov Decision Processes. In Proceedings of the 27th International Conference on Computer Aided Verification (CAV'15) -- Part I, volume 9206 of Lecture Notes in Computer Science, pages 123--139, San Francisco, CA, USA, July 2015. Springer.
doi: 10.1007/978-3-319-21690-4_8.
BibTex | DOI | Web page | PDF ]
[HK15]
C. Haase and S. Kiefer. The Odds of Staying on Budget. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 234--246, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_19.
BibTex | DOI | Web page | PDF ]
[DGG15]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. Natural Homology. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 171--183, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_14.
BibTex | DOI | Web page | PDF ]
[LS15c]
J. Leroux and S. Schmitz. Demystifying Reachability in Vector Addition Systems. In Proceedings of the 30th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'15), pages 56--67, Kyoto, Japan, July 2015. IEEE Press.
doi: 10.1109/LICS.2015.1.
BibTex | DOI | Web page | PDF ]
[BFG+15]
M. Blondin, A. Finkel, S. Göller, C. Haase, and P. McKenzie. Reachability in Two-Dimensional Vector Addition Systems with States is PSPACE-Complete. In Proceedings of the 30th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'15), pages 32--43, Kyoto, Japan, July 2015. IEEE Press.
doi: 10.1109/LICS.2015.14.
BibTex | DOI | Web page | PDF ]
[LS15b]
R. Lazić and S. Schmitz. Non-Elementary Complexities for Branching VASS, MELL, and Extensions. ACM Transactions on Computational Logic, 16(3:20), July 2015.
doi: 10.1145/2733375.
BibTex | DOI | Web page | PDF ]
[APS15]
K. Athanasiou, H. Ponce de León, and S. Schwoon. Test Case Generation for Concurrent Systems Using Event Structures. In Proceedings of the 9th International Conference on Tests and Proofs (TAP'15), volume 9154 of Lecture Notes in Computer Science, pages 19--37, L'Aquila, Italy, July 2015. Springer.
doi: 10.1007/978-3-319-21215-9_2.
BibTex | DOI | Web page | PDF ]
[BBMU15]
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Pure Nash Equilibria in Concurrent Games. Logical Methods in Computer Science, 11(2:9), June 2015.
doi: 10.2168/LMCS-11(2:9)2015.
BibTex | DOI | Web page | PDF ]
[CLMT15]
K. Chatterjee, S. Lafortune, N. Markey, and W. Thomas. Non-Zero-Sum-Games and Control (Dagstuhl Seminar 15061). Dagstuhl Reports, 5(2):1--25, June 2015.
doi: 10.4230/DagRep.5.2.1.
BibTex | DOI | Web page | PDF ]
[Bol15b]
B. Bollig. Automata and Logics for Concurrent Systems: Realizability and Verification. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, June 2015.
BibTex | Web page | PDF ]
[BHHP15]
B. Barbot, S. Haddad, M. Heiner, and C. Picaronny. Rare Event Handling in Signalling Cascades. International Journal on Advances in Systems and Measurements, 8(1-2):69--79, June 2015.
BibTex | Web page | PDF ]
[RNG15]
K. Rafes, J. Nauroy, and C. Germain. Certifying the interoperability of RDF database systems. In Proceedings of the 2nd Workshop on Linked Data Quality (LDQ'15), volume 1376 of CEUR Workshop Proceedings, Portorož, Slovenia, June 2015. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[ACR15]
É. André, Th. Chatain, and C. Rodríguez. Preserving Partial Order Runs in Parametric Time Petri Nets. In Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD'15), pages 120--129, Brussels, Belgium, June 2015. IEEE Computer Society Press.
doi: 10.1109/ACSD.2015.16.
BibTex | DOI | Web page | PDF ]
[CHKS15]
Th. Chatain, S. Haar, M. Koutny, and S. Schwoon. Non-Atomic Transition Firing in Contextual Nets. In Proceedings of the 36th International Conference on Applications and Theory of Petri Nets (PETRI NETS'15), volume 9115 of Lecture Notes in Computer Science, pages 117--136, Brussels, Belgium, June 2015. Springer.
doi: 10.1007/978-3-319-19488-2_6.
BibTex | DOI | Web page | PDF ]
[DDS15]
S. Demri, A. K. Dhar, and A. Sangnier. Taming Past LTL and Flat Counter Systems. Information and Computation, 242:306--339, June 2015.
doi: 10.1016/j.ic.2015.03.007.
BibTex | DOI | Web page | PDF ]
[CDRR15]
K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin. Looking at Mean-Payoff and Total-Payoff through Windows. Information and Computation, 242:25--52, June 2015.
doi: 10.1016/j.ic.2015.03.010.
BibTex | DOI | Web page | PDF ]
[BtCS15]
V. Bárány, B. ten Cate, and L. Segoufin. Guarded nagation. Journal of the ACM, 62(3:22), June 2015.
doi: 10.1145/2701414.
BibTex | DOI | Web page | PDF ]
[HM15]
S. Haar and R. Meyer, editors. Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD'15), Brussels, Belgium, June 2015. IEEE Computer Society Press.
BibTex | Web page ]
[KGH+15]
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, A. Linard, M. Beccuti, A. Hamez, E. Lopez-Bobeda, L. Jezequel, J. Meijer, E. Paviot-Adet, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, and K. Wolf. Complete Results for the 2015 Edition of the Model Checking Contest, June 2015.
BibTex | Web page ]
[FL15]
A. Finkel and J. Leroux. Recent and simple algorithms for Petri nets. Software & System Modeling, 14(2):719--725, May 2015.
doi: 10.1007/s10270-014-0426-0.
BibTex | DOI | Web page | PDF ]
[KS15b]
P. Karandikar and Ph. Schnoebelen. Generalized Post Embedding Problems. Theory of Computing Systems, 56(4):697--716, May 2015.
doi: 10.1007/s00224-014-9561-9.
BibTex | DOI | Web page | PDF ]
[MD15]
N. Markey and A. Delaborde. Annual report for Year 2. Cassting deliverable D6.3 (FP7-ICT-601148), May 2015. 34 pages.
BibTex ]
[ADE+15]
S. Abiteboul, X. L. Dong, O. Etzioni, D. Srivastava, G. Weikum, J. Stoyanovich, and F. M. Suchanek. The elephant in the room: getting value from Big Data. In Proceedings of the 18th International Workshop on the Web and Databases (WebDB'15), pages 1--5, Melbourne, Australia, May 2015. ACM Press.
doi: 10.1145/2767109.2770014.
BibTex | DOI | Web page | PDF ]
[MSAM15]
V. Z. Moffitt, J. Stoyanovich, S. Abiteboul, and G. Miklau. Collaborative Access Control in WebdamLog. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'15), pages 197--211, Melbourne, Australia, May-June 2015. ACM Press.
doi: 10.1109/DSAA.2015.7344775.
BibTex | DOI | Web page | PDF ]
[AAK15]
S. Abiteboul, B. André, and D. Kaplan. Managing your digital life. Communications of the ACM, 58(5):32--35, May 2015.
doi: 10.1145/2670528.
BibTex | DOI | Web page | PDF ]
[GLSM15]
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Etat d'avancement intermédiaire des travaux engagés sur OrchIDS. Rapport intermédiaire du contrat DGA-INRIA Orchids, May 2015.
BibTex ]
[JKS15]
P. Jancar, P. Karandikar, and Ph. Schnoebelen. On Reachability for Unidirectional Channel Systems Extended with Regular Tests. Logical Methods in Computer Science, 11(2:2), April 2015.
doi: 10.2168/LMCS-11(2:2)2015.
BibTex | DOI | Web page | PDF ]
[KKS15]
P. Karandikar, M. Kufleitner, and Ph. Schnoebelen. On the index of Simon's congruence for piecewise testability. Information Processing Letters, 15(4):515--519, April 2015.
doi: 10.1016/j.ipl.2014.11.008.
BibTex | DOI | Web page | PDF ]
[FKM15]
L. Fribourg, U. Kühne, and N. Markey. Game-based Synthesis of Distributed Controllers for Sampled Switched Systems. In Proceedings of the 2nd International Workshop on Synthesis of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series in Informatics, pages 47--61, London, UK, April 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.SynCoP.2015.47.
BibTex | DOI | Web page | PDF ]
[LDR+15]
A. Le Coënt, F. De Vuyst, Ch. Rey, L. Chamoin, and L. Fribourg. Guaranteed control of switched control systems using model order reduction and state-space bisection. In Proceedings of the 2nd International Workshop on Synthesis of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series in Informatics, pages 32--46, London, UK, April 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.SynCoP.2015.32.
BibTex | DOI | Web page | PDF ]
[ACD15]
M. Arapinis, V. Cheval, and S. Delaune. Composing security protocols: from confidentiality to privacy. In Proceedings of the 4th International Conference on Principles of Security and Trust (POST'15), volume 9036 of Lecture Notes in Computer Science, pages 324--343, London, UK, April 2015. Springer.
doi: 10.1007/978-3-662-46666-7_17.
BibTex | DOI | Web page | PDF ]
[VCD+15]
Y. Velner, K. Chatterjee, L. Doyen, T. A. Henzinger, A. M. Rabinovich, and J.-F. Raskin. The complexity of multi-mean-payoff and multi-energy games. Information and Computation, 241:177--196, April 2015.
doi: 10.1016/j.ic.2015.03.001.
BibTex | DOI | Web page | PDF ]
[LV15]
É. Lozes and J. Villard. Shared contract-obedient channels. Science of Computer Programming, 100:28--60, March 2015.
doi: 10.1016/j.scico.2014.09.008.
BibTex | DOI | Web page | PDF ]
[GDML15]
G. Geeraerts, S. Dehouck, N. Markey, and K. G. Larsen. Efficient algorithms for multi-player games with quantitative aspects. Cassting deliverable D2.1 (FP7-ICT-601148), March 2015. 22 pages.
BibTex | Web page | PDF ]
[DD15b]
S. Demri and M. Deters. Two-variable separation logic and its inner circle. ACM Transactions on Computational Logic, 16(2:15), March 2015.
doi: 10.1145/2724711.
BibTex | DOI | Web page | PDF ]
[KV15]
A. Koutsos and V. Vianu. Process-Centric Views of Data-Driven Business Artifacts. In Proceedings of the 18th International Conference on Database Theory (ICDT'15), volume 31 of Leibniz International Proceedings in Informatics, pages 247--264, Brussels, Belgium, March 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICDT.2015.247.
BibTex | DOI | Web page | PDF ]
[Fra15a]
N. Francis. Asymptotic Determinacy of Path Queries using Union-of-Paths Views. In Proceedings of the 18th International Conference on Database Theory (ICDT'15), volume 31 of Leibniz International Proceedings in Informatics, pages 44--59, Brussels, Belgium, March 2015. Leibniz-Zentrum für Informatik. Best student paper award.
doi: 10.4230/LIPIcs.ICDT.2015.44.
BibTex | DOI | Web page | PDF ]
[GJL15]
S. Göller, J. C. Jung, and M. Lohrey. The Complexity of Decomposing Modal and First-Order Theories. ACM Transactions on Computational Logic, 16(1:9), March 2015.
doi: 10.1145/2699918.
BibTex | DOI | Web page | PDF ]
[Seg15]
L. Segoufin. Constant Delay Enumeration for Conjunctive Queries. SIGMOD Records, 44(1):10--17, March 2015.
doi: 10.1145/2783888.2783894.
BibTex | DOI | Web page | PDF ]
[Kar15]
P. Karandikar. Subwords: automata, embedding problems, and verification. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Chennai Mathematical Institute, India, February 2015.
BibTex | Web page | PDF ]
[Gou15c]
J. Goubault-Larrecq. Full Abstraction for Non-Deterministic and Probabilistic Extensions of PCF I: the Angelic Cases. Journal of Logic and Algebraic Methods in Programming, 84(1):155--184, January 2015.
doi: 10.1016/j.jlamp.2014.09.003.
BibTex | DOI | Web page | PDF ]
[BMS15]
P. Bouyer, N. Markey, and O. Sankur. Robust Reachability in Timed Automata and Games: A Game-based Approach. Theoretical Computer Science, 563:43--74, January 2015.
doi: 10.1016/j.tcs.2014.08.014.
BibTex | DOI | Web page | PDF ]
[Gou15a]
J. Goubault-Larrecq. A short proof of the Schröder-Simpson theorem. Mathematical Structures in Computer Science, 25(1):1--5, January 2015.
doi: 10.1017/S0960129513000467.
BibTex | DOI | Web page | PDF ]
[KDH15]
M. Koutny, J. Desel, and S. Haddad, editors. Transactions on Petri Nets and Other Models of Concurrency X, volume 9410 of Lecture Notes in Computer Science. Springer, 2015.
BibTex | Web page ]
[MLB+15a]
A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and K. Barkaoui. Specifying and Verifying Concurrent C Programs with TLA+. In Proceedings of the 3rd International Workshop on Formal Techniques for Safety-Critical Systems, Nov. 2014 (FTSCS'14), volume 476 of Communications in Computer and Information Science, pages 206--222, Luxembourg, 2015. Springer.
doi: 10.1007/978-3-319-17581-2_14.
BibTex | DOI | Web page | PDF ]
[FH15]
E. Fraca and S. Haddad. Complexity Analysis of Continuous Petri Nets. Fundamenta Informaticae, 137(1):1--28, 2015.
doi: 10.3233/FI-2015-1168.
BibTex | DOI | Web page | PDF ]
[BH15]
N. Bertrand and S. Haddad. Contrôle, probabilités et observation partielle. In Informatique Mathématique. Une photographie en 2015, chapter 5, pages 177--227. CNRS Éditions, 2015.
BibTex | Web page | PDF ]
[Sce15]
G. Scerri. Proofs of security protocols revisited. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2015.
BibTex | Web page | PDF ]
[DD15a]
S. Demri and M. Deters. Separation Logics and Modalities: A Survey. Journal of Applied Non-Classical Logics, 25(1):50--99, 2015.
doi: 10.1080/11663081.2015.1018801.
BibTex | DOI | Web page | PDF ]
[RRS15b]
M. Randour, J.-F. Raskin, and O. Sankur. Variations on the Stochastic Shortest Path Problem. In Proceedings of the 16th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'15), volume 8931 of Lecture Notes in Computer Science, pages 1--18, Mumbai, India, January 2015. Springer.
doi: 10.1007/978-3-662-46081-8_1.
BibTex | DOI | Web page | PDF ]
[BFCH14]
M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and S. Haddad. Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis. The Computer Journal, 57(12):1870--1892, December 2014.
doi: 10.1093/comjnl/bxt134.
BibTex | DOI | Web page | PDF ]
[GLS14]
A. Gheerbrant, L. Libkin, and C. Sirangelo. Naïve Evaluation of Queries over Incomplete Databases. ACM Transactions on Database Systems, 39(4:31), December 2014.
doi: 10.1145/2691190.2691194.
BibTex | DOI | Web page | PDF ]
[Sir14]
C. Sirangelo. Representing and querying incomplete information: a data interoperability perspective. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2014.
BibTex | Web page | PDF ]
[LLV14]
M. Lange, É. Lozes, and M. Vargas Guzmán. Model-checking process equivalences. Theoretical Computer Science, 560(3):326--347, December 2014.
doi: 10.1016/j.tcs.2014.08.020.
BibTex | DOI | Web page | PDF ]
[BHLM14]
B. Bollig, P. Habermehl, M. Leucker, and B. Monmege. A Robust Class of Data Languages and an Application to Learning. Logical Methods in Computer Science, 10(4:19), December 2014.
doi: 10.2168/LMCS-10(4:19)2014.
BibTex | DOI | Web page | PDF ]
[HSS14]
C. Haase, S. Schmitz, and Ph. Schnoebelen. The Power of Priority Channel Systems. Logical Methods in Computer Science, 10(4:4), December 2014.
doi: 10.2168/LMCS-10(4:4)2014.
BibTex | DOI | Web page | PDF ]
[AG14]
C. Aiswarya and P. Gastin. Reasoning about distributed systems: WYSIWYG. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 11--30, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.11.
BibTex | DOI | Web page | PDF ]
[BHL14]
N. Bertrand, S. Haddad, and E. Lefaucheux. Foundation of Diagnosis and Predictability in Probabilistic Systems. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 417--429, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.417.
BibTex | DOI | Web page | PDF ]
[BGK14]
B. Bollig, P. Gastin, and A. Kumar. Parameterized Communicating Automata: Complementation and Model Checking. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 625--637, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.625.
BibTex | DOI | Web page | PDF ]
[CMS14]
R. Chadha, U. Mathur, and S. Schwoon. Computing Information Flow Using Symbolic Model-Checking. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 505--516, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.505.
BibTex | DOI | Web page | PDF ]
[DFM14]
C. David, N. Francis, and F. Murlak. Consistency of injective tree patterns. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 279--290, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.279.
BibTex | DOI | Web page | PDF ]
[DJL+14]
L. Doyen, L. Juhl, K. G. Larsen, N. Markey, and M. Shirmohammadi. Synchronizing words for weighted and timed automata. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 121--132, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.121.
BibTex | DOI | Web page | PDF ]
[BMS14]
P. Bouyer, N. Markey, and D. Stan. Mixed Nash Equilibria in Concurrent Games. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 351--363, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.351.
BibTex | DOI | Web page | PDF ]
[BBB+14]
N. Bertrand, P. Bouyer, Th. Brihaye, Q. Menet, C. Baier, M. Größer, and M. Jurdziński. Stochastic Timed Automata. Logical Methods in Computer Science, 10(4:6), December 2014.
doi: 10.2168/LMCS-10(4:6)2014.
BibTex | DOI | Web page | PDF ]
[BCGZ14]
B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun. Temporal logics for concurrent recursive programs: Satisfiability and model checking. Journal of Applied Logic, 12(4):395--416, December 2014.
doi: 10.1016/j.jal.2014.05.001.
BibTex | DOI | Web page | PDF ]
[CDR14]
V. Cheval, S. Delaune, and M. D. Ryan. Tests for establishing security properties. In Revised Selected Papers of the 9th Symposium on Trustworthy Global Computing (TGC'14), volume 8902 of Lecture Notes in Computer Science, pages 82--96, Rome, Italy, December 2014. Springer.
doi: 10.1007/978-3-662-45917-1_6.
BibTex | DOI | Web page | PDF ]
[FKS14]
L. Fribourg, U. Kühne, and R. Soulat. Finite Controlled Invariants for Sampled Switched Systems. Formal Methods in System Design, 45(3):303--329, December 2014.
doi: 10.1007/s10703-014-0211-2.
BibTex | DOI | Web page | PDF ]
[LM14]
F. Laroussinie and N. Markey. Quantified CTL: Expressiveness and Complexity. Logical Methods in Computer Science, 10(4:17), December 2014.
doi: 10.2168/LMCS-10(4:17)2014.
BibTex | DOI | Web page | PDF ]
[Shi14]
M. Shirmohammadi. Qualitative Analysis of Synchronizing Probabilistic Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Université Libre de Bruxelles, Belgium, December 2014.
BibTex | Web page | PDF ]
[Gou14a]
J. Goubault-Larrecq. Détection d'intrusions avec OrchIDS. Matinale de l'innovation Logiciels Libres et Sécurité, Paris, France, December 2014.
BibTex ]
[GPPS14]
C. Gardent, G. Perrier, Y. Parmentier, and S. Schmitz. Lexical Disambiguation in LTAG using Left Context. In Proceedings of the 5th Language & Technology Conference (LTC'11), volume 8387 of Lecture Notes in Artificial Intelligence, Poznań, Poland, November 2014. Springer.
BibTex | Web page ]
[BC14]
G. Bana and H. Comon-Lundh. A Computationally Complete Symbolic Attacker for Equivalence Properties. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14), pages 609--620, Scottsdale, Arizona, USA, November 2014. ACM Press.
doi: 10.1145/2660267.2660276.
BibTex | DOI | Web page | PDF ]
[Pon14]
H. Ponce de León. Testing Concurrent Systems Through Event Structures. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2014.
BibTex | Web page | PDF ]
[Bar14]
B. Barbot. Acceleration for Statistical Model Checking. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2014.
BibTex | Web page | PDF ]
[CHJ+14]
Th. Chatain, S. Haar, L. Jezequel, L. Paulevé, and S. Schwoon. Characterization of Reachable Attractors Using Petri Net Unfoldings. In Proceedings of the 12th Conference on Computational Methods in System Biology (CMSB'14), volume 8859 of Lecture Notes in Bioinformatics, pages 129--142, Manchester, UK, November 2014. Springer-Verlag.
doi: 10.1007/978-3-319-12982-2_10.
BibTex | DOI | Web page | PDF ]
[PHL14b]
H. Ponce de León, S. Haar, and D. Longuet. Model-Based Testing for Concurrent Systems with Labeled Event Structures. Software Testing, Verification and Reliability, 24(7):558--590, November 2014.
doi: 10.1002/stvr.1543.
BibTex | DOI | Web page | PDF ]
[AGNK14]
C. Aiswarya, P. Gastin, and K. Narayan Kumar. Verifying Communicating Multi-pushdown Systems via Split-width. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 1--17, Sydney, Australia, November 2014. Springer.
doi: 10.1007/978-3-319-11936-6_1.
BibTex | DOI | Web page | PDF ]
[BGM14]
P. Bouyer, P. Gardy, and N. Markey. Quantitative verification of weighted Kripke structures. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 64--80, Sydney, Australia, November 2014. Springer.
doi: 10.1007/978-3-319-11936-6_6.
BibTex | DOI | Web page | PDF ]
[MV14b]
N. Markey and S. Vester. Symmetry Reduction in Infinite Games with Finite Branching. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 281--296, Sydney, Australia, November 2014. Springer.
doi: 10.1007/978-3-319-11936-6_21.
BibTex | DOI | Web page | PDF ]
[ACD14]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Information and Computation, 238:30--67, November 2014.
doi: 10.1016/j.ic.2014.07.004.
BibTex | DOI | Web page | PDF ]
[BCD14]
S. Bursuc, H. Comon-Lundh, and S. Delaune. Deducibility constraints and blind signatures. Information and Computation, 238:106--127, November 2014.
doi: 10.1016/j.ic.2014.07.006.
BibTex | DOI | Web page | PDF ]
[KNS14]
P. Karandikar, M. Niewerth, and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords. Research Report 1406.0690, Computing Research Repository, November 2014. 24 pages.
BibTex | Web page | PDF ]
[MCGS14]
N. Markey, N. Chaturvedi, G. Geeraerts, and J. Srba. Efficient strategy synthesis for complex objectives. Cassting deliverable D2.4 (FP7-ICT-601148), October 2014. 20 pages.
BibTex | Web page | PDF ]
[BHHP14]
B. Barbot, S. Haddad, M. Heiner, and C. Picaronny. Rare Event Handling in Signalling Cascades. In Proceedings of the 6th International Conference on Advances in System Simulation (SIMUL'14), pages 126--131, Nice, France, October 2014. XPS.
BibTex | Web page | PDF ]
[AFG14]
S. Abiteboul, L. Fribourg, and J. Goubault-Larrecq. Gérard Berry : un informaticien médaille d'or du CNRS 2014. 1024 -- Bulletin de la société informatique de France, 4:139--142, October 2014.
BibTex | Web page | PDF ]
[MA14]
D. Montoya and S. Abiteboul. Inférence d'itinéraires multimodaux à partir de données smartphone. In Actes de la 30ème Conférence sur la Gestion de Données -- Principes, Technologies et Applications (BDA'14), pages 38--42, Autrans, France, October 2014.
BibTex | Web page | PDF ]
[Lef14]
E. Lefaucheux. Détection de fautes dans les systèmes probabilistes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 35 pages.
BibTex | Web page | PDF ]
[Dub14]
J. Dubut. Homologie dirigée. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 35 pages.
BibTex | Web page | PDF ]
[Hal14]
S. Halfon. Non Primitive Recursive Complexity Classes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 21 pages.
BibTex | Web page | PDF ]
[DDS14]
S. Demri, A. K. Dhar, and A. Sangnier. Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 85--97, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_7.
BibTex | DOI | Web page | PDF ]
[CD14c]
R. Chrétien and S. Delaune. Le bitcoin, une monnaie 100% numérique. Interstices, September 2014.
BibTex | Web page | PDF ]
[Sch14a]
S. Schmitz. Complexity Bounds for Ordinal-Based Termination. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 1--19, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_1.
BibTex | DOI | Web page | PDF ]
[BGS14]
B. Bollig, P. Gastin, and J. Schubert. Parameterized Verification of Communicating Automata under Context Bounds. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 45--57, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_4.
BibTex | DOI | Web page | PDF ]
[HM14]
S. Haddad and B. Monmege. Reachability in MDPs: Refining Convergence of Value Iteration. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 125--137, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_10.
BibTex | DOI | Web page | PDF ]
[LS14b]
J. Leroux and Ph. Schnoebelen. On Functions Weakly Computable by Petri Nets and Vector Addition Systems. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 190--202, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_15.
BibTex | DOI | Web page | PDF ]
[HH14]
C. Haase and S. Halfon. Integer Vector Addition Systems with States. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 112--124, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_9.
BibTex | DOI | Web page | PDF ]
[BMP14]
L. Brandán Briones, A. Madalinski, and H. Ponce de León. Distributed Diagnosability Analysis with Petri Nets. In Proceedings of the 25th International Workshop on Principles of Diagnosis (DX'14), Graz, Austria, September 2014.
BibTex | Web page | PDF ]
[CGNK14]
A. Cyriac, P. Gastin, and K. Narayan Kumar. Controllers for the Verification of Communicating Multi-Pushdown Systems. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 297--311, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_21.
BibTex | DOI | Web page | PDF ]
[CCD14]
R. Chrétien, V. Cortier, and S. Delaune. Typing messages for free in security protocols: the case of equivalence properties. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 372--386, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_26.
BibTex | DOI | Web page | PDF ]
[DMS14b]
L. Doyen, Th. Massart, and M. Shirmohammadi. Robust Synchronization in Markov Decision Processes. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 234--248, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_17.
BibTex | DOI | Web page | PDF ]
[BMM14]
P. Bouyer, N. Markey, and R. M. Matteplackel. Averaging in LTL. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 266--280, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_19.
BibTex | DOI | Web page | PDF ]
[PHL14a]
H. Ponce de León, S. Haar, and D. Longuet. Distributed testing of concurrent systems: vector clocks to the rescue. In Proceedings of the 11th International Colloquium on Theoretical Aspects of Computing (ICTAC'14), volume 8687 of Lecture Notes in Computer Science, pages 369--387, Bucharest, Romania, September 2014. Springer.
doi: 10.1007/978-3-319-10882-7_22.
BibTex | DOI | Web page | PDF ]
[Dou14]
A. Doumane. Études des automates en ludique. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014.
BibTex ]
[Gou14c]
J. Goubault-Larrecq. Noetherian spaces. Invited talk, Continuity, Computability, Constructivity workshop (CCC), Ljubljana, Slovenia, September 2014.
BibTex ]
[Jaz14]
S. Jaziri. Robustness issues in priced timed automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014.
BibTex ]
[CS14]
J.-B. Courtois and S. Schmitz. Alternating Vector Addition Systems with States. In Proceedings of the 39th International Symposium on Mathematical Foundations of Computer Science (MFCS'14) -- Part I, volume 8634 of Lecture Notes in Computer Science, pages 220--231, Budapest, Hungary, August 2014. Springer.
doi: 10.1007/978-3-662-44522-8_19.
BibTex | DOI | Web page | PDF ]
[KS14]
P. Karandikar and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords. In Proceedings of the 16th Workshop on Descriptional Complexity of Formal Systems (DCFS'14), volume 8614 of Lecture Notes in Computer Science, pages 234--245, Turku, Finland, August 2014. Springer-Verlag.
doi: 10.1007/978-3-319-09704-6_21.
BibTex | DOI | Web page | PDF ]
[SLS+14]
Y. Sun, G. Lipari, R. Soulat, L. Fribourg, and N. Markey. Component-Based Analysis of Hierarchical Scheduling using Linear Hybrid Automata. In Proceedings of the 20th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'14), Chongqing, China, August 2014. IEEE Computer Society Press.
doi: 10.1109/RTCSA.2014.6910502.
BibTex | DOI | Web page | PDF ]
[DD14a]
S. Demri and M. Deters. The effects of modalities in separation logics (extended abstract). In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'14), pages 134--138, Groningen, The Netherlands, August 2014. College Publications.
BibTex | Web page | PDF ]
[DKW14]
S. Demri, D. Kapur, and C. Weidenbach, editors. Proceedings of the 7th International Joint Conference on Automated Reasoning (IJCAR'14), volume 8562 of Lecture Notes in Computer Science, Vienna, Austria, July 2014. Springer.
BibTex | Web page ]
[CKM14]
M. Cadilhac, A. Krebs, and P. McKenzie. Extremely uniform branching programs. In Proceedings of the 6th Workshop on Non-Classical Models of Automata and Applications (NCMA'14), volume 304 of books@ocg.at, pages 73--83, Kassel, Germany, July 2014. Austrian Computer Society.
BibTex | Web page | PDF ]
[BFS14]
F. Bouchy, A. Finkel, and P. San Pietro. Dense-choice Counter Machines Revisited. Theoretical Computer Science, 542:17--31, July 2014.
doi: 10.1016/j.tcs.2014.04.029.
BibTex | DOI | Web page | PDF ]
[CD14a]
K. Chatterjee and L. Doyen. Games with a Weak Adversary. In Proceedings of the 41st International Colloquium on Automata, Languages and Programming (ICALP'14) -- Part II, volume 8573 of Lecture Notes in Computer Science, pages 110--121, Copenhagen, Denmark, July 2014. Springer.
doi: 10.1007/978-3-662-43951-7_10.
BibTex | DOI | Web page | PDF ]
[BFM14]
M. Blondin, A. Finkel, and P. McKenzie. Handling Infinitely Branching WSTS. In Proceedings of the 41st International Colloquium on Automata, Languages and Programming (ICALP'14) -- Part II, volume 8573 of Lecture Notes in Computer Science, pages 13--25, Copenhagen, Denmark, July 2014. Springer.
doi: 10.1007/978-3-662-43951-7_2.
BibTex | DOI | Web page | PDF ]
[DD14b]
S. Demri and M. Deters. Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603142.
BibTex | DOI | Web page | PDF ]
[BGMZ14a]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Logical Characterization of Weighted Pebble Walking Automata. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603118.
BibTex | DOI | Web page | PDF ]
[Haa14]
C. Haase. Subclasses of Presburger Arithmetic and the Weak EXP Hierarchy. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603092.
BibTex | DOI | Web page | PDF ]
[Bol14]
B. Bollig. Logic for Communicating Automata with Parameterized Topology. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603093.
BibTex | DOI | Web page | PDF ]
[Sch14b]
S. Schmitz. Implicational Relevance Logic is 2-ExpTime-Complete. In Proceedings of the Joint 25th International Conference on Rewriting Techniques and Applications and 12th International Conference on Typed Lambda-Calculi and Applications (RTA/ TLCA'14), volume 8560 of Lecture Notes in Computer Science, pages 395--409, Vienna, Austria, July 2014. Springer.
doi: 10.1007/978-3-319-08918-8_27.
BibTex | DOI | Web page | PDF ]
[LS14a]
R. Lazić and S. Schmitz. Non-Elementary Complexities for Branching VASS, MELL, and Extensions. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603129.
BibTex | DOI | Web page | PDF ]
[Gou14d]
J. Goubault-Larrecq. OrchIDS: on the value of rigor in intrusion detection. CPS Summer School, Grenoble, France, July 2014.
BibTex ]
[DSS14]
A. Durand, N. Schweikardt, and L. Segoufin. Enumerating answers to first-order queries over databases of low degree. In Proceedings of the 33rd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'14), pages 121--131, Snowbird, Utah, USA, June 2014. ACM Press.
doi: 10.1145/2594538.2594539.
BibTex | DOI | Web page | PDF ]
[JLMX14]
S. Jaziri, K. G. Larsen, R. Mardare, and B. Xue. Adequacy and Complete Axiomatization for Timed Modal Logic. In Proceedings of the 30th Conference on Mathematical Foundations of Programming Semantics (MFPS'14), volume 308 of Electronic Notes in Theoretical Computer Science, pages 183--210, Ithaca, New York, USA, June 2014. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2014.10.011.
BibTex | DOI | Web page | PDF ]
[GJ14]
J. Goubault-Larrecq and A. Jung. QRB, QFS, and the Probabilistic Powerdomain. In Proceedings of the 30th Conference on Mathematical Foundations of Programming Semantics (MFPS'14), volume 308 of Electronic Notes in Theoretical Computer Science, pages 167--182, Ithaca, New York, USA, June 2014. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2014.10.010.
BibTex | DOI | Web page | PDF ]
[ADK14]
M. Arapinis, S. Delaune, and S. Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, 10(2:11), June 2014.
doi: 10.2168/LMCS-10(2:11)2014.
BibTex | DOI | Web page | PDF ]
[FL14]
A. Finkel and J. Leroux. Neue, einfache Algorithmen für Petrinetze. Informatik Spektrum, 37(3):229--236, June 2014.
doi: 10.1007/s00287-013-0753-5.
BibTex | DOI | Web page | PDF ]
[KH14]
F. Kordon and F. Hulin-Hubard. BenchKit, a Tool for Massive Concurrent Benchmarking. In Proceedings of the 14th International Conference on Application of Concurrency to System Design (ACSD'14), pages 159--165, Tunis, Tunisia, June 2014. IEEE Computer Society Press.
doi: 10.1109/ACSD.2014.12.
BibTex | DOI | Web page | PDF ]
[GHKS14]
V. Germanos, S. Haar, V. Khomenko, and S. Schwoon. Diagnosability under Weak Fairness. In Proceedings of the 14th International Conference on Application of Concurrency to System Design (ACSD'14), pages 132--141, Tunis, Tunisia, June 2014. IEEE Computer Society Press.
doi: 10.1109/ACSD.2014.9.
BibTex | DOI | Web page | PDF ]
[DGLWM14]
S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Méry. Separation Logic with One Quantified Variable. In Proceedings of the 9th International Computer Science Symposium in Russia (CSR'14), volume 8476 of Lecture Notes in Computer Science, pages 125--138, Moscow, Russia, June 2014. Springer.
doi: 10.1007/978-3-319-06686-8_10.
BibTex | DOI | Web page | PDF ]
[Gou14b]
J. Goubault-Larrecq. Exponentiable streams and prestreams. Applied Categorical Structures, 22(3):515--549, June 2014. Errata 1: http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf; Errata 2: http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum2.pdf.
doi: 10.1007/s10485-013-9315-x.
BibTex | DOI | Web page | PDF ]
[KGH+14]
F. Kordon, H. Garavel, L.-M. Hillah, F. Hulin-Hubard, A. Linard, M. Beccuti, S. Evangelista, A. Hamez, N. Lohmann, E. Lopez, E. Paviot-Adet, C. Rodriguez, C. Rohr, and J. Srba. Results for the MCC @ Petri Nets 2014, June 2014.
BibTex | Web page ]
[FFL+14]
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Correct-by-design Control Synthesis for Multilevel Converters using State Space Decomposition. In Proceedings of the 2nd French-Singaporean Workshop on Formal Methods and Applications (FSFMA'14), volume 156 of Electronic Proceedings in Theoretical Computer Science, pages 5--16, Singapore, May 2014.
doi: 10.4204/EPTCS.156.5.
BibTex | DOI | Web page | PDF ]
[MV14a]
N. Markey and S. Valette. Annual report for Year 1. Cassting deliverable D6.2 (FP7-ICT-601148), May 2014. 38 pages.
BibTex ]
[GM14]
P. Gastin and B. Monmege. Adding Pebbles to Weighted Automata -- Easy Specification & Efficient Evaluation. Theoretical Computer Science, 534:24--44, May 2014.
doi: 10.1016/j.tcs.2014.02.034.
BibTex | DOI | Web page | PDF ]
[GLSM14b]
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Techniques et méthodes de génération de signatures pour la détection d'intrusions. Fourniture 2 du contrat DGA-INRIA Orchids, May 2014.
BibTex ]
[GLSM14a]
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Politiques de sécurité système. Fourniture 1 du contrat DGA-INRIA Orchids, May 2014.
BibTex ]
[SLAF14]
Y. Sun, G. Lipari, É. André, and L. Fribourg. Toward Parametric Timed Interfaces for Real-Time Components. In Proceedings of the 1st International Workshop on Synthesis of Continuous Parameters (SYNCOP'14), volume 145 of Electronic Proceedings in Theoretical Computer Science, pages 49--64, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.145.6.
BibTex | DOI | Web page | PDF ]
[CD14b]
K. Chatterjee and L. Doyen. Partial-Observation Stochastic Games: How to Win when Belief Fails. ACM Transactions on Computational Logic, 15(2:16), April 2014.
doi: 10.1145/2579819.
BibTex | DOI | Web page | PDF ]
[SL14]
Y. Sun and G. Lipari. A Weak Simulation Relation for Real-Time Schedulability Analysis of Global Fixed Priority Scheduling Using Linear Hybrid Automata. Research Report LSV-14-06, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2014. 17 pages.
BibTex | Web page | PDF ]
[CDNV14]
K. Chatterjee, L. Doyen, S. Nain, and M. Y. Vardi. The Complexity of Partial-Observation Stochastic Parity Games with Finite-Memory Strategies. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 242--257, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_16.
BibTex | DOI | Web page | PDF ]
[CDGO14]
K. Chatterjee, L. Doyen, H. Gimbert, and Y. Oualhadj. Perfect-Information Stochastic Mean-Payoff Parity Games. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 210--225, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_4.
BibTex | DOI | Web page | PDF ]
[DMS14a]
L. Doyen, Th. Massart, and M. Shirmohammadi. Limit Synchronization in Markov Decision Processes. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 58--72, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_4.
BibTex | DOI | Web page | PDF ]
[Mar14]
N. Markey. Cassting: Synthesizing Complex Systems Using Non-Zero-Sum Games. ERCIM News, 97:25--26, April 2014.
BibTex | Web page | PDF ]
[BDH14]
D. Baelde, S. Delaune, and L. Hirschi. A reduced semantics for deciding trace equivalence using constraint systems. In Proceedings of the 3rd International Conference on Principles of Security and Trust (POST'14), volume 8414 of Lecture Notes in Computer Science, pages 1--21, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54792-8_1.
BibTex | DOI | Web page | PDF ]
[BM14a]
D. Berwanger and A. B. Mathew. Games with Recurring Certainty. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 91--96, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.146.12.
BibTex | DOI | Web page | PDF ]
[CDFR14b]
K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin. Doomsday Equilibria for Omega-Regular Games. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 43--48, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.146.6.
BibTex | DOI | Web page | PDF ]
[BMV14]
P. Bouyer, N. Markey, and S. Vester. Nash Equilibria in Symmetric Games with Partial Observation. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 49--55, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.146.7.
BibTex | DOI | Web page | PDF ]
[AGH+14]
T. Antonopoulos, N. Gorogiannis, C. Haase, M. Kanovich, and J. Ouaknine. Foundations for Decision Problems in Separation Logic with General Inductive Predicates. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 411--425, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_27.
BibTex | DOI | Web page | PDF ]
[BFH+14]
N. Bertrand, É. Fabre, S. Haar, S. Haddad, and L. Hélouët. Active diagnosis for probabilistic systems. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 29--42, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_4.
BibTex | DOI | Web page | PDF ]
[ABG+14b]
S. Akshay, B. Bollig, P. Gastin, M. Mukund, and K. Narayan Kumar. Distributed Timed Automata with Independently Evolving Clocks. Fundamenta Informaticae, 130(4):377--407, April 2014.
doi: 10.3233/FI-2014-996.
BibTex | DOI | Web page | PDF ]
[BGMZ14b]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Pebble Weighted Automata and Weighted Logics. ACM Transactions on Computational Logic, 15(2:15), April 2014.
doi: 10.1145/2579819.
BibTex | DOI | Web page | PDF ]
[MBL14]
N. Markey, Th. Brihaye, and K. G. Larsen. Robustness of collective adaptive systems. Cassting deliverable D3.1 (FP7-ICT-601148), March 2014. 17 pages.
BibTex | Web page | PDF ]
[BM14b]
Th. Brihaye and N. Markey. Solution concepts for collective adaptive systems. Cassting deliverable D1.4 (FP7-ICT-601148), March 2014. 13 pages.
BibTex | Web page | PDF ]
[Seg14]
L. Segoufin. A glimpse on constant delay enumeration. In Proceedings of the 31st Annual Symposium on Theoretical Aspects of Computer Science (STACS'14), volume 25 of Leibniz International Proceedings in Informatics, pages 13--27, Lyon, France, March 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2014.13.
BibTex | DOI | Web page | PDF ]
[ADV14]
S. Abiteboul, D. Deutch, and V. Vianu. Deduction with Contradictions in Datalog. In Proceedings of the 17th International Conference on Database Theory (ICDT'14), pages 143--154, Athens, Greece, March 2014.
doi: 10.5441/002/icdt.2014.17.
BibTex | DOI | Web page | PDF ]
[EM14]
Y. Elias and P. McKenzie. On Generalized Addition Chains. INTEGERS -- Electronic Journal of Combinatorial Number Theory, 14(A16), March 2014.
BibTex | Web page | PDF ]
[FSS14]
N. Francis, L. Segoufin, and C. Sirangelo. Datalog Rewritings of Regular Path Queries using Views. In Proceedings of the 17th International Conference on Database Theory (ICDT'14), pages 107--118, Athens, Greece, March 2014.
doi: 10.5441/002/icdt.2014.14.
BibTex | DOI | Web page | PDF ]
[BLM14]
P. Bouyer, K. G. Larsen, and N. Markey. Lower-Bound Constrained Runs in Weighted Timed Automata. Performance Evaluation, 73:91--109, March 2014.
doi: 10.1016/j.peva.2013.11.002.
BibTex | DOI | Web page | PDF ]
[HHM14]
S. Haddad, R. Hennicker, and M. H. Møller. Specification of Asynchronous Component Systems with Modal IashO-Petri Nets. In Revised Selected Papers of the 8th Symposium on Trustworthy Global Computing (TGC'13), volume 8358 of Lecture Notes in Computer Science, pages 219--234, Buenos Aires, Argentina, March 2014. Springer.
doi: 10.1007/978-3-319-05119-2_13.
BibTex | DOI | Web page | PDF ]
[Fin14]
A. Finkel. REACHARD -- Compte-rendu intermédiaire. Deliverable D3 Reachard (ANR-11-BS02-001), February 2014. 18 pages.
BibTex ]
[Bra14]
J. Brault-Baron. Hypergraph Acyclicity Revisited. Research Report 1403.7076, Computing Research Repository, February 2014. 32 pages.
BibTex | Web page | PDF ]
[Sou14]
R. Soulat. Synthesis of Correct-by-Design Schedulers for Hybrid Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2014.
BibTex | Web page | PDF ]
[FGM+14]
L. Fribourg, É. Goubault, S. Mohamed, S. Putot, and R. Soulat. Synthesis of robust boundary control for systems governed by semi-discrete differential equations. Research Report LSV-14-03, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2014. 8 pages.
BibTex | Web page | PDF ]
[SBM14]
O. Sankur, P. Bouyer, and N. Markey. Shrinking Timed Automata. Information and Computation, 234:107--132, February 2014.
doi: 10.1016/j.ic.2014.01.002.
BibTex | DOI | Web page | PDF ]
[KL14]
S. Kumar and G. Lipari. Latency Analysis of Network-On-Chip-based Many-Core Processors. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP'14), pages 432--439, Turin, Italy, February 2014. IEEE Computer Society Press.
doi: 10.1109/PDP.2014.107.
BibTex | DOI ]
[ABG+14a]
A. Adjé, O. Bouissou, J. Goubault-Larrecq, É. Goubault, and S. Putot. Static Analysis of Programs with Imprecise Probabilistic Inputs. In Revised Selected Papers of the 5th IFIP TC2/WG2.3 Conference Verified Software---Theories, Tools, and Experiments (VSTTE'13), volume 8164 of Lecture Notes in Computer Science, pages 22--47, Atherton, California, USA, 2014. Springer.
doi: 10.1007/978-3-642-54108-7.
BibTex | DOI | Web page | PDF ]
[BFHP14]
L. Bernardinello, C. Ferigato, S. Haar, and L. Pomello. Closed Sets in Occurrence Nets with Conflicts. Fundamenta Informaticae, 133(4):323--344, 2014.
doi: 10.3233/FI-2014-1079.
BibTex | DOI | Web page | PDF ]
[KHY14]
M. Koutny, S. Haddad, and A. Yakovlev, editors. Transactions on Petri Nets and Other Models of Concurrency IX, volume 8910 of Lecture Notes in Computer Science. Springer, 2014.
BibTex | Web page ]
[CH14]
Th. Chatain and S. Haar. A Canonical Contraction for Safe Petri Nets. In Transactions on Petri Nets and Other Models of Concurrency IX, volume 8910 of Lecture Notes in Computer Science, pages 83--98. Springer, 2014.
doi: 10.1007/978-3-662-45730-6_5.
BibTex | DOI | Web page | PDF ]
[GS14]
J. Goubault-Larrecq and R. Segala. Random Measurable Selections. In Horizons of the Mind. A Tribute to Prakash Panangaden, volume 8464 of Lecture Notes in Computer Science, pages 343--362. Springer, 2014.
doi: 10.1007/978-3-319-06880-0_18.
BibTex | DOI | Web page | PDF ]
[CDFR14a]
K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin. Doomsday Equilibria for Omega-Regular Games. In Proceedings of the 15th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'14), volume 8318 of Lecture Notes in Computer Science, pages 78--97, San Diego, California, USA, January 2014. Springer.
doi: 10.1007/978-3-642-54013-4_5.
BibTex | DOI | Web page | PDF ]
[Cyr14]
A. Cyriac. Verification of Communicating Recursive Programs via Split-width. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2014.
BibTex | Web page | PDF ]
[BCG+14]
D. Baelde, K. Chaudhuri, A. Gacek, D. Miller, G. Nadathur, A. Tiu, and Y. Wang. Abella: A System for Reasoning about Relational Specifications. Journal of Formalized Reasoning, 7(2):1--89, 2014.
doi: 10.6092/issn.1972-5787/4650.
BibTex | DOI | Web page | PDF ]
[Cha13]
Th. Chatain. Concurrency in Real-Time Distributed Systems, from Unfoldings to Implementability. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2013.
BibTex | Web page | PDF ]
[Rod13]
C. Rodríguez. Verification Based on Unfoldings of Petri Nets with Read Arcs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2013.
BibTex | Web page | PDF ]
[Sch13]
S. Schwoon. Efficient verification of sequential and concurrent systems. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2013.
BibTex | Web page | PDF ]
[Ant13]
É. Antoine. Distributed data management with a declarative rule-based language: Webdamlog. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2013.
BibTex | Web page | PDF ]
[BLBL13]
M. Bambagini, J. Lelli, G. Buttazzo, and G. Lipari. On the Energy-Aware Partitioning of Real-Time Tasks on Homogeneous Multi-Processor Systems. In Proceedings of the 4th International Conference on Energy-Aware Computing Systems and Applications (ICEAC'14),, pages 69--74, Istanbul, Turkey, December 2013. IEEE Circuits and Systems Society.
doi: 10.1109/ICEAC.2013.6737640.
BibTex | DOI | Web page | PDF ]
[HHMS13]
S. Haar, S. Haddad, T. Melliti, and S. Schwoon. Optimal Constructions for Active Diagnosis. In Proceedings of the 33rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'13), volume 24 of Leibniz International Proceedings in Informatics, pages 527--539, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2013.527.
BibTex | DOI | Web page | PDF ]
[EJS13]
J. Esparza, L. Jezequel, and S. Schwoon. Computation of summaries using net unfoldings. In Proceedings of the 33rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'13), volume 24 of Leibniz International Proceedings in Informatics, pages 225--236, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2013.225.
BibTex | DOI | Web page | PDF ]
[CDKR13]
C. Chevalier, S. Delaune, S. Kremer, and M. D. Ryan. Composition of Password-based Protocols. Formal Methods in System Design, 43(3):369--413, December 2013.
doi: 10.1007/s10703-013-0184-6.
BibTex | DOI | Web page | PDF ]
[BS13c]
D. Berwanger and O. Serre. Théorie des jeux en informatique. Technique et Science Informatiques, 32(9-10), December 2013.
BibTex | Web page | PDF ]
[BC13a]
S. Balaguer and Th. Chatain. Avoiding Shared Clocks in Networks of Timed Automata. Logical Methods in Computer Science, 9(4:13), November 2013.
doi: 10.2168/LMCS-9(4:13)2013.
BibTex | DOI | Web page | PDF ]
[CD13b]
R. Chrétien and S. Delaune. La protection des informations sensibles. Pour La Science, 433:70--77, November 2013.
BibTex | Web page ]
[PHL13]
H. Ponce de León, S. Haar, and D. Longuet. Unfolding-based Test Selection for Concurrent Conformance. In Proceedings of the 25th IFIP International Conference on Testing Software and Systems (ICTSS'13), Lecture Notes in Computer Science, pages 98--113, Istanbul, Turkey, November 2013. Springer.
doi: 10.1007/978-3-642-41707-8_7.
BibTex | DOI | Web page | PDF ]
[KS13c]
W. Kazana and L. Segoufin. Enumeration of monadic second-order queries on trees. ACM Transactions on Computational Logic, 14(4), November 2013.
doi: 10.1145/2528928.
BibTex | DOI | Web page | PDF ]
[CFM13]
M. Cadilhac, A. Finkel, and P. McKenzie. Unambiguous Contrained Automata. International Journal of Foundations of Computer Science, 24(7):1099--1116, November 2013.
doi: 10.1142/S0129054113400339.
BibTex | DOI | Web page | PDF ]
[BS13a]
N. Bertrand and Ph. Schnoebelen. Computable fixpoints in well-structured symbolic model checking. Formal Methods in System Design, 43(2):233--267, October 2013.
doi: 10.1007/s10703-012-0168-y.
BibTex | DOI | Web page | PDF ]
[MLS+13]
N. Markey, K. G. Larsen, A. Skou, D. Lux, J. Rozenkilde, K. L. Pedersen, and S. M. Sørensen. Description of case studies. Cassting deliverable D4.1 (FP7-ICT-601148), October 2013. 19 pages.
BibTex ]
[Mon13]
B. Monmege. Spécification et vérification de propriétés quantitatives : expressions, logiques, et automates. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2013.
BibTex | Web page | PDF ]
[PLML13]
A. Parri, J. Lelli, M. Marinoni, and G. Lipari. Design and Implementation of the Multiprocessor Bandwidth Inheritance Protocol on Linux. In Proceedings of the 15th Real-Time Linux Workshop (RTLWS'13), pages 41--54, Lugano-Manno, Switzerland, October 2013. Open Source Automation Development Lab (OSADL).
BibTex | Web page | PDF ]
[SSL+13]
Y. Sun, R. Soulat, G. Lipari, É. André, and L. Fribourg. Parametric Schedulability Analysis of Fixed Priority Real-Time Distributed Systems. In Preproceedings of the 2nd International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13), pages 179--194, Queenstown, New Zealand, October 2013.
BibTex | Web page | PDF ]
[PBB13]
H. Ponce de León, G. Bonigo, and L. Brandán Briones. Distributed Analysis of Diagnosability in Concurrent Systems. In Proceedings of the 24th International Workshop on Principles of Diagnosis (DX'13), Jerusalem, Israel, October 2013.
BibTex | Web page | PDF ]
[ABD+13]
É. André, B. Barbot, C. Démoulins, L. M. Hillah, F. Hulin-Hubard, F. Kordon, A. Linard, and L. Petrucci. A Modular Approach for Reusing Formalisms in Verification Tools of Concurrent Systems. In Proceedings of the 15th International Conference on Formal Engineering Methods (ICFEM'13), Lecture Notes in Computer Science, pages 199--214, Queenstown, New Zealand, October-November 2013. Springer.
doi: 10.1007/978-3-642-41202-8_14.
BibTex | DOI | Web page | PDF ]
[BDG+13]
Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine, J.-F. Raskin, and J. Worrell. Time-Bounded Reachability for Monotonic Hybrid Automata: Complexity and Fixed Points. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 55--70, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_6.
BibTex | DOI | Web page | PDF ]
[CDRR13]
K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin. Looking at Mean-Payoff and Total-Payoff through Windows. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 118--132, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_10.
BibTex | DOI | Web page | PDF ]
[RS13a]
C. Rodríguez and S. Schwoon. Cunf: A Tool for Unfolding and Verifying Petri Nets with Read Arcs. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 492--495, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_42.
BibTex | DOI | Web page | PDF ]
[AFS13a]
É. André, L. Fribourg, and R. Soulat. Merge and Conquer: State Merging in Parametric Timed Automata. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 381--396, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_27.
BibTex | DOI | Web page | PDF ]
[CDH13]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. A survey of partial-observation stochastic parity games. Formal Methods in System Design, 43(2):268--284, October 2013.
doi: 10.1007/s10703-012-0164-2.
BibTex | DOI | Web page | PDF ]
[GO13]
J. Goubault-Larrecq and J. Olivain. On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. In Revised Selected Papers of the 6th International Symposium on Foundations and Practice of Security (FPS'13), volume 8352 of Lecture Notes in Computer Science, pages 3--16, La Rochelle, France, October 2013. Springer.
doi: 10.1007/978-3-319-05302-8_1.
BibTex | DOI | Web page | PDF ]
[AV13b]
S. Abiteboul and V. Vianu. Models for Data-Centric Workflows. In In Search of Elegance in the Theory and Practice of Computation -- Essays Dedicated to Peter Buneman, volume 8000 of Lecture Notes in Computer Science, pages 1--12. Springer, September 2013.
doi: 10.1007/978-3-642-41660-6_1.
BibTex | DOI ]
[tCS13]
B. ten Cate and L. Segoufin. Unary negation. Logical Methods in Computer Science, 9(3:25), September 2013.
doi: 10.2168/LMCS-9(3:25)2013.
BibTex | DOI | Web page | PDF ]
[BCMV13]
R. Bonnet, R. Chadha, P. Madhusudan, and M. Viswanathan. Reachability under contextual locking. Logical Methods in Computer Science, 9(3:21), September 2013.
doi: 10.2168/LMCS-9(3:21)2013.
BibTex | DOI | Web page | PDF ]
[BL13b]
G. Buttazzo and G. Lipari. Ptask: An Educational C Library for Programming Real-Time Systems on Linux. In Proceedings of the 18th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'13), Cagliari, Italy, September 2013. IEEE Industrial Electronics Society.
doi: 10.1109/ETFA.2013.6648001.
BibTex | DOI | Web page | PDF ]
[Bro13]
R. Brochenin. Separation Logic: Expressiveness, Complexity, Temporal Extension. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013.
BibTex | Web page | PDF ]
[Kaz13]
W. Kazana. Query Evaluation with Constant Delay. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013.
BibTex | Web page | PDF ]
[Hir13a]
L. Hirschi. Réduction d'entrelacements pour l'équivalence de traces. Research Report LSV-13-13, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013. 22 pages.
BibTex | Web page | PDF ]
[BMS13b]
P. Bouyer, N. Markey, and O. Sankur. Robustness in timed automata. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 1--18, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_1.
BibTex | DOI | Web page | PDF ]
[Rei13]
J. Reichert. On The Complexity of Counter Reachability Games. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 196--208, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_18.
BibTex | DOI | Web page | PDF ]
[BHJL13]
B. Bérard, S. Haddad, A. Jovanovic, and D. Lime. Parametric Interrupt Timed Automata. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 59--69, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_7.
BibTex | DOI | Web page | PDF ]
[FS13c]
L. Fribourg and R. Soulat. Stability Controllers for Sampled Switched Systems. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 135--145, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_13.
BibTex | DOI | Web page | PDF ]
[SHL+13]
R. Soulat, G. Hérault, D. Labrousse, B. Revol, G. Feld, S. Lefebvre, and L. Fribourg. Use of a full wave correct-by-design command to control a multilevel modular converter. In Proceedings of the 15th European Conference on Power Electronics and Applications (EPE'13), Lille, France, September 2013. IEEE Power Electronics Society.
doi: 10.1109/EPE.2013.6634448.
BibTex | DOI | Web page | PDF ]
[KKS13]
S. Kremer, R. Künnemann, and G. Steel. Universally Composable Key-Management. In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS'13), volume 8134 of Lecture Notes in Computer Science, pages 327--344, Egham, U.K., September 2013. Springer.
doi: 10.1007/978-3-642-40203-6_19.
BibTex | DOI | Web page | PDF ]
[AtCK13]
S. Abiteboul, B. ten Cate, and Y. Katsis. On the equivalence of distributed systems with queries and communication. Journal of Computer and System Sciences, 79(6):739--762, September 2013.
doi: 10.1016/j.jcss.2013.01.001.
BibTex | DOI | Web page | PDF ]
[BDD13]
C. Barrett, S. Demri, and M. Deters. Witness runs for counter machines. In Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCoS'13), volume 8152 of Lecture Notes in Artificial Intelligence, pages 120--150, Nancy, France, September 2013. Springer.
doi: 10.1007/978-3-642-40885-4_9.
BibTex | DOI | Web page | PDF ]
[Sta13]
D. Stan. Équilibres mixtes dans les jeux concurrents. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2013. 29 pages.
BibTex | Web page | PDF ]
[BF13]
V. Braberman and L. Fribourg, editors. Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, Buenos Aires, Argentina, August 2013. Springer.
BibTex | Web page ]
[BL13a]
S. Benedetto and G. Lipari. ADOK: A Minimal Object Oriented Real-Time Operating System in C++. In Proceedings of the 3rd Embedded Operating Systems Workshop (EWiLi'13), Toulouse, France, August 2013.
BibTex | Web page | PDF ]
[Gou13a]
J. Goubault-Larrecq. A Constructive Proof of the Topological Kruskal Theorem. In Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS'13), volume 8087 of Lecture Notes in Computer Science, pages 22--41, Klosterneuburg, Austria, August 2013. Springer.
doi: 10.1007/978-3-642-40313-2_3.
BibTex | DOI | Web page | PDF ]
[LM13]
F. Laroussinie and N. Markey. Satisfiability of ATL with strategy contexts. In Proceedings of the 4th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'13), volume 119 of Electronic Proceedings in Theoretical Computer Science, pages 208--223, Borca di Cadore, Italy, August 2013.
doi: 10.4204/EPTCS.119.18.
BibTex | DOI | Web page | PDF ]
[SS13]
S. Schmitz and Ph. Schnoebelen. The Power of Well-Structured Systems. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 5--24, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40184-8_2.
BibTex | DOI | Web page | PDF ]
[ABHH13]
S. Akshay, N. Bertrand, S. Haddad, and L. Hélouët. The steady-state control problem for Markov decision processes. In Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), pages 290--304, Buenos Aires, Argentina, August 2013. IEEE Computer Society Press.
doi: 10.1007/978-3-642-40196-1_26.
BibTex | DOI | Web page | PDF ]
[CJ13]
Th. Chatain and C. Jard. Back in Time Petri Nets. In Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, pages 91--105, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40229-6_7.
BibTex | DOI | Web page | PDF ]
[BMS13a]
P. Bouyer, N. Markey, and O. Sankur. Robust Weighted Timed Automata and Games. In Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, pages 31--46, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40229-6_3.
BibTex | DOI | Web page | PDF ]
[HSS13]
C. Haase, S. Schmitz, and Ph. Schnoebelen. The Power of Priority Channel Systems. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 319--333, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40184-8_23.
BibTex | DOI | Web page | PDF ]
[SBMR13]
O. Sankur, P. Bouyer, N. Markey, and P.-A. Reynier. Robust Controller Synthesis in Timed Automata. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 546--560, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40184-8_38.
BibTex | DOI | Web page | PDF ]
[FGH13]
A. Finkel, S. Göller, and C. Haase. Reachability in Register Machines with Polynomial Updates. In Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS'13), volume 8087 of Lecture Notes in Computer Science, pages 409--420, Klosterneuburg, Austria, August 2013. Springer.
doi: 10.1007/978-3-642-40313-2_37.
BibTex | DOI | Web page | PS | PDF ]
[Dem13]
S. Demri. On selective unboundedness of VASS. Journal of Computer and System Sciences, 79(5):689--713, August 2013.
doi: 10.1016/j.jcss.2013.01.014.
BibTex | DOI | Web page | PDF ]
[Hir13b]
L. Hirschi. Reduction of interleavings for trace equivalence checking of security protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2013.
BibTex ]
[Fan13]
E. Fang. Permissive multi-strategies in timed games. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2013.
BibTex ]
[GLS13a]
A. Gheerbrant, L. Libkin, and C. Sirangelo. Reasoning About Pattern-Based XML Queries. In Proceedings of the 7th International Conference on Web Reasoning and Rule Systems (WRRS'13), volume 7994 of Lecture Notes in Computer Science, pages 4--18, Mannheim, Germany, July 2013. Springer.
doi: 10.1007/978-3-642-39666-3_2.
BibTex | DOI | Web page | PDF ]
[FS13a]
L. Fribourg and R. Soulat. Control of Switching Systems by Invariance Analysis: Application to Power Electronics. Wiley-ISTE, July 2013. 144 pages.
BibTex | Web page ]
[RS13b]
C. Rodríguez and S. Schwoon. An Improved Construction of Petri Net Unfoldings. In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, pages 47--52, Singapore, July 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.FSFMA.2013.47.
BibTex | DOI | Web page | PDF ]
[HMY13]
S. Haddad, L. Mokdad, and S. Youcef. Bounding models families for performance evaluation in composite Web services. Journal of Computational Science, 4(4):232--241, July 2013.
doi: 10.1016/j.jocs.2011.11.003.
BibTex | DOI | Web page | PDF ]
[DDS13]
S. Demri, A. K. Dhar, and A. Sangnier. On the Complexity of Verifying Regular Properties on Flat Counter Systems. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, volume 7966 of Lecture Notes in Computer Science, pages 162--173, Riga, Latvia, July 2013. Springer.
doi: 10.1007/978-3-642-39212-2_17.
BibTex | DOI | Web page | PDF ]
[Fri13]
L. Fribourg. Control of Switching Systems by Invariance Analysis (Invited Talk). In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, page 1, Singapore, July 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.FSFMA.2013.1.
BibTex | DOI | Web page | PDF ]
[FKS13]
L. Fribourg, U. Kühne, and R. Soulat. Constructing Attractors of Nonlinear Dynamical Systems by State Space Decomposition. In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, pages 53--60, Singapore, July 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.FSFMA.2013.53.
BibTex | DOI | Web page | PDF ]
[AHH+13]
É. André, L. M. Hillah, F. Hulin-Hubard, F. Kordon, Y. Lembachar, A. Linard, and L. Petrucci. CosyVerif: An Open Source Extensible Verification Environment. In Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'13), pages 33--36, Singapore, July 2013. IEEE Computer Society Press.
doi: 10.1109/ICECCS.2013.15.
BibTex | DOI | Web page | PDF ]
[HRS13]
S. Haar, C. Rodríguez, and S. Schwoon. Reveal Your Faults: It's Only Fair! In Proceedings of the 13th International Conference on Application of Concurrency to System Design (ACSD'13), pages 120--129, Barcelona, Spain, July 2013. IEEE Computer Society Press.
doi: 10.1109/ACSD.2013.15.
BibTex | DOI | Web page | PDF ]
[HKS13]
S. Haar, C. Kern, and S. Schwoon. Computing the Reveals Relation in Occurrence Nets. Theoretical Computer Science, 493:66--79, July 2013.
doi: 10.1016/j.tcs.2013.04.028.
BibTex | DOI | Web page | PDF ]
[McK13]
P. McKenzie. Can chimps go it alone? In Proceedings of the 15th Workshop on Descriptional Complexity of Formal Systems (DCFS'13), volume 8031 of Lecture Notes in Computer Science, page 17, London, Ontario, Canada, July 2013. Springer-Verlag.
doi: 10.1007/978-3-642-39310-5_3.
BibTex | DOI | Web page | PDF ]
[CCD13b]
R. Chrétien, V. Cortier, and S. Delaune. From security protocols to pushdown automata. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, volume 7966 of Lecture Notes in Computer Science, pages 137--149, Riga, Latvia, July 2013. Springer.
doi: 10.1007/978-3-642-39212-2_15.
BibTex | DOI | Web page | PDF ]
[CCP13]
V. Cheval, V. Cortier, and A. Plet. Lengths may break privacy ---or how to check for equivalences with length. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 708--723, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_50.
BibTex | DOI | Web page | PDF ]
[HIOP13]
C. Haase, S. Ishtiaq, J. Ouaknine, and M. Parkinson. SeLoger: A Tool for Graph-Based Reasoning in Separation Logic. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 790--795, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_55.
BibTex | DOI | Web page | PDF ]
[San13b]
O. Sankur. Shrinktech: A Tool for the Robustness Analysis of Timed Automata. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 1006--1012, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_72.
BibTex | DOI | Web page | PDF ]
[Bre13]
R. Brenguier. PRALINE: A Tool for Computing Nash Equilibria in Concurrent Games. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 890--895, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_63.
BibTex | DOI | Web page | PDF ]
[Gou13b]
J. Goubault-Larrecq. A few pearls in the theory of quasi-metric spaces. Invited talk (semi-plenary speaker), Summer Topology Conference, North Bay, Ontario, CA, July 2013.
BibTex ]
[Gou13e]
J. Goubault-Larrecq. A short proof of the Schröder-Simpson theorem. Invited talk, Workshop on Asymmetric Topology, Summer Topology Conference, North Bay, Ontario, CA, July 2013.
BibTex ]
[ABG13]
S. Akshay, B. Bollig, and P. Gastin. Event-clock Message Passing Automata: A Logical Characterization and an Emptiness-Checking Algorithm. Formal Methods in System Design, 42(3):262--300, June 2013.
doi: 10.1007/s10703-012-0179-8.
BibTex | DOI | Web page | PDF ]
[GS13]
P. Gastin and N. Sznajder. Fair Synthesis for Asynchronous Distributed Systems. ACM Transactions on Computational Logic, 14(2:9), June 2013.
doi: 10.1145/2480759.2480761.
BibTex | DOI | Web page | PDF ]
[AAM+13]
S. Abiteboul, É. Antoine, G. Miklau, J. Stoyanovich, and J. Testard. Rule-based application development using Webdamlog. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'13), pages 965--968, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463676.2465251.
BibTex | DOI | Web page | PDF ]
[BD13]
K. Bansal and S. Demri. Model-checking bounded multi-pushdown systems. In Proceedings of the 8th International Computer Science Symposium in Russia (CSR'13), volume 7913 of Lecture Notes in Computer Science, pages 405--417, Ekaterinburg, Russia, June 2013. Springer.
doi: 10.1007/978-3-642-38536-0_35.
BibTex | DOI | Web page | PDF ]
[VM13a]
S. Valette and N. Markey. Cassting website. Cassting deliverable D6.1 (FP7-ICT-601148), June 2013. 10 pages.
BibTex | Web page | PDF ]
[CH13]
Th. Chatain and S. Haar. A Canonical Contraction for Safe Petri Nets. In Proceedings of the 7th International Workshop on Petri Nets and Software Engineering (PNSE'13), volume 969 of CEUR Workshop Proceedings, pages 25--39, Milano, Italy, June 2013. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[GHPR13]
G. Geeraerts, A. Heußner, M. Praveen, and J.-F. Raskin. ω-Petri nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 49--69, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_4.
BibTex | DOI | Web page | PDF ]
[BST13]
M. Bojańczyk, L. Segoufin, and S. Toruńczyk. Verification of Database-driven Systems via Amalgamation. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 63--74, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2465228.
BibTex | DOI | Web page | PDF ]
[GLS13b]
A. Gheerbrant, L. Libkin, and C. Sirangelo. When is Naïve Evaluation Possible? In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 75--86, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2463674.
BibTex | DOI | Web page | PDF ]
[AV13a]
S. Abiteboul and V. Vianu. Collaborative Data-Driven Workflows: Think Global, Act Local. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 91--102, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2463672.
BibTex | DOI | Web page | PDF ]
[KS13b]
W. Kazana and L. Segoufin. Enumeration of First-Order Queries on Classes of Structures With Bounded Expansion. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 297--308, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2463667.
BibTex | DOI | Web page | PDF ]
[CCD13a]
V. Cheval, V. Cortier, and S. Delaune. Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492:1--39, June 2013.
doi: 10.1016/j.tcs.2013.04.016.
BibTex | DOI | Web page | PDF ]
[CCS13]
H. Comon-Lundh, V. Cortier, and G. Scerri. Tractable inference systems: an extension with a deducibility predicate. In Proceedings of the 24th International Conference on Automated Deduction (CADE'13), volume 7898 of Lecture Notes in Artificial Intelligence, pages 91--108, Lake Placid, New York, USA, June 2013. Springer.
doi: 10.1007/978-3-642-38574-2_6.
BibTex | DOI | Web page | PDF ]
[BKM13]
B. Bollig, D. Kuske, and R. Mennicke. The Complexity of Model Checking Multi-Stack Systems. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 163--170, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press.
doi: 10.1109/LICS.2013.22.
BibTex | DOI | Web page | PDF ]
[DFP13]
S. Demri, D. Figueira, and M. Praveen. Reasoning about Data Repetitions with Counter Systems. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 33--42, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press.
doi: 10.1109/LICS.2013.8.
BibTex | DOI | Web page | PDF ]
[BS13d]
A. Boral and S. Schmitz. Model Checking Parse Trees. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 153--162, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press.
doi: 10.1109/LICS.2013.21.
BibTex | DOI | Web page | PDF ]
[BHLM13]
B. Bollig, P. Habermehl, M. Leucker, and B. Monmege. A Fresh Approach to Learning Register Automata. In Proceedings of the 17th International Conference on Developments in Language Theory (DLT'13), volume 7907 of Lecture Notes in Computer Science, pages 118--130, Marne-la-Vallée, France, June 2013. Springer.
doi: 10.1007/978-3-642-38771-5_12.
BibTex | DOI | Web page | PDF ]
[RSK13]
C. Rodríguez, S. Schwoon, and V. Khomenko. Contextual Merged Processes. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 29--48, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_3.
BibTex | DOI | Web page | PDF ]
[FH13]
E. Fraca and S. Haddad. Complexity Analysis of Continuous Petri Nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 170--189, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_10.
BibTex | DOI | Web page | PDF ]
[HHM13]
S. Haddad, R. Hennicker, and M. H. Møller. Channel Properties of Asynchronously Composed Petri Nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 369--388, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_20.
BibTex | DOI | Web page | PDF ]
[AR13]
A. Arul and J. Reichert. The Complexity of Robot Games on the Integer Line. In Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages (QAPl'13), volume 117 of Electronic Proceedings in Theoretical Computer Science, pages 132--148, Rome, Italy, June 2013.
doi: 10.4204/EPTCS.117.9.
BibTex | DOI | Web page | PDF ]
[BS13b]
N. Bertrand and Ph. Schnoebelen. Solving stochastic Büchi games on infinite arenas with a finite attractor. In Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages (QAPl'13), volume 117 of Electronic Proceedings in Theoretical Computer Science, pages 116--131, Rome, Italy, June 2013.
doi: 10.4204/EPTCS.117.8.
BibTex | DOI | Web page | PDF ]
[Gou13d]
J. Goubault-Larrecq. OrchIDS, ou : de l'importance de la sémantique. Séminaire DGA Innosciences. DGA, Bagneux, June 2013.
BibTex ]
[BCH13a]
S. Balaguer, Th. Chatain, and S. Haar. Building Occurrence Nets from Reveals Relations. Fundamenta Informaticae, 123(3):245--272, May 2013.
doi: 10.3233/FI-2013-809.
BibTex | DOI | Web page | PDF ]
[FS13b]
L. Fribourg and R. Soulat. Limit Cycles of Controlled Switched Systems: Existence, Stability, Sensitivity. In Proceedings of the 3rd International Workshop on New Computational Methods for Inverse Problems (NCMIP'13), volume 464 of Journal of Physics: Conference Series, Cachan, France, May 2013. IOS Press.
doi: 10.1088/1742-6596/464/1/012007.
BibTex | DOI | Web page | PDF ]
[San13a]
O. Sankur. Robustness in Timed Automata: Analysis, Synthesis, Implementation. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2013.
BibTex | Web page | PDF ]
[ABB+13]
E. G. Amparore, B. Barbot, M. Beccuti, S. Donatelli, and G. Franceschinis. Simulation-based Verification of Hybrid Automata Stochastic Logic Formulas for Stochastic Symmetric Nets. In Proceedings of the 1st ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS'13), pages 253--264, Montreal, Canada, May 2013. ACM Press.
doi: 10.1145/2486092.2486124.
BibTex | DOI | Web page | PDF ]
[AFS13b]
É. André, L. Fribourg, and J. Sproston. An Extension of the Inverse Method to Probabilistic Timed Automata. Formal Methods in System Design, 42(2):119--145, April 2013.
doi: 10.1007/s10703-012-0169-x.
BibTex | DOI | Web page | PDF ]
[VM13b]
S. Valette and N. Markey. Minutes of the Kick-Off Meeting. Cassting deliverable D6.1 (FP7-ICT-601148), April 2013. 9 pages.
BibTex | Web page | PDF ]
[BCG+13]
L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and C. Vacher. Decidable Classes of Tree Automata Mixing Local and Global Constraints Modulo Flat Theories. Logical Methods in Computer Science, 9(2), April 2013.
doi: 10.2168/LMCS-9(2:1)2013.
BibTex | DOI | Web page | PDF ]
[BCH+13c]
B. Bollig, A. Cyriac, L. Hélouët, A. Kara, and Th. Schwentick. Dynamic Communicating Automata and Branching High-Level MSCs. In Proceedings of the 7th International Conference on Language and Automata Theory and Applications (LATA'13), volume 7810 of Lecture Notes in Computer Science, pages 177--189, Bilbao, Spain, April 2013. Springer.
doi: 10.1109/REVET.2012.6195253.
BibTex | DOI | Web page | PDF ]
[CB13]
V. Cheval and B. Blanchet. Proving More Observational Equivalences with ProVerif. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), volume 7796 of Lecture Notes in Computer Science, pages 226--246, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-36830-1_12.
BibTex | DOI | Web page | PDF ]
[CD13a]
R. Chrétien and S. Delaune. Formal analysis of privacy for routing protocols in mobile ad hoc networks. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), volume 7796 of Lecture Notes in Computer Science, pages 1--20, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-36830-1_1.
BibTex | DOI | Web page | PDF ]
[BFHR13]
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Ordinal Theory for Expressiveness of Well-Structured Transition Systems. Information and Computation, 224:1--22, March 2013.
doi: 10.1016/j.ic.2012.11.003.
BibTex | DOI | Web page | PDF ]
[Gou13c]
J. Goubault-Larrecq. Non-Hausdorff Topology and Domain Theory---Selected Topics in Point-Set Topology, volume 22 of New Mathematical Monographs. Cambridge University Press, March 2013.
BibTex | Web page ]
[BC13b]
R. Bonnet and R. Chadha. Bounded Context-Switching and Reentrant Locking. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 65--80, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37075-5_5.
BibTex | DOI ]
[LGBB13]
G. Lipari, L. George, E. Bini, and M. Bertogna. On the Average Complexity of the Processor Demand Analysis for Earliest Deadline Scheduling. In Real-Time Sytems: the past, the present, and the future -- Proceedings of a conference organized in celebration of Professor Alan Burns' sixtieth birthday, pages 75--86, York, UK, March 2013. CreateSpace Independent Publishing Platform.
BibTex | Web page | PDF ]
[LB13]
G. Lipari and G. Buttazzo. Resource reservation for Mixed Criticality Systems. In Real-Time Sytems: the past, the present, and the future -- Proceedings of a conference organized in celebration of Professor Alan Burns' sixtieth birthday, pages 60--74, York, UK, March 2013. CreateSpace Independent Publishing Platform.
BibTex | Web page | PDF ]
[DKN+13]
M. Duflot, M. Kwiatkowska, G. Norman, D. Parker, S. Peyronnet, C. Picaronny, and J. Sproston. Practical Applications of Probabilistic Model Checking to Communication Protocols. In Formal Methods for Industrial Critical Systems: A Survey of Applications, chapter 7, pages 133--150. John Wiley & Sons, Ltd. and IEEE Computer Society Press, March 2013.
doi: 10.1002/9781118459898.ch7.
BibTex | DOI | Web page | PDF ]
[ABMW13]
S. Abiteboul, P. Bourhis, A. Muscholl, and Z. Wu. Recursive queries on trees and data trees. In Proceedings of the 16th International Conference on Database Theory (ICDT'13), pages 93--104, Genoa, Italy, March 2013. ACM Press.
doi: 10.1145/2448496.2448509.
BibTex | DOI | Web page | PDF ]
[BGM13]
B. Bollig, P. Gastin, and B. Monmege. Weighted Specifications over Nested Words. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 385--400, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37075-5_25.
BibTex | DOI | Web page | PDF ]
[BNS13]
E. Bertsch, M.-J. Nederhof, and S. Schmitz. On LR Parsing with Selective Delays. In Proceedings of the 22nd International Conference on Compiler Construction (CC'13), volume 7791 of Lecture Notes in Computer Science, pages 244--263, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37051-9_13.
BibTex | DOI | Web page | PDF ]
[KS13a]
P. Karandikar and S. Schmitz. The Parametric Ordinal-Recursive Complexity of Post Embedding Problems. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 273--288, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37075-5_18.
BibTex | DOI | Web page | PDF ]
[Fin13]
A. Finkel. REACHARD -- Compte-rendu intermédiaire. Deliverable D2 Reachard (ANR-11-BS02-001), March 2013. 9 pages.
BibTex ]
[BCH+13b]
B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H. Roux. The Expressive Power of Time Petri Nets. Theoretical Computer Science, 474:1--20, February 2013.
doi: 10.1016/j.tcs.2012.12.005.
BibTex | DOI | Web page | PDF ]
[BCD13]
M. Baudet, V. Cortier, and S. Delaune. YAPA: A generic tool for computing intruder knowledge. ACM Transactions on Computational Logic, 14(1:4), February 2013.
doi: 10.1145/2422085.2422089.
BibTex | DOI | Web page | PDF ]
[FK13]
L. Fribourg and U. Kühne. Parametric Verification and Test Coverage for Hybrid Automata using the Inverse Method. International Journal of Foundations of Computer Science, 24(2):233--249, February 2013.
doi: 10.1142/S0129054113400091.
BibTex | DOI | Web page | PDF ]
[HM13]
S. Haar and T. Masopust. Languages, Decidability, and Complexity. In Control of Discrete-Event Systems -- Automata and Petri Net Perspectives, volume 433 of Lecture Notes in Control and Information Sciences, pages 23--43. Springer, 2013.
doi: 10.1007/978-1-4471-4276-8_2.
BibTex | DOI | Web page | PDF ]
[HF13]
S. Haar and É. Fabre. Diagnosis with Petri Net Unfoldings. In Control of Discrete-Event Systems -- Automata and Petri Net Perspectives, volume 433 of Lecture Notes in Control and Information Sciences, pages 301--318. Springer, 2013.
doi: 10.1007/978-1-4471-4276-8_15.
BibTex | DOI | Web page | PDF ]
[BBL+13]
B. Bérard, P. Bouyer, K. G. Larsen, N. Markey, J. Mullins, O. Sankur, M. Sassolas, and C. Thrane. Measuring the robustness. Deliverable ImpRo 3.1, (ANR-10-BLAN-0317), January 2013. 59 pages.
BibTex | Web page | PDF ]
[BFH+13]
P. Bouyer, S. Faucou, S. Haar, A. Jovanivić, D. Lime, N. Markey, O. H. Roux, and O. Sankur. Control tasks for Timed System; Robustness issues. Deliverable ImpRo 5.1, (ANR-10-BLAN-0317), January 2013. 34 pages.
BibTex | Web page | PDF ]
[AS13]
É. André and R. Soulat. The Inverse Method. Wiley-ISTE, January 2013. 176 pages.
BibTex | Web page ]
[HMN13]
S. Haddad, J. Mairesse, and H.-T. Nguyen. Synthesis and Analysis of Product-form Petri Nets. Fundamenta Informaticae, 122(1-2):147--172, 2013.
doi: 10.3233/FI-2013-786.
BibTex | DOI | Web page | PDF ]
[GJ13]
J. Goubault-Larrecq and J.-P. Jouannaud. The Blossom of Finite Semantic Trees. In Programming Logics -- Essays in Memory of Harald Ganzinger, volume 7797 of Lecture Notes in Computer Science, pages 90--122. Springer, January 2013.
BibTex | Web page | PDF ]
[Bon13]
R. Bonnet. Theory of Well-Structured Transition Systems and Extended Vector-Addition Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2013.
BibTex | Web page | PDF ]
[DR13]
L. Doyen and A. Rabinovich. Robot games. Research Report LSV-13-02, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2013. 2 pages.
BibTex | Web page | PDF ]
[Haa12]
S. Haar. What topology tells us about diagnosability in partial order semantics. Discrete Event Dynamic Systems: Theory and Applications, 22(4):383--402, December 2012.
doi: 10.1007/s10626-011-0121-z.
BibTex | DOI | Web page | PDF ]
[CU12]
R. Chadha and M. Ummels. The complexity of quantitative information flow in recursive programs. In Proceedings of the 32nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12), volume 18 of Leibniz International Proceedings in Informatics, pages 534--545, Hyderabad, India, December 2012. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2012.534.
BibTex | DOI | Web page | PDF ]
[Ben12b]
H. Benzina. Enforcing Virtualized Systems Security. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012.
BibTex | Web page | PDF ]
[Bal12]
S. Balaguer. La concurrence dans les systèmes distribués temps-réel. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012.
BibTex | Web page | PDF ]
[FFL+12b]
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Correct-by-Design Control of 5-level and 7-level Power Converters. Research Report LSV-12-25, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 8 pages.
BibTex | Web page | PDF ]
[FS12]
L. Fribourg and R. Soulat. Controlled Recurrent Subspaces for Sampled Switched Linear Systems. Research Report LSV-12-24, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 11 pages.
BibTex | Web page | PDF ]
[Ves12]
S. Vester. Symmetric Nash equilibria. Research Report LSV-12-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 51 pages.
BibTex | Web page | PDF ]
[Che12]
V. Cheval. Automatic verification of cryptographic protocols: privacy-type properties. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012.
BibTex | Web page | PDF ]
[CFM12b]
M. Cadilhac, A. Finkel, and P. McKenzie. Bounded Parikh automata. International Journal of Foundations of Computer Science, 23(8):1691--1710, December 2012.
doi: 10.1142/S0129054112400709.
BibTex | DOI | Web page | PDF ]
[BGKR12]
D. Berwanger, E. Grädel, L. Kaiser, and R. Rabinovich. Entanglement and the complexity of directed graphs. Theoretical Computer Science, 463:2--25, December 2012.
doi: 10.1016/j.tcs.2012.07.010.
BibTex | DOI | Web page | PDF ]
[BFP12]
R. Bonnet, A. Finkel, and M. Praveen. Extending the Rackoff technique to affine nets. In Proceedings of the 32nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12), volume 18 of Leibniz International Proceedings in Informatics, Hyderabad, India, December 2012. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2012.301.
BibTex | DOI | Web page | PDF ]
[BS12]
D. Berwanger and O. Serre. Parity games on undirected graphs. Information Processing Letters, 112(23):928--932, December 2012.
doi: 10.1016/j.ipl.2012.08.021.
BibTex | DOI | Web page | PDF ]
[GS12]
P. Gastin and N. Sznajder. Decidability of well-connectedness for distributed synthesis. Information Processing Letters, 112(24):963--968, December 2012.
doi: 10.1016/j.ipl.2012.08.018.
BibTex | DOI | Web page | PDF ]
[BDF12]
A. Bušić, H. Djafri, and J.-M. Fourneau. Bounded state space truncation and censored Markov chains. In Proceedings of the 51st IEEE Conference on Decision and Control (CDC'12), pages 5828--5833, Maui, Hawaii, USA, December 2012. IEEE Control System Society.
doi: 10.1109/CDC.2012.6426156.
BibTex | DOI | Web page | PDF ]
[AvMSS12]
M. Anderson, D. van Melkebeek, N. Schweikardt, and L. Segoufin. Locality from Circuit Lower Bounds. SIAM Journal on Computing, 41(6):1481--1523, November 2012.
doi: 10.1137/110856873.
BibTex | DOI | Web page | PDF ]
[Bre12]
R. Brenguier. Équilibres de Nash dans les Jeux Concurrents -- Application aux Jeux Temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2012.
BibTex | Web page | PDF ]
[BHP12b]
B. Barbot, S. Haddad, and C. Picaronny. Importance Sampling for Model Checking of Continuous Time Markov Chains. In Proceedings of the 4th International Conference on Advances in System Simulation (SIMUL'12), pages 30--35, Lisbon, Portugal, November 2012. XPS.
BibTex | Web page | PDF ]
[CD12c]
K. Chatterjee and L. Doyen. Energy parity games. Theoretical Computer Science, 458:49--60, November 2012.
doi: 10.1016/j.tcs.2012.07.038.
BibTex | DOI | Web page | PDF ]
[FLC12]
D. Faggioli, G. Lipari, and T. Cucinotta. Analysis and Implementation of the Multiprocessor Bandwidth Inheritance Protocol. Real-Time Systems, 48(6):789--825, November 2012.
doi: 10.1007/s11241-012-9162-0.
BibTex | DOI | Web page | PDF ]
[DDG12]
S. Demri, D. D'Souza, and R. Gascon. Temporal Logics of Repeating Values. Journal of Logic and Computation, 22(5):1059--1096, October 2012.
doi: 10.1093/logcom/exr013.
BibTex | DOI | Web page | PDF ]
[CFM12a]
M. Cadilhac, A. Finkel, and P. McKenzie. Affine Parikh automata. RAIRO Informatique Théorique et Applications, 46(4):511--545, October 2012.
doi: 10.1051/ita/2012013.
BibTex | DOI | Web page | PDF ]
[DDMM12]
Ph. Darondeau, S. Demri, R. Meyer, and Ch. Morvan. Petri Net Reachability Graphs: Decidability Status of FO Properties. Logical Methods in Computer Science, 8(4:9), October 2012.
doi: 10.2168/LMCS-8(4:9)2012.
BibTex | DOI | Web page | PDF ]
[AG12]
A. Adjé and J. Goubault-Larrecq. Concrete Semantics of Programs with Non-Deterministic and Random Inputs. Research Report cs.LO/1210.2605, Computing Research Repository, October 2012. 19 pages.
BibTex | Web page | PDF ]
[BGMZ12]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. A Probabilistic Kleene Theorem. In Proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA'12), volume 7561 of Lecture Notes in Computer Science, pages 400--415, Thiruvananthapuram, India, October 2012. Springer.
doi: 10.1007/978-3-642-33386-6_31.
BibTex | DOI | Web page | PDF ]
[SVMdM12]
D. V. Simões De Sousa, H. Viana, N. Markey, and J. A. F. de Macêdo. Querying Trajectories through Model Checking based on Timed Automata. In Proceedings of the 27th Brazilian Symposium on Databases (SBBD'12), São Paulo, Brazil, October 2012. Sociedade Brasileira de Computação.
BibTex | Web page | PDF ]
[AGL12]
A. Adjé and J. Goubault-Larrecq. Concrete semantics of programs with non-deterministic and random inputs. Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities), WP 2, version 1, October 2012.
BibTex | Web page ]
[FG12a]
A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part II: Complete WSTS. Logical Methods in Computer Science, 8(3:28), September 2012.
doi: 10.2168/LMCS-8(3:28)2012.
BibTex | DOI | Web page | PDF ]
[Abi12b]
S. Abiteboul. Sharing Distributed Knowledge on the Web (Invited Talk). In Proceedings of the 21st Annual EACSL Conference on Computer Science Logic (CSL'12), volume 16 of Leibniz International Proceedings in Informatics, pages 6--8, Fontainebleau, France, September 2012. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2012.6.
BibTex | DOI | Web page | PDF ]
[BSS12]
M. Bojańczyk, L. Segoufin, and H. Straubing. Piecewise testable tree languages. Logical Methods in Computer Science, 8(3:26), September 2012.
doi: 10.2168/LMCS-8(3:26)2012.
BibTex | DOI | Web page | PDF ]
[Chr12]
R. Chrétien. Trace equivalence of protocols for an unbounded number of sessions. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2012. 30 pages.
BibTex | Web page | PDF ]
[KS12b]
R. Künnemann and G. Steel. YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. In Revised Selected Papers of the 8th Workshop on Security and Trust Management (STM'12), volume 7783 of Lecture Notes in Computer Science, pages 257--272, Pisa, Italy, September 2012. Springer.
doi: 10.1007/978-3-642-38004-4_17.
BibTex | DOI | Web page | PDF ]
[FLP12]
A. Finkel, J. Leroux, and I. Potapov, editors. Proceedings of the 6th International Wokshop on Reachability Problems (RP'12), volume 7550 of Lecture Notes in Computer Science, Bordeaux, France, September 2012. Springer.
doi: 10.1007/978-3-642-33512-9.
BibTex | DOI | Web page ]
[SLBC12]
R. M. Santos, G. Lipari, E. Bini, and T. Cucinotta. On-line schedulability tests for adaptive reservations in fixed priority scheduling. Real-Time Systems, 48(5):601--634, September 2012.
doi: 10.1007/s11241-012-9156-y.
BibTex | DOI | Web page | PDF ]
[JKS12]
P. Jančar, P. Karandikar, and Ph. Schnoebelen. Unidirectional channel systems can be tested. In Proceedings of the 7th IFIP International Conference on Theoretical Computer Science (IFIP TCS'12), volume 7604 of Lecture Notes in Computer Science, pages 149--163, Amsterdam, The Netherlands, September 2012. Springer.
doi: 10.1007/978-3-642-33475-7_11.
BibTex | DOI | Web page | PDF ]
[RS12]
C. Rodríguez and S. Schwoon. Verification of Petri Nets with Read Arcs. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 471--485, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_33.
BibTex | DOI | Web page | PDF ]
[CGNK12]
A. Cyriac, P. Gastin, and K. Narayan Kumar. MSO Decidability of Multi-Pushdown Systems via Split-Width. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 547--561, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_38.
BibTex | DOI | Web page | PDF ]
[BGS12]
R. Brenguier, S. Göller, and O. Sankur. A Comparison of Succinctly Represented Finite-State Systems. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 147--161, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_12.
BibTex | DOI | Web page | PDF ]
[BHSS12]
B. Bérard, S. Haddad, M. Sassolas, and N. Sznajder. Concurrent Games on VASS with Inhibition. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 39--52, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_5.
BibTex | DOI | Web page | PDF ]
[BC12a]
S. Balaguer and Th. Chatain. Avoiding Shared Clocks in Networks of Timed Automata. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 100--114, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_9.
BibTex | DOI | Web page | PDF ]
[DLM12]
A. Da Costa, F. Laroussinie, and N. Markey. Quantified CTL: expressiveness and model checking. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 177--192, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_14.
BibTex | DOI | Web page | PDF ]
[FLMS12]
L. Fribourg, D. Lesens, P. Moro, and R. Soulat. Robustness Analysis for Scheduling Problems using the Inverse Method. In Proceedings of the 19th International Symposium on Temporal Representation and Reasoning (TIME'12), pages 73--80, Leicester, UK, September 2012. IEEE Computer Society Press.
doi: 10.1109/TIME.2012.10.
BibTex | DOI | Web page | PDF ]
[BBJM12]
P. Bouyer, Th. Brihaye, M. Jurdziński, and Q. Menet. Almost-Sure Model-Checking of Reactive Timed Automata. In Proceedings of the 9th International Conference on Quantitative Evaluation of Systems (QEST'12), pages 138--147, London, UK, September 2012. IEEE Computer Society Press.
doi: 10.1109/QEST.2012.10.
BibTex | DOI | Web page | PDF ]
[BLM12]
P. Bouyer, K. G. Larsen, and N. Markey. Lower-Bound Constrained Runs in Weighted Timed Automata. In Proceedings of the 9th International Conference on Quantitative Evaluation of Systems (QEST'12), pages 128--137, London, UK, September 2012. IEEE Computer Society Press.
doi: 10.1109/QEST.2012.28.
BibTex | DOI | Web page | PDF ]
[CFM12c]
M. Cadilhac, A. Finkel, and P. McKenzie. Unambiguous Constrained Automata. In Proceedings of the 16th International Conference on Developments in Language Theory (DLT'12), volume 7410 of Lecture Notes in Computer Science, pages 239--250, Taipei, Taiwan, August 2012. Springer.
doi: 10.1007/978-3-642-31653-1_22.
BibTex | DOI | Web page | PDF ]
[BKL12]
D. Berwanger, L. Kaiser, and S. Leßenich. Solving Counter Parity Games. In Proceedings of the 37th International Symposium on Mathematical Foundations of Computer Science (MFCS'12), volume 7464 of Lecture Notes in Computer Science, pages 160--171, Bratislava, Slovakia, August 2012. Springer.
doi: 10.1007/978-3-642-32589-2_17.
BibTex | DOI | Web page | PDF ]
[BBC+12]
P. Baldan, A. Bruni, A. Corradini, B. König, C. Rodríguez, and S. Schwoon. Efficient unfolding of contextual Petri nets. Theoretical Computer Science, 449(1):2--22, August 2012.
doi: 10.1016/j.tcs.2012.04.046.
BibTex | DOI | Web page | PDF ]
[BFK+12]
R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel, and J.-K. Tsay. Efficient Padding Oracle Attacks on Cryptographic Hardware. In Proceedings of the 32nd Annual International Cryptology Conference (CRYPTO'12), volume 7417 of Lecture Notes in Computer Science, pages 608--625, Santa Barbara, California, USA, August 2012. Springer.
doi: 10.1007/978-3-642-32009-5_36.
BibTex | DOI | Web page | PDF ]
[CD12b]
F. Carreiro and S. Demri. Beyond Regularity for Presburger Modal Logics. In Selected Papers from the 9th Workshop on Advances in Modal Logics (AiML'12), pages 161--182, Copenhagen, Denmark, August 2012. College Publications.
BibTex | Web page | PDF ]
[AFKS12]
É. André, L. Fribourg, U. Kühne, and R. Soulat. IMITATOR 2.5: A Tool for Analyzing Robustness in Scheduling Problems. In Proceedings of the 18th International Symposium on Formal Methods (FM'12), volume 7436 of Lecture Notes in Computer Science, pages 33--36, Paris, France, August 2012. Springer.
doi: 10.1007/978-3-642-32759-9_6.
BibTex | DOI | Web page | PDF ]
[AMH12]
A. Agarwal, A. Madalinski, and S. Haar. Effective Verification of Weak Diagnosability. In Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS'12), Mexico City, Mexico, August 2012. IFAC.
doi: 10.3182/20120829-3-MX-2028.00083.
BibTex | DOI | Web page | PDF ]
[DG12]
S. Demri and P. Gastin. Specification and Verification using Temporal Logics. In Modern applications of automata theory, volume 2 of IISc Research Monographs, chapter 15, pages 457--494. World Scientific, July 2012.
BibTex | Web page | PDF ]
[BDH+12]
D. Berwanger, A. Dawar, P. Hunter, S. Kreutzer, and J. Obdrzálek. The DAG-width of directed graphs. Journal of Combinatorial Theory, Series B, 102(4):900--923, July 2012.
doi: 10.1016/j.jctb.2012.04.004.
BibTex | DOI | Web page | PDF ]
[FFL+12c]
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Numerical simulation and physical experimentation of a 5-level and 7-level power converter under a control designed by a formal method. Research Report LSV-12-16, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2012. 18 pages.
BibTex | Web page | PDF ]
[Loz12]
É. Lozes. Separation Logic: Expressiveness and Copyless Message-Passing. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, July 2012.
BibTex | Web page | PDF ]
[GM12]
P. Gastin and B. Monmege. Adding Pebbles to Weighted Automata. In Proceedings of the 17th International Conference on Implementation and Application of Automata (CIAA'12), volume 7381 of Lecture Notes in Computer Science, pages 28--51, Porto, Portugal, July 2012. Springer-Verlag.
doi: 10.1007/978-3-642-31606-7_4.
BibTex | DOI | Web page | PDF ]
[BMO+12]
P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen, and J. Worrell. On Termination and Invariance for Faulty Channel Systems. Formal Aspects of Computing, 24(4-6):595--607, July 2012.
doi: 10.1007/s00165-012-0234-7.
BibTex | DOI | Web page | PDF ]
[BDL12a]
B. Bollig, N. Decker, and M. Leucker. Frequency Linear-time Temporal Logic. In Proceedings of the 6th International Symposium on Theoretical Aspects of Software Engineering (TASE'12), pages 85--92, Beijing, China, July 2012. IEEE Computer Society Press.
doi: 10.1109/TASE.2012.43.
BibTex | DOI | Web page | PDF ]
[BMS12]
P. Bouyer, N. Markey, and O. Sankur. Robust Reachability in Timed Automata: A Game-based Approach. In Proceedings of the 39th International Colloquium on Automata, Languages and Programming (ICALP'12) -- Part II, volume 7392 of Lecture Notes in Computer Science, pages 128--140, Warwick, UK, July 2012. Springer.
doi: 10.1007/978-3-642-31585-5_15.
BibTex | DOI | Web page | PDF ]
[Ben12a]
H. Benzina. A Network Policy Model for Virtualized Systems. In Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12), pages 680--683, Nevsehir, Turkey, July 2012. IEEE Computer Society Press.
doi: 10.1109/ISCC.2012.6249376.
BibTex | DOI | Web page | PDF ]
[KS12a]
P. Karandikar and Ph. Schnoebelen. Cutting Through Regular Post Embedding Problems. In Proceedings of the 7th International Computer Science Symposium in Russia (CSR'12), volume 7353 of Lecture Notes in Computer Science, pages 229--240, Nizhni Novgorod, Russia, July 2012. Springer.
doi: 10.1007/978-3-642-30642-6_22.
BibTex | DOI | Web page | PDF ]
[Abi12c]
S. Abiteboul. Viewing the Web as a Distributed Knowledge Base. In Proceedings of the 2012 International Workshop Description Logic (DL'09), volume 846 of CEUR Workshop Proceedings, Rome, Italy, June 2012. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[CD12d]
K. Chatterjee and L. Doyen. Partial-Observation Stochastic Games: How to Win when Belief Fails. In Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS'12), pages 175--184, Dubrovnik, Croatia, June 2012. IEEE Computer Society Press.
doi: 10.1109/LICS.2012.28.
BibTex | DOI | Web page | PDF ]
[HP12]
S. Haddad and L. Pomello, editors. Proceedings of the 33rd International Conference on Applications and Theory of Petri Nets (ICATPN'12), volume 7347 of Lecture Notes in Computer Science, Hamburg, Germany, June 2012. Springer.
doi: 10.1007/978-3-642-31131-4.
BibTex | DOI | Web page ]
[FG12b]
A. Finkel and J. Goubault-Larrecq. The Theory of WSTS: The Case of Complete WSTS. In Proceedings of the 33rd International Conference on Applications and Theory of Petri Nets (PETRI NETS'12), volume 7347 of Lecture Notes in Computer Science, pages 3--31, Hamburg, Germany, June 2012. Springer.
doi: 10.1007/978-3-642-31131-4_2.
BibTex | DOI | Web page | PDF ]
[FFL+12a]
G. Feld, L. Fribourg, D. Labrousse, S. Lefebvre, B. Revol, and R. Soulat. Control of Multilevel Power Converters using Formal Methods. Research Report LSV-12-14, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2012. 14 pages.
BibTex | Web page | PDF ]
[Dja12]
H. Djafri. Approches numériques et statistiques pour le model checking des processus stochastiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2012.
BibTex | Web page | PDF ]
[HSS12]
S. Haddad, S. Schmitz, and Ph. Schnoebelen. The Ordinal-Recursive Complexity of Timed-Arc Petri Nets, Data Nets, and Other Enriched Nets. In Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS'12), pages 355--364, Dubrovnik, Croatia, June 2012. IEEE Computer Society Press.
doi: 10.1109/LICS.2012.46.
BibTex | DOI | Web page | PDF ]
[DDS12b]
S. Demri, A. K. Dhar, and A. Sangnier. Taming Past LTL and Flat Counter Systems. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in Artificial Intelligence, pages 179--193, Manchester, UK, June 2012. Springer-Verlag.
doi: 10.1007/978-3-642-31365-3_16.
BibTex | DOI | Web page | PDF ]
[ACD12]
M. Arapinis, V. Cheval, and S. Delaune. Verifying privacy-type properties in a modular way. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF'12), pages 95--109, Cambridge Massachusetts, USA, June 2012. IEEE Computer Society Press.
doi: 10.1109/CSF.2012.16.
BibTex | DOI | Web page | PDF ]
[DKP12]
S. Delaune, S. Kremer, and D. Pasailă. Security protocols, constraint systems, and group theories. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in Artificial Intelligence, pages 164--178, Manchester, UK, June 2012. Springer-Verlag.
doi: 10.1007/978-3-642-31365-3_15.
BibTex | DOI | Web page | PDF ]
[BCH12a]
S. Balaguer, Th. Chatain, and S. Haar. A Concurrency-Preserving Translation from Time Petri Nets to Networks of Timed Automata. Formal Methods in System Design, 40(3):330--355, June 2012.
doi: 10.1007/s10703-012-0146-4.
BibTex | DOI | Web page | PDF ]
[BK12]
B. Bollig and D. Kuske. An optimal construction of Hanf sentences. Journal of Applied Logic, 10(2):179--186, June 2012.
doi: 10.1016/j.jal.2012.01.002.
BibTex | DOI | Web page | PDF ]
[ABD12]
S. Abiteboul, M. Bienvenu, and D. Deutch. Deduction in the Presence of Distribution and Contradictions. In Proceedings of the 15th International Workshop on the Web and Databases (WebDB'12), pages 31--36, Scottsdale, Arizona, USA, May 2012.
BibTex | Web page | PDF ]
[AAMS12]
S. Abiteboul, Y. Amsterdamer, T. Milo, and P. Senellart. Auto-completion learning for XML. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'12), pages 669--672, Scottsdale, Arizona, USA, May 2012. ACM Press.
doi: 10.1145/2213836.2213928.
BibTex | DOI | Web page | PDF ]
[ABV12a]
S. Abiteboul, P. Bourhis, and V. Vianu. Comparing workflow specification languages: A matter of views. ACM Transactions on Database Systems, 37(2:10), May 2012.
doi: 10.1145/2188349.2188352.
BibTex | DOI | Web page | PDF ]
[PHL12]
H. Ponce de León, S. Haar, and D. Longuet. Conformance Relations for Labeled Event Structures. In Proceedings of the 6th International Conference on Tests and Proofs (TAP'12), volume 7305 of Lecture Notes in Computer Science, pages 83--98, Prague, Czech Republic, May-June 2012. Springer.
doi: 10.1007/978-3-642-30473-6_8.
BibTex | DOI | Web page | PDF ]
[IL12]
M. Izabachène and B. Libert. Divisible E-Cash in the Standard Model. In Proceedings of the 5th International Conference on Pairing-Based Cryptography (PAIRING'12), volume 7708 of Lecture Notes in Computer Science, pages 314--332, Cologne, Germany, May 2012. Springer.
doi: 10.1007/978-3-642-36334-4_20.
BibTex | DOI | Web page | PDF ]
[Ben12c]
H. Benzina. Towards Designing Secure Virtualized Systems. In Proceedings of the 2nd International Conference on Digital Information and Communication Technology and its Application (DICTAP'12), pages 250--255, Bangkok, Thailand, May 2012. IEEE Computer Society Press.
doi: 10.1109/DICTAP.2012.6215385.
BibTex | DOI | Web page | PDF ]
[CD12e]
H. Comon-Lundh and S. Delaune. Formal Security Proofs. In Software Safety and Security, volume 33 of NATO Science for Peace and Security Series -- D: Information and Communication Security, pages 26--63. IOS Press, May 2012.
BibTex | Web page | PDF ]
[CD12f]
V. Cortier and S. Delaune. Decidability and combination results for two notions of knowledge in security protocols. Journal of Automated Reasoning, 48(4):441--487, April 2012.
doi: 10.1007/s10817-010-9208-8.
BibTex | DOI | Web page | PDF ]
[ASV12]
S. Abiteboul, P. Senellart, and V. Vianu. The ERC webdam on foundations of web data management. In Proceedings of the 21st World Wide Web Conference (WWW'12) -- Companion Volume, pages 211--214, Lyon, France, April 2012. ACM Press.
BibTex | Web page | PDF ]
[AAS12]
S. Abiteboul, É. Antoine, and J. Stoyanovich. Viewing the Web as a Distributed Knowledge Base. In Proceedings of the 28th International Conference on Data Engineering (ICDE'12), pages 1--4, Washington, D.C., USA, April 2012. IEEE Computer Society Press.
doi: 10.1109/ICDE.2012.150.
BibTex | DOI | Web page | PDF ]
[AFS12]
É. André, L. Fribourg, and R. Soulat. Enhancing the Inverse Method with State Merging. In Proceedings of the 4th NASA Formal Methods Symposium (NFM'12), volume 7226 of Lecture Notes in Computer Science, pages 100--105, Norfolk, Virginia, USA, April 2012. Springer.
doi: 10.1007/978-3-642-28891-3_10.
BibTex | DOI | Web page | PDF ]
[GMM12]
P. Ganty, R. Majumdar, and B. Monmege. Bounded underapproximations. Formal Methods in System Design, 40(2):206--231, April 2012.
doi: 10.1007/s10703-011-0136-y.
BibTex | DOI | Web page | PDF ]
[CHKS12]
H. Comon-Lundh, M. Hagiya, Y. Kawamoto, and H. Sakurada. Computational Soundness of Indistinguishability Properties without Computable Parsing. In Proceedings of the 8th International Conference on Information Security Practice and Experience (ISPEC'12), volume 7232 of Lecture Notes in Computer Science, pages 63--79, Hangzhou, China, April 2012. Springer.
doi: 10.1007/978-3-642-29101-2_5.
BibTex | DOI | Web page | PDF ]
[BGGP12]
O. Bouissou, É. Goubault, J. Goubault-Larrecq, and S. Putot. A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs. Computing, 94(2-4):189--201, March 2012.
doi: 10.1007/s00607-011-0182-8.
BibTex | DOI | Web page | PDF ]
[BC12b]
G. Bana and H. Comon-Lundh. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 189--208, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28641-4_11.
BibTex | DOI | Web page | PDF ]
[CCS12]
H. Comon-Lundh, V. Cortier, and G. Scerri. Security proof with dishonest keys. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 149--168, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28641-4_9.
BibTex | DOI | Web page | PDF ]
[CDD12]
V. Cortier, J. Degrieck, and S. Delaune. Analysing routing protocols: four nodes topologies are sufficient. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 30--50, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28641-4_3.
BibTex | DOI | Web page | PDF ]
[BHP12a]
B. Barbot, S. Haddad, and C. Picaronny. Coupling and Importance Sampling for Statistical Model Checking. In Proceedings of the 18th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'12), volume 7214 of Lecture Notes in Computer Science, pages 331--346, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28756-5_23.
BibTex | DOI | Web page | PDF ]
[CMV12]
R. Chadha, P. Madhusudan, and M. Viswanathan. Reachability under Contextual Locking. In Proceedings of the 18th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'12), volume 7214 of Lecture Notes in Computer Science, pages 437--450, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28756-5_30.
BibTex | DOI | Web page | PDF ]
[BCGNK12]
B. Bollig, A. Cyriac, P. Gastin, and K. Narayan Kumar. Model Checking Languages of Data Words. In Proceedings of the 15th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages 391--405, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28729-9_26.
BibTex | DOI | Web page | PDF ]
[BBMU12]
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Concurrent games with ordered objectives. In Proceedings of the 15th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages 301--315, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28729-9_20.
BibTex | DOI | Web page | PDF ]
[BJ12]
A. Bouhoula and F. Jacquemard. Sufficient completeness verification for conditional and constrained TRS. Journal of Applied Logic, 10(1):127--143, March 2012.
doi: 10.1016/j.jal.2011.09.001.
BibTex | DOI | Web page | PDF ]
[ABV12b]
S. Abiteboul, P. Bourhis, and V. Vianu. Highly expressive query languages for unordered data trees. In Proceedings of the 15th International Conference on Database Theory (ICDT'12), pages 46--60, Berlin, Germany, March 2012. ACM Press.
doi: 10.1145/2274576.2274583.
BibTex | DOI | Web page | PDF ]
[AAD+12]
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and P. Senellart. Finding optimal probabilistic generators for XML collections. In Proceedings of the 15th International Conference on Database Theory (ICDT'12), pages 127--139, Berlin, Germany, March 2012. ACM Press.
doi: 10.1145/2274576.2274591.
BibTex | DOI | Web page | PDF ]
[IHL+12]
R. Iosif, P. Habermehl, S. Labbe, É. Lozes, and B. Yakobowski. Concurrent Programs with Simple Data Structures ash Sequential Programs with Composite Data Structures. Deliverable VERIDYC D 2 (ANR-09-SEGI-016), March 2012.
BibTex | Web page | PDF ]
[LL12]
M. Lange and É. Lozes. Model-Checking the Higher-Dimensional Modal μ-Calculus. In Proceedings of the 8th Workshop on Fixed Points in Computer Science (FICS'12), volume 77 of Electronic Proceedings in Theoretical Computer Science, pages 39--46, Tallinn, Estonia, March 2012.
doi: 10.4204/EPTCS.77.6.
BibTex | DOI | Web page | PDF ]
[BCH12b]
S. Balaguer, Th. Chatain, and S. Haar. Concurrent semantics for timed distributed systems. Deliverable ImpRo D 4.1 (ANR-2010-BLAN-0317), March 2012.
BibTex | Web page | PDF ]
[Doy12]
L. Doyen. Games and Automata: From Boolean to Quantitative Verification. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2012.
BibTex | Web page | PDF ]
[Sou12]
R. Soulat. Scheduling with IMITATOR: Some Case Studies. Research Report LSV-12-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2012. 13 pages.
BibTex | Web page | PDF ]
[CCK12]
R. Chadha, S. Ciobâcă, and S. Kremer. Automated verification of equivalence properties of cryptographic protocols. In Programming Languages and Systems --- Proceedings of the 22nd European Symposium on Programming (ESOP'12), volume 7211 of Lecture Notes in Computer Science, pages 108--127, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28869-2_6.
BibTex | DOI | Web page | PDF ]
[BLL+12]
G. Belkacem, D. Labrousse, S. Lefebvre, P.-Y. Joubert, U. Kühne, L. Fribourg, R. Soulat, É. Florentin, and Ch. Rey. Distributed and Coupled Electrothermal Model of Power Semiconductor Devices. In Proceedings of the 1st International Conference on Renewable Energies and VEhicular Technology (REVET'12), pages 84--89, Hammamet, Tunisia, March 2012. IEEE Power & Energy Society.
doi: 10.1109/REVET.2012.6195253.
BibTex | DOI | Web page | PDF ]
[KMT12]
S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Journal of Automated Reasoning, 2(48):197--217, February 2012.
doi: 10.1007/s10817-010-9203-0.
BibTex | DOI | Web page | PDF ]
[CDK12]
S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, 48(2):219--262, February 2012.
doi: 10.1007/s10817-010-9197-7.
BibTex | DOI | Web page | PDF ]
[DJLL12]
S. Demri, M. Jurdziński, O. Lachish, and R. Lazić. The covering and boundedness problems for branching vector addition systems. Journal of Computer and System Sciences, 79(1):23--38, February 2012.
doi: 10.1016/j.jcss.2012.04.002.
BibTex | DOI | Web page | PDF ]
[BHP12c]
B. Barbot, S. Haddad, and C. Picaronny. Importance Sampling for Model Checking of Time-Bounded Until. Research Report LSV-12-04, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2012. 14 pages.
BibTex | Web page | PDF ]
[BHS12]
B. Bérard, S. Haddad, and M. Sassolas. Interrupt Timed Automata: Verification and Expressiveness. Formal Methods in System Design, 40(1):41--87, February 2012.
doi: 10.1007/s10703-011-0140-2.
BibTex | DOI | Web page | PDF ]
[BDL12b]
R. Brochenin, S. Demri, and É. Lozes. On the Almighty Wand. Information and Computation, 211:106--137, February 2012.
doi: 10.1016/j.ic.2011.12.003.
BibTex | DOI | Web page | PDF ]
[Gou12]
J. Goubault-Larrecq. QRB-Domains and the Probabilistic Powerdomain. Logical Methods in Computer Science, 8(1:14), 2012.
doi: 10.2168/LMCS-8(1:14)2012.
BibTex | DOI | Web page | PDF ]
[CD12a]
P. Cabalar and S. Demri. Automata-Based Computation of Temporal Equilibrium Models. In Proceedings of the 21st International Workshop on Logic Program Synthesis and Transformation (LOPSTR'11), volume 7225 of Lecture Notes in Computer Science, pages 57--72, Odense, Denmark, 2012. Springer.
doi: 10.1007/978-3-642-32211-2_5.
BibTex | DOI | Web page | PDF ]
[DDS12a]
M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Anonymous Location Based Services. In Revised Selected Papaers of the Workshop on Theory of Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in Computer Science, pages 98--112, Saarbrücken, Germany, January 2012. Springer.
doi: 10.1007/978-3-642-27375-9_6.
BibTex | DOI | Web page | PDF ]
[JLTV12]
F. Jacquemard, É. Lozes, R. Treinen, and J. Villard. Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus. In Revised Selected Papaers of the Workshop on Theory of Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in Computer Science, pages 166--185, Saarbrücken, Germany, January 2012. Springer.
doi: 10.1007/978-3-642-27375-9_10.
BibTex | DOI | Web page | PDF ]
[Abi12a]
S. Abiteboul. Sciences des données: De la logique du premier ordre à la Toile. Leçons inaugurales du Collège de France. Fayard, 2012.
BibTex ]
[LV12]
É. Lozes and J. Villard. Reliable Contracts for Unreliable Half-Duplex Communications. In Revised Selected Papers of the 8th International Workshop on Web Services and Formal Methods (WS-FM'11), volume 7176 of Lecture Notes in Computer Science, pages 2--16, Clermont-Ferrand, France, 2012. Springer.
doi: 10.1007/978-3-642-29834-9_2.
BibTex | DOI | Web page | PDF ]
[ABB+12]
S. Akshay, B. Bérard, P. Bouyer, S. Haar, S. Haddad, C. Jard, D. Lime, N. Markey, P.-A. Reynier, O. Sankur, and Y. Thierry-Mieg. Overview of Robustness in Timed Systems. Deliverable ImpRo D 2.1 (ANR-2010-BLAN-0317), January 2012.
BibTex | Web page | PDF ]
[AGG12]
A. Adjé, S. Gaubert, and É. Goubault. Coupling policy iteration with semi-definite relaxation to compute accurate numerical invariants in static analysis. Logical Methods in Computer Science, 8(1:1), January 2012.
doi: 10.2168/LMCS-8(1:01)2012.
BibTex | DOI | Web page | PDF ]
[Fig12]
D. Figueira. Alternating register automata on finite words and trees. Logical Methods in Computer Science, 8(1:22), 2012.
doi: 10.2168/LMCS-8(1:22)2012.
BibTex | DOI | Web page | PDF ]
[BFLZ12]
R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun. Model Checking Vector Addition Systems with one zero-test. Logical Methods in Computer Science, 8(2:11), 2012.
doi: 10.2168/LMCS-8(2:11)2012.
BibTex | DOI | Web page | PDF ]
[EHH12]
D. El Hog-Benzina, S. Haddad, and R. Hennicker. Refinement and Asynchronous Composition of Modal Petri Nets. In Transactions on Petri Nets and Other Models of Concurrency V, volume 6900 of Lecture Notes in Computer Science, pages 96--120. Springer, 2012.
doi: 10.1007/978-3-642-29072-5_4.
BibTex | DOI | Web page | PDF ]
[ACK+11]
S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and P. Senellart. Capturing continuous data and answering aggregate queries in probabilistic XML. ACM Transactions on Database Systems, 36(4:25), December 2011.
doi: 10.1145/2043652.2043658.
BibTex | DOI | Web page | PDF ]
[ACD11b]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Research Report LSV-11-24, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. 66 pages.
BibTex | Web page | PDF ]
[Arn11]
M. Arnaud. Formal verification of secured routing protocols. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011.
BibTex | Web page | PDF ]
[Cio11a]
S. Ciobâcă. Automated Verification of Security Protocols with Appplications to Electronic Voting. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011.
BibTex | Web page | PDF ]
[LV11]
É. Lozes and J. Villard. Sharing Contract-Obedient Endpoints. Research Report LSV-11-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. 42 pages.
BibTex | Web page | PDF ]
[ILV11]
M. Izabachène, B. Libert, and D. Vergnaud. Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes. In Proceedings of the 13th IMA International Conference on Cryptography and Coding (IMACC'11), volume 7089 of Lecture Notes in Computer Science, pages 431--450, Oxford, UK, December 2011. Springer.
doi: 10.1007/978-3-642-25516-8_26.
BibTex | DOI | Web page | PDF ]
[DDMM11]
Ph. Darondeau, S. Demri, R. Meyer, and Ch. Morvan. Petri Net Reachability Graphs: Decidability Status of FO Properties. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 140--151, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.140.
BibTex | DOI | Web page | PDF ]
[SBM11]
O. Sankur, P. Bouyer, and N. Markey. Shrinking Timed Automata. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 90--102, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.90.
BibTex | DOI | Web page | PDF ]
[CDK11]
C. Chevalier, S. Delaune, and S. Kremer. Transforming Password Protocols to Compose. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 204--216, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.204.
BibTex | DOI | Web page | PDF ]
[BBMU11]
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Nash Equilibria in Concurrent Games with Büchi Objectives. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 375--386, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.375.
BibTex | DOI | Web page | PDF ]
[BKP11]
D. Berwanger, L. Kaiser, and B. Puchala. Perfect-Information Construction for Coordination in Games. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 387--398, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.387.
BibTex | DOI | Web page | PDF ]
[AGM11]
S. Abiteboul, G. Gottlob, and M. Manna. Distributed XML design. Journal of Computer and System Sciences, 77(6):936--964, November 2011.
doi: 10.1016/j.jcss.2011.02.003.
BibTex | DOI | Web page | PDF ]
[PS11]
Th. Place and L. Segoufin. A decidable characterization of locally testable tree languages. Logical Methods in Computer Science, 7(4:03), November 2011.
doi: 10.2168/LMCS-7(4:3)2011.
BibTex | DOI | Web page | PDF ]
[Jac11]
F. Jacquemard. Extended Tree Automata for the Verification of Infinite State Systems. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, November 2011.
BibTex | Web page | PDF ]
[ECGJ11]
J. Echeveste, A. Cont, J.-L. Giavitto, and F. Jacquemard. Formalisation des relations temporelles entre une partition et une performance musicale dans un contexte d'accompagnement automatique. In Actes du 8ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'11), volume 45 of Journal Européen des Systèmes Automatisés, pages 109--124, Lille, France, November 2011. Hermès.
doi: 10.3166/jesa.45.109-124.
BibTex | DOI | Web page | PDF ]
[BHP11]
B. Barbot, S. Haddad, and C. Picaronny. Échantillonnage préférentiel pour le model checking statistique. In Actes du 8ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'11), volume 45 of Journal Européen des Systèmes Automatisés, pages 237--252, Lille, France, November 2011. Hermès.
doi: 10.3166/jesa.45.237-252.
BibTex | DOI | Web page | PDF ]
[SGA11]
F. M. Suchanek, D. Gross-Amblard, and S. Abiteboul. Watermarking for Ontologies. In Proceedings of the 10th International Semantic Web Conference (ISWC'11), volume 7031 of Lecture Notes in Computer Science, pages 697--713, Bonn, Germany, October 2011. Springer.
doi: 10.1007/978-3-642-25073-6_44.
BibTex | DOI | Web page | PDF ]
[CD11b]
K. Chatterjee and L. Doyen. Games and Markov Decision Processes with Mean-payoff Parity and Energy Parity Objectives. In Proceedings of the 7th Annual Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS'11), volume 7119 of Lecture Notes in Computer Science, Lednice, Czech Republic, October 2011. Springer.
BibTex | Web page | PDF ]
[BBD+11b]
Th. Brihaye, V. Bruyère, L. Doyen, M. Ducobu, and J.-F. Raskin. Antichain-based QBF Solving. In Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis (ATVA'11), volume 6996 of Lecture Notes in Computer Science, pages 183--197, Taipei, Taiwan, October 2011. Springer.
doi: 10.1007/978-3-642-24372-1_14.
BibTex | DOI | Web page | PDF ]
[JKS11]
F. Jacquemard, Y. Kojima, and M. Sakai. Controlled Term Rewriting. In Proceedings of the 8th International Symposium on Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture Notes in Artificial Intelligence, pages 179--194, Saarbrücken, Germany, October 2011. Springer.
BibTex | DOI | Web page | PDF ]
[FRS11]
L. Fribourg, B. Revol, and R. Soulat. Synthesis of Switching Rules for Ensuring Reachability Properties of Sampled Linear Systems. In Proceedings of the 13th International Workshops on Verification of Infinite State Systems (INFINITY'11), volume 73 of Electronic Proceedings in Theoretical Computer Science, pages 35--48, Taipei, Taiwan, October 2011.
doi: 10.4204/EPTCS.73.6.
BibTex | DOI | Web page | PDF ]
[BD11]
M. Bersani and S. Demri. The complexity of reversal-bounded model-checking. In Proceedings of the 8th International Symposium on Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture Notes in Artificial Intelligence, pages 71--86, Saarbrücken, Germany, October 2011. Springer.
doi: 10.1007/978-3-642-24364-6_6.
BibTex | DOI | Web page | PDF ]
[BKL11]
D. Berwanger, L. Kaiser, and S. Leßenich. Imperfect Recall and Counter Games. Research Report LSV-11-20, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2011. 21 pages.
BibTex | Web page | PDF ]
[CCD11]
V. Cheval, H. Comon-Lundh, and S. Delaune. Trace Equivalence Decision: Negative Tests and Non-determinism. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), pages 321--330, Chicago, Illinois, USA, October 2011. ACM Press.
doi: 10.1145/2046707.2046744.
BibTex | DOI | Web page | PDF ]
[BMOU11]
P. Bouyer, N. Markey, J. Olschewski, and M. Ummels. Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited. In Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis (ATVA'11), volume 6996 of Lecture Notes in Computer Science, pages 135--149, Taipei, Taiwan, October 2011. Springer.
doi: 10.1007/978-3-642-24372-1_11.
BibTex | DOI | Web page | PDF ]
[CSV11a]
R. Chadha, A. P. Sistla, and M. Viswanathan. Power of Randomization in Automata on Infinite Strings. Logical Methods in Computer Science, 7(3:22), September 2011.
doi: 10.2168/LMCS-7(3:22)2011.
BibTex | DOI | Web page | PDF ]
[KD11]
A. Kumar Dhar. Counter Systems with Presburger-definable Reachability Sets: Decidability and Complexity. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011.
BibTex | Web page | PDF ]
[Cha11]
P. Chambart. Du Problème de sous-mot de Post et de la complexité des canaux non fiables. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011.
BibTex | Web page | PDF ]
[Gal11]
A. Galland. Distributed Data Management with Access Control. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011.
BibTex | Web page | PDF ]
[UW11b]
M. Ummels and D. Wojtczak. The Complexity of Nash Equilibria in Stochastic Multiplayer Games. Logical Methods in Computer Science, 7(3:20), September 2011.
doi: 10.2168/LMCS-7(3:20)2011.
BibTex | DOI | Web page | PDF ]
[Da 11]
A. Da Costa. Propriétés de jeux multi-agents. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011.
BibTex | Web page | PDF ]
[Pas11b]
D. Pasailă. Verifying equivalence properties of security protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011.
BibTex | Web page | PDF ]
[Deg11]
J. Degrieck. Réduction de graphes pour l'analyse de protocoles de routage sécurisés. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011.
BibTex | Web page | PDF ]
[CFM11a]
M. Cadilhac, A. Finkel, and P. McKenzie. Bounded Parikh Automata. In Proceedings of the 8th International Conference WORDS (WORDS'11), volume 63 of Electronic Proceedings in Theoretical Computer Science, pages 93--102, Prague, Czech Republic, September 2011.
doi: 10.4204/EPTCS.63.13.
BibTex | DOI | Web page | PDF ]
[FLS11]
R. Focardi, F. L. Luccio, and G. Steel. An Introduction to Security API Analysis. In Foundations of Security Analysis and Design -- FOSAD Tutorial Lectures (FOSAD'VI), volume 6858 of Lecture Notes in Computer Science, pages 35--65. Springer, September 2011.
doi: 10.1007/978-3-642-23082-0_2.
BibTex | DOI | Web page | PDF ]
[BMS11]
P. Bouyer, N. Markey, and O. Sankur. Robust Model-Checking of Timed Automata via Pumping in Channel Machines. In Proceedings of the 9th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'11), volume 6919 of Lecture Notes in Computer Science, pages 97--112, Aalborg, Denmark, September 2011. Springer.
doi: 10.1007/978-3-642-24310-3_8.
BibTex | DOI | Web page | PDF ]
[Bon11a]
R. Bonnet. Decidability of LTL Model Checking for Vector Addition Systems with one Zero-test. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 85--95, Genova, Italy, September 2011. Springer.
doi: 10.1007/978-3-642-24288-5_9.
BibTex | DOI | Web page | PDF ]
[FK11a]
L. Fribourg and U. Kühne. Parametric Verification and Test Coverage for Hybrid Automata Using the Inverse Method. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 191--204, Genova, Italy, September 2011. Springer.
doi: 10.1007/978-3-642-24288-5_17.
BibTex | DOI | Web page | PDF ]
[AS11]
É. André and R. Soulat. Synthesis of Timing Parameters Satisfying Safety Properties. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 31--44, Genova, Italy, September 2011. Springer.
doi: 10.1007/978-3-642-24288-5_5.
BibTex | DOI | Web page | PDF ]
[CKV+11]
R. Chadha, V. Korthikranthi, M. Viswanathan, G. Agha, and Y. Kwon. Model Checking MDPs with a Unique Compact Invariant Set of Distributions. In Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11), pages 121--130, Aachen, Germany, September 2011. IEEE Computer Society Press.
doi: 10.1109/QEST.2011.22.
BibTex | DOI | Web page | PDF ]
[BDD+11a]
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. COSMOS: a Statistical Model Checker for the Hybrid Automata Stochastic Logic. In Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11), pages 143--144, Aachen, Germany, September 2011. IEEE Computer Society Press.
doi: 10.1109/QEST.2011.24.
BibTex | DOI | Web page | PDF ]
[BFH11]
M. Beccuti, G. Franceschinis, and S. Haddad. MDWNsolver: A Framework to Design and Solve Markov Decision Petri Nets. International Journal of Performability Engineering, 7(5):417--428, September 2011.
BibTex | Web page | PDF ]
[UW11a]
M. Ummels and D. Wojtczak. The Complexity of Nash Equilibria in Limit-Average Games. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 482--496, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_32.
BibTex | DOI | Web page | PDF ]
[Bol11]
B. Bollig. An automaton over data words that captures EMSO logic. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 171--186, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_12.
BibTex | DOI | Web page | PDF ]
[RSB11]
C. Rodríguez, S. Schwoon, and P. Baldan. Efficient contextual unfolding. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 342--357, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_23.
BibTex | DOI | Web page | PDF ]
[BLM+11]
P. Bouyer, K. G. Larsen, N. Markey, O. Sankur, and C. Thrane. Timed automata can always be made implementable. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 76--91, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_6.
BibTex | DOI | Web page | PDF ]
[BFLM11]
P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey. Quantitative analysis of real-time systems using priced timed automata. Communications of the ACM, 54(9):78--87, September 2011.
doi: 10.1145/1995376.1995396.
BibTex | DOI | Web page | PDF ]
[CDS11]
K. Chatterjee, L. Doyen, and R. Singh. On Memoryless Quantitative Objectives. In Proceedings of the 18th International Symposium on Fundamentals of Computation Theory (FCT'11), volume 6914 of Lecture Notes in Computer Science, pages 148--159, Oslo, Norway, August 2011. Springer.
doi: 10.1007/978-3-642-22953-4_13.
BibTex | DOI | Web page | PDF ]
[CD11a]
K. Chatterjee and L. Doyen. Energy and Mean-Payoff Parity Markov Decision Processes. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 206--218, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_21.
BibTex | DOI | Web page | PDF ]
[DMS11a]
L. Doyen, Th. Massart, and M. Shirmohammadi. Infinite Synchronizing Words for Probabilistic Automata. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 278--289, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_27.
BibTex | DOI | Web page | PDF ]
[BCGZ11]
B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun. Temporal Logics for Concurrent Recursive Programs: Satisfiability and Model Checking. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 132--144, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_15.
BibTex | DOI | Web page | PDF ]
[BS11]
M. Blockelet and S. Schmitz. Model-Checking Coverability Graphs of Vector Addition Systems. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 108--119, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_13.
BibTex | DOI | Web page | PDF ]
[San11]
O. Sankur. Untimed Language Preservation in Timed Systems. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 556--567, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_50.
BibTex | DOI | Web page | PDF ]
[Bon11b]
R. Bonnet. The reachability problem for Vector Addition Systems with one zero-test. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 145--157, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_16.
BibTex | DOI | Web page | PDF ]
[BDD+11c]
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. Petri Nets Compositional Modeling and Verification of Flexible Manufacturing Systems. In Proceedings of the 7th IEEE Conference on Automation Science and Engineering (CASE'11), pages 588--593, Trieste, Italy, August 2011. IEEE Robotics & Automation Society.
doi: 10.1109/CASE.2011.6042488.
BibTex | DOI | Web page | PDF ]
[Gou11a]
J. Goubault-Larrecq. A Few Pearls in the Theory of Quasi-Metric Spaces. Invited talk, Fifth International Conference on Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July 2011, July 2011.
BibTex ]
[BDM+11]
M. Bojańczyk, C. David, A. Muscholl, Th. Schwentick, and L. Segoufin. Two-variable logic on data words. ACM Transactions on Computational Logic, 12(4:27), July 2011.
doi: 10.1145/1970398.1970403.
BibTex | DOI | Web page | PDF ]
[LPS11]
F. Luccio, L. Pagli, and G. Steel. Mathematical and Algorithmic Foundations of the Internet. CRC Press, July 2011.
BibTex | Web page ]
[CFM11b]
M. Cadilhac, A. Finkel, and P. McKenzie. On the Expressiveness of Parikh Automata and Related Models. In Proceedings of the 3rd Workshop on Non-Classical Models of Automata and Applications (NCMA'11), volume 282 of books@ocg.at, pages 103--119, Milano, Italy, July 2011. Austrian Computer Society.
BibTex | DOI | Web page | PDF ]
[SR11]
S. Schwoon and C. Rodríguez. Construction and SAT-based verification of Contextual Unfoldings. In Proceedings of the 13th International Workshop on Descriptional Complexity of Formal Systems (DCFS'11), volume 6808 of Lecture Notes in Computer Science, pages 34--42, Limburg, Germany, July 2011. Springer.
doi: 10.1007/978-3-642-22600-7_3.
BibTex | DOI | Web page | PDF ]
[Cio11b]
S. Ciobâcă. Computing finite variants for subterm convergent rewrite systems. In Proceedings of the 25th International Workshop on Unification (UNIF'11), Wroclaw, Poland, July 2011.
BibTex | Web page | PDF ]
[Sch11]
S. Schmitz. A Note on Sequential Rule-Based POS Tagging. In Proceedings of the 9th International Workshop on Finite-State Methods and Natural Language Processing (FSMNLP'11), pages 83--87, Blois, France, July 2011. ACL Press.
BibTex | Web page | PDF ]
[BBBS11]
N. Bertrand, P. Bouyer, Th. Brihaye, and A. Stainer. Emptiness and Universality Problems in Timed Automata with Positive Frequency. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 246--257, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_19.
BibTex | DOI | Web page | PDF ]
[BDG+11]
Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine, J.-F. Raskin, and J. Worrell. On Reachability for Hybrid Automata over Bounded Time. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 416--427, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_33.
BibTex | DOI | Web page | PDF ]
[BtCS11]
V. Bárány, B. ten Cate, and L. Segoufin. Guarded negation. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 356--367, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_28.
BibTex | DOI | Web page | PDF ]
[SS11]
S. Schmitz and Ph. Schnoebelen. Multiply-Recursive Upper Bounds with Higman's Lemma. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 441--452, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_35.
BibTex | DOI | Web page | PDF ]
[AvMSS11]
M. Anderson, D. van Melkebeek, N. Schweikardt, and L. Segoufin. Locality of queries definable in invariant first-order logic with arbitrary built-in predicates. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 368--379, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_29.
BibTex | DOI | Web page | PDF ]
[ACD11a]
M. Arnaud, V. Cortier, and S. Delaune. Deciding security for protocols with recursive tests. In Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), volume 6803 of Lecture Notes in Computer Science, pages 49--63, Wroclaw, Poland, July 2011. Springer.
doi: 10.1007/978-3-642-22438-6_6.
BibTex | DOI | Web page | PDF ]
[AFFM11]
C. Areces, D. Figueira, S. Figueira, and S. Mera. The Expressive Power of Memory Logics. Review of Symbolic Logic, 4(2):290 -- 318, June 2011.
doi: 10.1017/S1755020310000389.
BibTex | DOI | Web page | PDF ]
[GK11]
J. Goubault-Larrecq and K. Keimel. Choquet-Kendall-Matheron Theorems for Non-Hausdorff Spaces. Mathematical Structures in Computer Science, 21(3):511--561, June 2011.
doi: 10.1017/S0960129510000617.
BibTex | DOI | Web page | PDF ]
[AGP11]
S. Abiteboul, A. Galland, and N. Polyzotis. Web information management with access control. In Proceedings of the 14th International Workshop on the Web and Databases (WebDB'11), Athens, Greece, June 2011.
BibTex | Web page | PDF ]
[KS11]
W. Kazana and L. Segoufin. First-order query evaluation on structures of bounded degree. Logical Methods in Computer Science, 7(2:20), June 2011.
doi: 10.2168/LMCS-7(2:20)2011.
BibTex | DOI | Web page | PDF ]
[ABGA11]
S. Abiteboul, M. Bienvenu, A. Galland, and É. Antoine. A rule-based language for Web data management. In Proceedings of the 30th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'11), pages 293--304, Athens, Greece, June 2011. ACM Press.
doi: 10.1145/1989284.1989320.
BibTex | DOI | Web page | PDF ]
[BCJ+11]
M. Backes, I. Cervesato, A. Jaggard, A. Scedrov, and J.-K. Tsay. Cryptographically sound security proofs for basic and public-key Kerberos. International Journal on Information Security, 10(2):107--134, June 2011.
doi: 10.1007/s10207-011-0125-6.
BibTex | DOI | Web page | PDF ]
[HKS11]
S. Haar, C. Kern, and S. Schwoon. Computing the Reveals Relation in Occurrence Nets. In Proceedings of the 2nd International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'11), volume 54 of Electronic Proceedings in Theoretical Computer Science, pages 31--44, Minori, Italy, June 2011.
doi: 10.4204/EPTCS.54.3.
BibTex | DOI | Web page | PDF ]
[FFK+11]
É. Florentin, L. Fribourg, U. Kühne, S. Lefebvre, and Ch. Rey. COUPLET: Coupled Electrothermal Simulation. Research Report LSV-11-18, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2011. 32 pages.
BibTex | Web page | PDF ]
[Mar11a]
N. Markey. Robustness in Real-time Systems. In Proceedings of the 6th IEEE International Symposium on Industrial Embedded Systems (SIES'11), pages 28--34, Västerås, Sweden, June 2011. IEEE Computer Society Press.
doi: 10.1109/SIES.2011.5953652.
BibTex | DOI | Web page | PDF ]
[KSW11]
S. Kremer, G. Steel, and B. Warinschi. Security for Key Management Interfaces. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pages 266--280, Cernay-la-Ville, France, June 2011. IEEE Computer Society Press.
doi: 10.1109/CSF.2011.25.
BibTex | DOI | Web page | PDF ]
[DKRS11]
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. Formal analysis of protocols based on TPM state registers. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pages 66--82, Cernay-la-Ville, France, June 2011. IEEE Computer Society Press.
doi: 10.1109/CSF.2011.12.
BibTex | DOI | Web page | PDF ]
[BCH11]
S. Balaguer, Th. Chatain, and S. Haar. Building Tight Occurrence Nets from Reveals Relations. In Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11), pages 44--53, Newcastle upon Tyne, UK, June 2011. IEEE Computer Society Press.
doi: 10.1109/ACSD.2011.16.
BibTex | DOI | Web page | PDF ]
[HMN11]
S. Haddad, J. Mairesse, and H.-T. Nguyen. Synthesis and Analysis of Product-form Petri Nets. In Proceedings of the 32nd International Conference on Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709 of Lecture Notes in Computer Science, pages 288--307, Newcastle upon Tyne, UK, June 2011. Springer.
doi: 10.1007/978-3-642-21834-7_16.
BibTex | DOI | Web page | PDF ]
[CFS11]
P. Chambart, A. Finkel, and S. Schmitz. Forward Analysis and Model Checking for Trace Bounded WSTS. In Proceedings of the 32nd International Conference on Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709 of Lecture Notes in Computer Science, Newcastle upon Tyne, UK, June 2011. Springer.
doi: 10.1007/978-3-642-21834-7_4.
BibTex | DOI | Web page ]
[FFSS11]
D. Figueira, S. Figueira, S. Schmitz, and Ph. Schnoebelen. Ackermannian and Primitive-Recursive Bounds with Dickson's Lemma. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 269--278, Toronto, Canada, June 2011. IEEE Computer Society Press.
doi: 10.1109/LICS.2011.39.
BibTex | DOI | Web page | PDF ]
[GV11]
J. Goubault-Larrecq and D. Varacca. Continuous Random Variables. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 97--106, Toronto, Canada, June 2011. IEEE Computer Society Press.
doi: 10.1109/LICS.2011.23.
BibTex | DOI | Web page | PDF ]
[Fig11]
D. Figueira. A decidable two-way logic on data words. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 365--374, Toronto, Canada, June 2011. IEEE Computer Society Press.
doi: 10.1109/LICS.2011.18.
BibTex | DOI | Web page | PDF ]
[Ben11]
H. Benzina. Logic in Virtualized Systems. In Proceedings of the International Conference on Computer Applications and Network Security (ICCANS'11), Republic of Maldives, May 2011.
BibTex | Web page | PDF ]
[LS11]
L. Libkin and C. Sirangelo. Data exchange and schema mappings in open and closed worlds. Journal of Computer and System Sciences, 77(3):542--571, May 2011.
doi: 10.1016/j.jcss.2010.04.010.
BibTex | DOI | Web page | PDF ]
[BDD+11b]
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. HASL: An Expressive Language for Statistical Verification of Stochastic Models. In Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'11), pages 306--315, Cachan, France, May 2011.
BibTex | Web page | PDF ]
[BCL11]
P. Bouyer, F. Cassez, and F. Laroussinie. Timed Modal Logics for Real-Time Systems: Specification, Verification and Control. Journal of Logic, Language and Information, 20(2):169--203, April 2011.
doi: 10.1007/s10849-010-9127-4.
BibTex | DOI | Web page | PDF ]
[ABKT11]
S. Abiteboul, K. Böhm, C. Koch, and K.-L. Tan. Proceedings of the 27th International Conference on Data Engineering (ICDE'11). In Proceedings of the 27th International Conference on Data Engineering (ICDE'11), Hannover, Germany, April 2011. IEEE Computer Society Press.
doi: 10.1109/ICDE.2011.5767975.
BibTex | DOI | Web page ]
[BCD+11]
L. Brim, J. Chaloupka, L. Doyen, R. Gentilini, and J.-F. Raskin. Faster algorithms for mean-payoff games. Formal Methods in System Design, 38(2):97--118, April 2011.
doi: 10.1007/s10703-010-0105-x.
BibTex | DOI | Web page | PDF ]
[AGL+11]
É. Antoine, A. Galland, K. Lyngbaek, A. Marian, and N. Polyzotis. Social networking on top of the WebdamExchange system. In Proceedings of the 27th International Conference on Data Engineering (ICDE'11), pages 1300--1303, Hannover, Germany, April 2011. IEEE Computer Society Press.
doi: 10.1109/ICDE.2011.5767939.
BibTex | DOI | Web page | PDF ]
[BGMZ11]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Weighted Expressions and DFS Tree Automata. Research Report LSV-11-08, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2011. 32 pages.
BibTex | Web page | PDF ]
[Mar11b]
N. Markey. Verification of Embedded Systems -- Algorithms and Complexity. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, April 2011.
BibTex | Web page | PDF ]
[Gou11b]
J. Goubault-Larrecq. Musings Around the Geometry of Interaction, and Coherence. Theoretical Computer Science, 412(20):1998--2014, April 2011.
doi: 10.1016/j.tcs.2010.12.023.
BibTex | DOI | Web page | PDF ]
[ABGR11]
S. Abiteboul, M. Bienvenu, A. Galland, and M.-Ch. Rousset. Distributed Datalog Revisited. In Revised Selected Papers of the 1st International Workshop Datalog Reloaded (Datalog'10), volume 6702 of Lecture Notes in Computer Science, pages 252--261, Oxford, UK, March 2011. Springer.
doi: 10.1007/978-3-642-24206-9_15.
BibTex | DOI | Web page | PDF ]
[JKV11]
F. Jacquemard, F. Klay, and C. Vacher. Rigid Tree Automata. Information and Computation, 209(3):486--512, March 2011.
doi: 10.1016/j.ic.2010.11.015.
BibTex | DOI | Web page | PDF ]
[AtCK11]
S. Abiteboul, B. ten Cate, and Y. Katsis. On the equivalence of distributed systems with queries and communication. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 126--137, Uppsala, Sweden, March 2011. ACM Press.
doi: 10.1145/1938551.1938570.
BibTex | DOI | Web page | PDF ]
[ABV11]
S. Abiteboul, P. Bourhis, and V. Vianu. Comparing workflow specification languages: a matter of views. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 78--89, Uppsala, Sweden, March 2011. ACM Press.
doi: 10.1145/1938551.1938564.
BibTex | DOI | Web page | PDF ]
[DMS11b]
L. Doyen, Th. Massart, and M. Shirmohammadi. Synchronizing Objectives for Markov Decision Processes. In Proceedings of the International Workshop on Interactions, Games and Protocols (iWIGP'11), volume 50 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Saarbrücken, Germany, March 2011.
BibTex | Web page | PDF ]
[FK11b]
L. Fribourg and U. Kühne. Parametric Verification of Hybrid Automata Using the Inverse Method. Research Report LSV-11-04, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2011. 25 pages.
BibTex | Web page | PDF ]
[CC11]
H. Comon-Lundh and V. Cortier. How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 29--44, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.29.
BibTex | DOI | Web page | PDF ]
[tCS11]
B. ten Cate and L. Segoufin. Unary negation. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 344--355, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.344.
BibTex | DOI | Web page | PDF ]
[ST11]
L. Segoufin and S. Toruńczyk. Automata based verification over linearly ordered data domains. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 81--92, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.81.
BibTex | DOI | Web page | PDF ]
[Kre11]
S. Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011.
BibTex | Web page | PDF ]
[Ste11b]
G. Steel. Formal Analysis of Security APIs. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011.
BibTex | Web page | PDF ]
[Del11]
S. Delaune. Verification of security protocols: from confidentiality to privacy. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011.
BibTex | Web page | PDF ]
[Pas11a]
D. Pasailă. Conjunctive queries determinacy and rewriting. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 220--231, Uppsala, Sweden, March 2011. ACM Press.
doi: 10.1145/1938551.1938580.
BibTex | DOI | Web page | PDF ]
[BFHR11]
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Ordinal Theory for Expressiveness of Well Structured Transition Systems. In Proceedings of the 14th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'11), volume 6604 of Lecture Notes in Computer Science, pages 153--167, Saarbrücken, Germany, March-April 2011. Springer.
doi: 10.1007/978-3-642-19805-2_11.
BibTex | DOI | Web page | PDF ]
[FS11]
D. Figueira and L. Segoufin. Bottom-up automata on data trees and vertical XPath. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 93--104, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.93.
BibTex | DOI | Web page | PDF ]
[Bou11]
P. Bourhis. On the dynamics of active documents for distributed data management. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2011.
BibTex | Web page | PDF ]
[ACGP11]
M. Abdalla, C. Chevalier, L. Granboulan, and D. Pointcheval. Contributory Password-Authenticated Group Key Exchange with Join Capability. In Proceedings of the Cryptographers' Track at the RSA Conference 2011 (CT-RSA'11), volume 6558 of Lecture Notes in Computer Science, pages 142--160, San Francisco, California, USA, February 2011. Springer.
doi: 10.1007/978-3-642-19074-2_11.
BibTex | DOI | Web page | PDF ]
[Vil11]
J. Villard. Heaps and Hops. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2011.
BibTex | Web page | PDF ]
[BBD+11a]
S. Baarir, M. Beccuti, C. Dutheillet, G. Franceschinis, and S. Haddad. Lumping partially symmetrical stochastic models. Performance Evaluation, 76:21--44, January 2011.
doi: 10.1016/j.peva.2010.09.002.
BibTex | DOI | Web page | PDF ]
[CSV11b]
R. Chadha, A. P. Sistla, and M. Viswanathan. Probabilistic Büchi automata with non-extremal acceptance thresholds. In Proceedings of the 12th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'11), volume 6538 of Lecture Notes in Computer Science, pages 103--117, Austin, Texas, USA, January 2011. Springer.
doi: 10.1007/978-3-642-18275-4_9.
BibTex | DOI | Web page | PDF ]
[DR11]
L. Doyen and J.-F. Raskin. Games with Imperfect Information: Theory and Algorithms. In Lectures in Game Theory for Computer Scientists. Cambridge University Press, January 2011.
BibTex | Web page | PS | PDF ]
[Ste11a]
G. Steel. Formal Analysis of Security APIs. In Encyclopedia of Cryptography and Security, pages 492--494. Springer, 2nd edition, 2011.
doi: 10.1007/978-1-4419-5906-5_873.
BibTex | DOI ]
[AMR+11]
S. Abiteboul, I. Manolescu, Ph. Rigaux, M.- Ch. Rousset, and P. Senellart. Web Data Management. Cambridge University Press, 2011.
BibTex | Web page ]
[Had11]
S. Haddad. Introduction to Verification. In Models and Analysis in Distributed Systems, chapter 6, pages 137--154. John Wiley & Sons, Ltd., 2011.
BibTex ]
[DP11]
S. Demri and D. Poitrenaud. Verification of Infinite-State Systems. In Models and Analysis in Distributed Systems, chapter 8, pages 221--269. John Wiley & Sons, Ltd., 2011.
BibTex | Web page | PDF ]
[HKPP11a]
S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors. Distributed Systems Design and Algorithms. John Wiley & Sons, Ltd., 2011.
BibTex | Web page ]
[HKPP11b]
S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors. Models and Analysis in Distributed Systems. John Wiley & Sons, Ltd., 2011.
BibTex | Web page ]
[CDM11]
H. Comon-Lundh, S. Delaune, and J. K. Millen. Constraint solving techniques and enriching the model with equational theories. In Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series, pages 35--61. IOS Press, 2011.
BibTex | Web page | PDF ]
[CK11]
V. Cortier and S. Kremer, editors. Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series. IOS Press, 2011.
BibTex | Web page ]
[BKKL11]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. SMA---The Smyle Modeling Approach. In Revised Selected Papars of the 3rd IFIP TC2 Central and East European Conference on Software Engineering Techniques (CEE-SET'08), volume 4980 of Lecture Notes in Computer Science, pages 103--117, Brno, Czech Republic, 2011. Springer.
doi: 10.1007/978-3-642-22386-0_8.
BibTex | DOI | Web page | PDF ]
[LAL10]
D. Longuet, M. Aiguier, and P. Le Gall. Proof-guided test selection from first-order specifications with equality. Journal of Automated Reasoning, 45(4):437--473, December 2010.
doi: 10.1007/s10817-009-9128-7.
BibTex | DOI | Web page | PS | PDF ]
[BFHR10]
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Comparing Petri Data Nets and Timed Petri Nets. Research Report LSV-10-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 16 pages.
BibTex | Web page | PDF ]
[Vac10]
C. Vacher. Automates à contraintes globales pour la vérification de propriétés de sécurité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[Pla10]
Th. Place. Decidable Characterizations for Tree Logics. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[Fig10b]
D. Figueira. On decidable automata on data words and data trees in relation to satisfiability of LTL and XPath. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[And10c]
É. André. An Inverse Method for the Synthesis of Timing Parameters in Concurrent Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[Sou10b]
R. Soulat. On Properties of the Inverse Method: Commutation of Instanciation and Full Covering of the Behavioral Cartography. Research Report LSV-10-22, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 14 pages.
BibTex | Web page | PDF ]
[And10d]
É. André. Synthesizing Parametric Constraints on Various Case Studies Using IMITATOR II. Research Report LSV-10-21, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 66 pages.
BibTex | Web page | PDF ]
[DR10a]
S. Demri and A. Rabinovich. The Complexity of Linear-time Temporal Logic over the Class of Ordinals. Logical Methods in Computer Science, 6(4), December 2010.
doi: 10.2168/LMCS-6(4:9)2010.
BibTex | DOI | Web page | PDF ]
[CSV10]
R. Chadha, A. P. Sistla, and M. Viswanathan. Model Checking Concurrent Programs with Nondeterminism and Randomization. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 364--375, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.364.
BibTex | DOI | Web page | PDF ]
[AGMNK10]
S. Akshay, P. Gastin, M. Mukund, and K. Narayan Kumar. Model checking time-constrained scenario-based specifications. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 204--215, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.204.
BibTex | DOI | Web page | PDF ]
[CDHR10]
K. Chatterjee, L. Doyen, Th. A. Henzinger, and J.-F. Raskin. Generalized Mean-payoff and Energy Games. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 505--516, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.505.
BibTex | DOI | Web page | PDF ]
[BFLZ10]
R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun. Place-Boundedness for Vector Addition Systems with one zero-test. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 192--203, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.192.
BibTex | DOI | Web page | PDF ]
[HBM+10]
P. Hunter, P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. Computing rational radical sums in uniform TC^0. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 308--316, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.308.
BibTex | DOI | Web page | PDF ]
[DLM10]
A. Da Costa, F. Laroussinie, and N. Markey. ATL with strategy contexts: Expressiveness and Model Checking. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 120--132, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.120.
BibTex | DOI | Web page | PDF ]
[BLPS10]
P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo. XML with incomplete information. Journal of the ACM, 58(1), December 2010.
doi: 10.1145/1870103.1870107.
BibTex | DOI | Web page | PDF ]
[DKS10]
S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11 and Proprietary Extensions. Journal of Computer Security, 18(6):1211--1245, November 2010.
doi: 10.3233/JCS-2009-0394.
BibTex | DOI | Web page | PDF ]
[Gou10b]
J. Goubault-Larrecq. Finite Models for Formal Security Proofs. Journal of Computer Security, 18(6):1247--1299, November 2010.
doi: 10.3233/JCS-2009-0395.
BibTex | DOI | Web page | PDF ]
[KM10]
S. Kremer and L. Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. Journal of Computer Security, 18(6):999--1033, November 2010.
doi: 10.3233/JCS-2009-0388.
BibTex | DOI | Web page | PDF ]
[And10b]
É. André. IMITATOR II User Manual. Research Report LSV-10-20, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2010. 31 pages.
BibTex | Web page | PDF ]
[LMT10]
R. Lanotte, A. Maggiolo-Schettini, and A. Troina. Weak bisimulation for Probabilistic Timed Automata? Theoretical Computer Science, 411(50):4291--4322, November 2010.
doi: 10.1016/j.tcs.2010.09.003.
BibTex | DOI | Web page | PDF ]
[AJRG10]
R. Abassi, F. Jacquemard, M. Rusinowitch, and S. Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas. In Proceedings of the 2nd International Conference on Communications and Networking (ComNet'10), Tozeur, Tunisia, November 2010. IEEE Computer Society Press.
doi: 10.1109/COMNET.2010.5699810.
BibTex | DOI | Web page | PDF ]
[BHB10]
S. S. Bauer, R. Hennicker, and M. Bidoit. A Modal Interface Theory with Data Constraints. In Revised Selected Papers of the 13th Brazilian Symposium on Formal Methods (SBMF'10), volume 6527 of Lecture Notes in Computer Science, pages 80--95. Springer, November 2010.
doi: 10.1007/978-3-642-19829-8_6.
BibTex | DOI | Web page | PDF ]
[LBD+10]
S. Li, S. Balaguer, A. David, K. G. Larsen, B. Nielsen, and S. Pusinskas. Scenario-based verification of real-time systems using Uppaal. Formal Methods in System Design, 37(2-3):200--264, November 2010.
doi: 10.1007/s10703-010-0103-z.
BibTex | DOI | Web page | PDF ]
[BHSZ10]
B. Bérard, S. Haddad, M. Sassolas, and M. Zeitoun. Distributed Synthesis with Incomparable Information. Research Report LSV-10-17, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2010. 20 pages.
BibTex | Web page | PDF ]
[CD10a]
K. Chatterjee and L. Doyen. The Complexity of Partial-Observation Parity Games. In Proceedings of the 17th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'10), volume 6397 of Lecture Notes in Artificial Intelligence, pages 1--14, Yogyakarta, Indonesia, October 2010. Springer.
doi: 10.1007/978-3-642-16242-8_1.
BibTex | DOI | Web page | PS | PDF ]
[KBBB10]
U. Kühne, S. Beyer, J. Bormann, and J. Barstow. Automated Formal Verification of Processors Based on Architectural Models. In Proceedings of the 10th International Conference on Formal Methods in Computer Aided Design (FMCAD'10), pages 129--136, Lugano, Switzerland, October 2010. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[BCFS10]
M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel. Attacking and Fixing PKCS#11 Security Tokens. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), pages 260--269, Chicago, Illinois, USA, October 2010. ACM Press.
doi: 10.1145/1866307.1866337.
BibTex | DOI | Web page | PDF ]
[Haa10a]
S. Haar. Types of Asynchronous Diagnosability and the phReveals-Relation in Occurrence Nets. IEEE Transactions on Automatic Control, 55(10):2310--2320, October 2010.
doi: 10.1109/TAC.2010.2063490.
BibTex | DOI | Web page | PDF ]
[SRKK10]
B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh. Towards automatic analysis of election verifiability properties. In Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10), volume 6186 of Lecture Notes in Computer Science, pages 146--163, Paphos, Cyprus, October 2010. Springer.
doi: 10.1007/978-3-642-16074-5_11.
BibTex | DOI | Web page | PDF ]
[BCHK10]
P. Baldan, Th. Chatain, S. Haar, and B. König. Unfolding-based Diagnosis of Systems with an Evolving Topology. Information and Computation, 208(10):1169--1192, October 2010.
doi: 10.1016/j.ic.2009.11.009.
BibTex | DOI | Web page | PDF ]
[BK10]
D. Berwanger and L. Kaiser. Information Tracking in Games on Graphs. Journal of Logic, Language and Information, 19(4):395--412, October 2010.
doi: 10.1007/s10849-009-9115-8.
BibTex | DOI | Web page | PDF ]
[BCD+10]
D. Berwanger, K. Chatterjee, L. Doyen, M. De Wulf, and Th. A. Henzinger. Strategy Construction for Parity Games with Imperfect Information. Information and Computation, 208(10):1206--1220, October 2010.
doi: 10.1016/j.ic.2009.09.006.
BibTex | DOI | Web page | PS | PDF ]
[BS10]
M. Bojańczyk and L. Segoufin. Tree Languages Defined in First-Order Logic with One Quantifier Alternation. Logical Methods in Computer Science, 6(4:1), October 2010.
doi: 10.2168/LMCS-6(4:1)2010.
BibTex | DOI | Web page | PDF ]
[Rod10]
C. Rodríguez. Implementation of a complete prefix unfolder for contextual nets. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[HMY10b]
S. Haddad, L. Mokdad, and S. Youcef. Selection of the Best composite Web Service Based on Quality of Service. In Proceedings of the 2nd International Symposium on Services Science and 3rd International Conference on Business Process and Services Computing (ISSSashBPSC'10), volume 177 of Lecture Notes in Informatics, pages 255--266, Leipzig, Germany, September-October 2010. Gesellschaft für Informatik.
BibTex | Web page | PDF ]
[Sce10]
G. Scerri. Modélisation des clés de l'intrus. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex ]
[CDH10a]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. Expressiveness and Closure Properties for Quantitative Languages. Logical Methods in Computer Science, 6(3:10), September 2010.
doi: 10.2168/LMCS-6(3:10)2010.
BibTex | DOI | Web page | PS | PDF ]
[BGGP10]
O. Bouissou, É. Goubault, J. Goubault-Larrecq, and S. Putot. A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs. In Proceedings of the 14th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetic and Validated Numerics (SCAN'10), Lyon, France, September 2010.
BibTex ]
[Dem10a]
S. Demri. Counter Systems for Data Logics. In Proceedings of the 12th European Conference on Logics in Artificial Intelligence (JELIA'10), volume 6431 of Lecture Notes in Artificial Intelligence, page 10, Helsinki, Finland, September 2010. Springer.
doi: 10.1007/978-3-642-15675-5_3.
BibTex | DOI | Web page | PDF ]
[MW10]
N. Markey and J. Wijsen, editors. Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), Paris, France, September 2010. IEEE Computer Society Press.
doi: 10.1109/TIME.2010.4.
BibTex | DOI | Web page ]
[DKRS10a]
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A Formal Analysis of Authentication in the TPM. In Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), volume 6561 of Lecture Notes in Computer Science, pages 111--125, Pisa, Italy, September 2010. Springer.
doi: 10.1007/978-3-642-19751-2_8.
BibTex | DOI | Web page | PS | PDF ]
[BWA10]
M. Baudet, B. Warinschi, and M. Abadi. Guessing Attacks and the Computational Soundness of Static Equivalence. Journal of Computer Security, 18(5):909--968, September 2010.
doi: 10.3233/JCS-2009-0386.
BibTex | DOI | Web page | PDF ]
[BG10]
H. Benzina and J. Goubault-Larrecq. Some Ideas on Virtualized Systems Security, and Monitors. In Revised Selected Papers of the 5th International Workshop on Data Privacy Management and Autonomous Spontaneous Security (DPM'10) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP'10), volume 6514 of Lecture Notes in Computer Science, pages 244--258, Athens, Greece, September 2010. Springer.
doi: 10.1007/978-3-642-19348-4_18.
BibTex | DOI | Web page | PDF ]
[LV10]
É. Lozes and J. Villard. A spatial equational logic for the applied π-calculus. Distributed Computing, 23(1):61--83, September 2010.
doi: 10.1007/s00446-010-0112-6.
BibTex | DOI | Web page | PDF ]
[And10a]
É. André. IMITATOR II: A Tool for Solving the Good Parameters Problem in Timed Automata. In Proceedings of the 12th International Workshops on Verification of Infinite State Systems (INFINITY'10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 91--99, Singapore, September 2010.
doi: 10.4204/EPTCS.39.7.
BibTex | DOI | Web page | PDF ]
[Dem10b]
S. Demri. On Selective Unboundedness of VASS. In Proceedings of the 12th International Workshops on Verification of Infinite State Systems (INFINITY'10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 1--15, Singapore, September 2010.
doi: 10.4204/EPTCS.39.1.
BibTex | DOI | Web page | PDF ]
[BDF10]
A. Bušić, H. Djafri, and J.-M. Fourneau. Stochastic Bounds for Censored Markov Chains. In Proceedings of the 6th International Meeting on the Numerical Solution of Markov Chain (NSMC'10), Williamsburg, Virginia, USA, September 2010.
BibTex | Web page | PDF ]
[KRS10]
S. Kremer, M. D. Ryan, and B. Smyth. Election verifiability in electronic voting protocols. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of Lecture Notes in Computer Science, pages 389--404, Athens, Greece, September 2010. Springer.
doi: 10.1007/978-3-642-15497-3_24.
BibTex | DOI | Web page | PDF ]
[DDS10a]
M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of Lecture Notes in Computer Science, pages 55--70, Athens, Greece, September 2010. Springer.
doi: 10.1007/978-3-642-15497-3_4.
BibTex | DOI | Web page | PS | PDF ]
[BBM10a]
P. Bouyer, R. Brenguier, and N. Markey. Computing Equilibria in Two-Player Timed Games via Turn-Based Finite Games. In Proceedings of the 8th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'10), volume 6246 of Lecture Notes in Computer Science, pages 62--76, Vienna, Austria, September 2010. Springer.
doi: 10.1007/978-3-642-15297-9_7.
BibTex | DOI | Web page | PDF ]
[BCH10]
S. Balaguer, Th. Chatain, and S. Haar. A Concurrency-Preserving Translation from Time Petri Nets to Networks of Timed Automata. In Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), pages 77--84, Paris, France, September 2010. IEEE Computer Society Press.
doi: 10.1109/TIME.2010.12.
BibTex | DOI | Web page | PDF ]
[BHS10]
B. Bérard, S. Haddad, and M. Sassolas. Real Time Properties for Interrupt Timed Automata. In Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), pages 69--76, Paris, France, September 2010. IEEE Computer Society Press.
doi: 10.1109/TIME.2010.11.
BibTex | DOI | Web page | PDF ]
[BKM10]
B. Bollig, D. Kuske, and I. Meinecke. Propositional Dynamic Logic for Message-Passing Systems. Logical Methods in Computer Science, 6(3:16), September 2010.
doi: 10.2168/LMCS-6(3:16)2010.
BibTex | DOI | Web page | PDF ]
[DL10]
S. Demri and D. Lugiez. Complexity of Modal Logics with Presburger Constraints. Journal of Applied Logic, 8(3):233--252, September 2010.
doi: 10.1016/j.jal.2010.03.001.
BibTex | DOI | Web page | PDF ]
[San10]
O. Sankur. Model-checking robuste des automates temporisés via les machines à canaux. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Sou10a]
R. Soulat. Améliorations algorithmiques d'un moteur de model-checking et études de cas. Rapport de Master, Master 2 Recherche Informatique Paris Sud 11, September 2010.
BibTex | Web page | PDF ]
[Boi10]
A. Boiret. Grammaires context-free pour les arbres sans rang. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Dim10]
J. Dimino. Sur les arbres de rang non borné avec données. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Mon10]
B. Monmege. Propriétés quantitatives des mots et des arbres -- Applications aux langages XML. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[ABMG10]
S. Abiteboul, P. Bourhis, B. Marinoiu, and A. Galland. AXART -- Enabling Collaborative Work with AXML Artifacts. In Proceedings of the 36th International Conference on Very Large Data Bases (VLDB'10), volume 3 of Proceedings of the VLDB Endowment, pages 1553--1556, Singapore, September 2010. ACM Press.
BibTex | Web page | PDF ]
[BBC+10a]
P. Baldan, A. Bruni, A. Corradini, B. König, and S. Schwoon. On the Computation of McMillan's Prefix for Contextual Nets and Graph Grammars. In Proceedings of the 5th International Conference on Graph Transformations (ICGT'10), volume 6372 of Lecture Notes in Computer Science, pages 91--106, Enschede, The Netherlands, September-October 2010. Springer.
doi: 10.1007/978-3-642-15928-2_7.
BibTex | DOI | Web page | PDF ]
[Cyr10b]
A. Cyriac. Temporal Logics for Concurrent Recursive Programs. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Haa10b]
S. Haar. What Topology Tells us about Diagnosability in Partial Order Semantics. In Proceedings of the 10th Workshop on Discrete Event Systems (WODES'10), pages 221--226, Berlin, Germany, August-September 2010. IFAC.
BibTex | Web page | PDF ]
[GL10]
P. Gastin and F. Laroussinie, editors. Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science. Springer, August-September 2010.
doi: 10.1007/978-3-642-15375-4.
BibTex | DOI | Web page ]
[FHL10]
D. Figueira, P. Hofman, and S. Lasota. Relating timed and register automata. In Proceedings of the 17th International Workshop on Expressiveness in Concurrency (EXPRESS'10), volume 41 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Paris, France, August 2010.
doi: 10.4204/EPTCS.41.5.
BibTex | DOI | Web page | PDF ]
[DKRS10b]
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A Formal Analysis of Authentication in the TPM (short paper). In Preliminary Proceedings of the 8th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'10), Paris, France, August 2010.
BibTex | Web page | PS | PDF ]
[Sch10c]
Ph. Schnoebelen. Lossy Counter Machines Decidability Cheat Sheet. In Proceedings of the 4th Workshop on Reachability Problems in Computational Models (RP'10), volume 6227 of Lecture Notes in Computer Science, pages 51--75, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15349-5_4.
BibTex | DOI | Web page | PDF ]
[AF10a]
É. André and L. Fribourg. Behavioral Cartography of Timed Automata. In Proceedings of the 4th Workshop on Reachability Problems in Computational Models (RP'10), volume 6227 of Lecture Notes in Computer Science, pages 76--90, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15349-5_5.
BibTex | DOI | Web page | PDF ]
[DDG+10]
A. Degorre, L. Doyen, R. Gentilini, J.-F. Raskin, and S. Toruńczyk. Energy and Mean-Payoff Games with Imperfect Information. In Proceedings of the 19th Annual EACSL Conference on Computer Science Logic (CSL'10), volume 6247 of Lecture Notes in Computer Science, pages 260--274, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15205-4_22.
BibTex | DOI | Web page | PDF ]
[Sch10d]
Ph. Schnoebelen. Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 616--628, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_54.
BibTex | DOI | Web page | PDF ]
[CDGH10]
K. Chatterjee, L. Doyen, H. Gimbert, and Th. A. Henzinger. Randomness for Free. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 246--257, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_23.
BibTex | DOI | Web page | PDF ]
[FP10]
G. Fontaine and Th. Place. Classes of trees definable in the μ-calculus. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 381--392, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_34.
BibTex | DOI | Web page | PDF ]
[CDH10b]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. Qualitative Analysis of Partially-observable Markov Decision Processes. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 258--269, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_24.
BibTex | DOI | Web page | PDF ]
[OU10]
J. Olschewski and M. Ummels. The Complexity of Finding Reset Words in Finite Automata. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 568--579, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_50.
BibTex | DOI | Web page | PDF ]
[CDE+10]
K. Chatterjee, L. Doyen, H. Edelsbrunner, Th. A. Henzinger, and P. Rannou. Mean-Payoff Automaton Expressions. In Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science, pages 269--283, Paris, France, August-September 2010. Springer.
doi: 10.1007/978-3-642-15375-4_19.
BibTex | DOI | Web page | PDF ]
[BBM10b]
P. Bouyer, R. Brenguier, and N. Markey. Nash Equilibria for Reachability Objectives in Multi-player Timed Games. In Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science, pages 192--206, Paris, France, August-September 2010. Springer.
doi: 10.1007/978-3-642-15375-4_14.
BibTex | DOI | Web page | PDF ]
[CS10a]
P. Chambart and Ph. Schnoebelen. Computing blocker sets for the Regular Post Embedding Problem. In Proceedings of the 14th International Conference on Developments in Language Theory (DLT'10), volume 6224 of Lecture Notes in Computer Science, pages 136--147, London, Ontario, Canada, August 2010. Springer.
doi: 10.1007/978-3-642-14455-4_14.
BibTex | DOI | Web page | PDF ]
[HNS10]
P.-C. Héam, C. Nicaud, and S. Schmitz. Parametric Random Generation of Deterministic Tree Automata. Theoretical Computer Science, 411(38-39):3469--3480, August 2010.
doi: 10.1016/j.tcs.2010.05.036.
BibTex | DOI | Web page | PDF ]
[JR10]
F. Jacquemard and M. Rusinowitch. Rewrite-based verification of XML updates. In Proceedings of the 12th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP'10), pages 119--130, Hagenberg, Austria, July 2010. ACM Press.
doi: 10.1145/1836089.1836105.
BibTex | DOI | Web page | PDF ]
[NSV10]
A. Nash, L. Segoufin, and V. Vianu. Views and queries: Determinacy and rewriting. ACM Transactions on Database Systems, 35(3), July 2010.
doi: 10.1145/1806907.1806913.
BibTex | DOI | Web page | PDF ]
[Car10]
J.-L. Carré. Analyse statique de programmes multi-thread pour l'embarqué. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2010.
BibTex | Web page | PDF ]
[Aks10]
S. Akshay. Spécification et vérification pour des systèmes distribués et temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2010.
BibTex | Web page | PDF ]
[DDS10b]
M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the Workshop on Foundations of Security and Privacy (FCS-PrivMod'10), pages 55--70, Edinburgh, Scotland, UK, July 2010.
doi: 10.1007/978-3-642-15497-3_4.
BibTex | DOI | Web page | PS | PDF ]
[Sch10b]
S. Schmitz. On the Computational Complexity of Dominance Links in Grammatical Formalisms. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics (ACL'10), pages 514--524, Uppsala, Sweden, July 2010. Association for Computational Linguistics.
BibTex | Web page | PDF ]
[CCD10]
V. Cheval, H. Comon-Lundh, and S. Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), volume 6173 of Lecture Notes in Artificial Intelligence, pages 412--426, Edinburgh, Scotland, UK, July 2010. Springer-Verlag.
doi: 10.1007/978-3-642-14203-1_35.
BibTex | DOI | Web page | PDF ]
[Gou10c]
J. Goubault-Larrecq. Noetherian Spaces in Verification. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 2--21, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_2.
BibTex | DOI | Web page | PDF ]
[CS10b]
P. Chambart and Ph. Schnoebelen. Pumping and Counting on the Regular Post Embedding Problem. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 64--75, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_6.
BibTex | DOI | Web page | PDF ]
[CD10b]
K. Chatterjee and L. Doyen. Energy Parity Games. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 599--610, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_50.
BibTex | DOI | Web page | PDF ]
[BGMZ10]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Pebble weighted automata and transitive closure logics. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 587--598, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_49.
BibTex | DOI | Web page | PDF ]
[CC10]
S. Ciobâcă and V. Cortier. Protocol composition for arbitrary primitives. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 322--336, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/CSF.2010.29.
BibTex | DOI | Web page | PDF ]
[ACD10]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 59--74, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/CSF.2010.12.
BibTex | DOI | Web page | PDF ]
[BKK+10]
B. Bollig, J.-P. Katoen, C. Kern, M. Leucker, D. Neider, and D. R. Piegdon. libalf: the Automata Learning Framework. In Proceedings of the 22nd International Conference on Computer Aided Verification (CAV'10), volume 6174 of Lecture Notes in Computer Science, pages 360--364, Edinburgh, Scotland, UK, July 2010. Springer.
doi: 10.1007/978-3-642-14295-6_32.
BibTex | DOI | Web page | PDF ]
[SS10]
N. Schweikardt and L. Segoufin. Addition-invariant FO and regularity. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 273--282, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.16.
BibTex | DOI | Web page | PDF ]
[PS10]
Th. Place and L. Segoufin. Deciding definability in FO_2(<) on trees. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 253--262, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.17.
BibTex | DOI | Web page | PDF ]
[Gou10d]
J. Goubault-Larrecq. ωQRB-Domains and the Probabilistic Powerdomain. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 352--361, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.50.
BibTex | DOI | Web page | PDF ]
[BCG+10]
L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and C. Vacher. The Emptiness Problem for Tree Automata with Global Constraints. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 263--272, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.28.
BibTex | DOI | Web page | PDF ]
[GK10]
P. Gastin and D. Kuske. Uniform satisfiability problem for local temporal logics over Mazurkiewicz traces. Information and Computation, 208(7):797--816, July 2010.
doi: 10.1016/j.ic.2009.12.003.
BibTex | DOI | Web page | PDF ]
[Cyr10a]
A. Cyriac. A New Version of Focus Games for LTL Satisfiability. In Proceedings of the Workshop on Comparing Logical Decision Methods (CLoDeM'10), Edinburgh, Scotland, UK, July 2010.
BibTex | Web page | PDF ]
[BJL+10]
Th. Brihaye, M. Jungers, S. Lasaulce, N. Markey, and G. Oreiby. Using Model Checking for Analyzing Distributed Power Control Problems. EURASIP Journal on Wireless Communications and Networking, 2010(861472), June 2010.
doi: 10.1155/2010/861472.
BibTex | DOI | Web page | PDF ]
[DHLN10]
L. Doyen, Th. A. Henzinger, A. Legay, and D. Nickovic. Robustness of Sequential Circuits. In Proceedings of the 10th International Conference on Application of Concurrency to System Design (ACSD'10), pages 77--84, Braga, Portugal, June 2010. IEEE Computer Society Press.
doi: 10.1109/ACSD.2010.26.
BibTex | DOI | Web page | PDF ]
[EHH10]
D. El Hog-Benzina, S. Haddad, and R. Hennicker. Process Refinement and Asynchronous Composition with Modalities. In Proceedings of the 2nd International Workshop on Abstractions for Petri Nets and Other Models of Concurrency (APNOC'10), Braga, Portugal, June 2010.
BibTex | Web page | PDF ]
[HMY10a]
S. Haddad, L. Mokdad, and S. Youcef. Response time of BPEL4WS constructors. In Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC'10), pages 695--700, Riccione, Italy, June 2010. IEEE Computer Society Press.
doi: 10.1109/ISCC.2010.5546538.
BibTex | DOI | Web page | PDF ]
[CF10]
Th. Chatain and É. Fabre. Factorization Properties of Symbolic Unfoldings of Colored Petri Nets. In Proceedings of the 31st International Conference on Applications and Theory of Petri Nets (PETRI NETS'10), volume 6128 of Lecture Notes in Computer Science, pages 165--184, Braga, Portugal, June 2010. Springer.
doi: 10.1007/978-3-642-13675-7_11.
BibTex | DOI | Web page | PDF ]
[LS10b]
L. Libkin and C. Sirangelo. Reasoning about XML with temporal logics and automata. Journal of Applied Logic, 8(2):210--232, June 2010.
doi: 10.1016/j.jal.2009.09.005.
BibTex | DOI | Web page | PDF ]
[BH10b]
B. Bollig and L. Hélouët. Realizability of Dynamic MSC Languages. In Proceedings of the 5th International Computer Science Symposium in Russia (CSR'10), volume 6072 of Lecture Notes in Computer Science, pages 48--59, Kazan, Russia, June 2010. Springer.
doi: 10.1007/978-3-642-13182-0_5.
BibTex | DOI | Web page | PDF ]
[BKKL10a]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Learning Communicating Automata from MSCs. IEEE Transactions on Software Engineering, 36(3):390--408, May-June 2010.
doi: 10.1109/TSE.2009.89.
BibTex | DOI | Web page | PDF ]
[CJ10]
Th. Chatain and C. Jard. Sémantique concurrente symbolique des réseaux de Petri saufs et dépliages finis des réseaux temporels. In Actes de la 10ème Conférence Internationale sur les NOuvelles TEchnologies de la RÉpartition (NOTERE'10), Tozeur, Tunisia, May-June 2010. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[DKR10b]
S. Delaune, S. Kremer, and M. D. Ryan. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. In Towards Trustworthy Elections -- New Directions in Electronic Voting, volume 6000 of Lecture Notes in Computer Science, pages 289--309. Springer, May 2010.
doi: 10.1007/978-3-642-12980-3_18.
BibTex | DOI | Web page | PDF ]
[DLS10]
S. Demri, R. Lazić, and A. Sangnier. Model checking memoryful linear-time logics over one-counter automata. Theoretical Computer Science, 411(22-24):2298--2316, May 2010.
doi: 10.1016/j.tcs.2010.02.021.
BibTex | DOI | Web page | PDF ]
[BFLM10]
P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey. Timed Automata with Observers under Energy Constraints. In Proceedings of the 13th International Conference on Hybrid Systems: Computation and Control (HSCC'10), pages 61--70, Stockholm, Sweden, April 2010. ACM Press.
doi: 10.1145/1755952.1755963.
BibTex | DOI | Web page | PDF ]
[Gou10a]
J. Goubault-Larrecq. De Groot Duality and Models of Choice: Angels, Demons, and Nature. Mathematical Structures in Computer Science, 20(2):169--237, April 2010.
doi: 10.1017/S0960129509990363.
BibTex | DOI | Web page | PDF ]
[CKW10]
V. Cortier, S. Kremer, and B. Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. Journal of Automated Reasoning, 46(3-4):225--259, April 2010.
doi: 10.1007/s10817-010-9187-9.
BibTex | DOI | Web page | PDF ]
[BH10a]
M. Ben Hmida and S. Haddad. Client Synthesis for Aspect Oriented Web Services. In Revised Selected Papers of the 15th Monterey Workshop on Foundations of Computer Software (MONTEREY'08), volume 6028 of Lecture Notes in Computer Science, pages 24--42, Budapest, Hungary, April 2010. Springer.
doi: 10.1007/978-3-642-12566-9_2.
BibTex | DOI | Web page | PDF ]
[RHS10]
L. Recalde, S. Haddad, and M. Silva. Continuous Petri Nets: Expressive Power and Decidability Issues. International Journal of Foundations of Computer Science, 21(2):235--256, April 2010.
doi: 10.1142/S0129054110007222.
BibTex | DOI ]
[VLC10]
J. Villard, É. Lozes, and C. Calcagno. Tracking Heaps that Hop with Heap-Hop. In Proceedings of the 16th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'10), volume 6015 of Lecture Notes in Computer Science, pages 275--279, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12002-2_23.
BibTex | DOI | Web page | PDF ]
[DS10]
S. Demri and A. Sangnier. When Model-Checking Freeze LTL over Counter Machines Becomes Decidable. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 176--190, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12032-9_13.
BibTex | DOI | Web page | PDF ]
[tCF10]
B. ten Cate and G. Fontaine. An Easy Completeness Proof for the Modal μ-Calculus on Finite Trees. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 161--175, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12032-9_12.
BibTex | DOI | Web page | PDF ]
[CS10c]
P. Chambart and Ph. Schnoebelen. Toward a compositional theory of leftist grammars and transformations. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 237--251, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12032-9_17.
BibTex | DOI | Web page | PDF ]
[DKR10a]
S. Delaune, S. Kremer, and M. D. Ryan. Symbolic bisimulation for the applied pi calculus. Journal of Computer Security, 18(2):317--377, March 2010.
doi: 10.3233/JCS-2010-0363.
BibTex | DOI | Web page | PDF ]
[Bon10]
R. Bonnet. Well-structured Petri-nets extensions with data. Rapport de Master, Master Computer Science, EPFL, Lausanne, Switzerland, March 2010.
BibTex | Web page | PDF ]
[tCS10]
B. ten Cate and L. Segoufin. Transitive Closure Logic, Nested Tree Walking Automata, and XPath. Journal of the ACM, 57(3), March 2010.
doi: 10.1145/1706591.1706598.
BibTex | DOI | Web page | PDF ]
[Seg10]
L. Segoufin, editor. Proceedings of the 13th International Conference on Database Theory (ICDT'10), March 2010.
BibTex | Web page ]
[ACK+10]
S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and P. Senellart. Aggregate queries for discrete and continuous probabilistic XML. In Proceedings of the 13th International Conference on Database Theory (ICDT'10), pages 50--61, Lausanne, Switzerland, March 2010. ACM Press.
doi: 10.1145/1804669.1804679.
BibTex | DOI | Web page | PDF ]
[Fig10a]
D. Figueira. Forward-XPath and extended register automata on data-trees. In Proceedings of the 13th International Conference on Database Theory (ICDT'10), pages 230--240, Lausanne, Switzerland, March 2010. ACM Press.
doi: 10.1145/1804669.1804699.
BibTex | DOI | Web page | PS | PDF ]
[DR10b]
L. Doyen and J.-F. Raskin. Antichains Algorithms for Finite Automata. In Proceedings of the 16th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'10), volume 6015 of Lecture Notes in Computer Science, pages 2--22, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12002-2_2.
BibTex | DOI | Web page | PS | PDF ]
[BCM10]
P. Bouyer, F. Chevalier, and N. Markey. On the Expressiveness of TPTL and MTL. Information and Computation, 208(2):97--116, February 2010.
doi: 10.1016/j.ic.2009.10.004.
BibTex | DOI | Web page | PDF ]
[AHL+10]
A. Antonik, M. Huth, K. G. Larsen, U. Nyman, and A. Wąsowski. Modal and mixed specifications: key decision problems and their complexities. Mathematical Structures in Computer Science, 10(1):75--103, February 2010.
doi: 10.1017/S0960129509990260.
BibTex | DOI | Web page | PDF ]
[GAMS10]
A. Galland, S. Abiteboul, A. Marian, and P. Senellart. Corroborating information from disagreeing views. In Proceedings of the 3rd International Conference on Web Search and Web Data Mining (WSDM'10), pages 131--140, New York, New York, USA, February 2010. ACM Press.
doi: 10.1145/1718487.1718504.
BibTex | DOI | Web page | PDF ]
[Sch10a]
S. Schmitz. An Experimental Ambiguity Detection Tool. Science of Computer Programming, 75(1-2):71--84, January 2010.
doi: 10.1016/j.scico.2009.07.002.
BibTex | DOI | Web page | PDF ]
[CLPV10]
R. Chadha, A. Legay, P. Prabhakar, and M. Viswanathan. Complexity bounds for the verification of real-time software. In Proceedings of the 11th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'10), volume 5944 of Lecture Notes in Computer Science, pages 95--111, Madrid, Spain, January 2010. Springer.
doi: 10.1007/978-3-642-11319-2_10.
BibTex | DOI | Web page | PDF ]
[BBC10b]
P. Bouyer, Th. Brihaye, and F. Chevalier. O-Minimal Hybrid Reachability Games. Logical Methods in Computer Science, 6(1:1), January 2010.
doi: 10.2168/LMCS-6(1:1)2010.
BibTex | DOI | Web page | PDF ]
[FS10]
A. Finkel and A. Sangnier. Mixing coverability and reachability to analyze VASS with one zero-test. In Proceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'10), volume 5901 of Lecture Notes in Computer Science, pages 394--406, Špindlerův Mlýn, Czech Republic, January 2010. Springer.
doi: 10.1007/978-3-642-11266-9_33.
BibTex | DOI | Web page | PS | PDF ]
[BKKL10b]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. SMA---The Smyle Modeling Approach. Computing and Informatics, 29(1):45--72, 2010.
BibTex | Web page | PDF ]
[ZBH10]
M. Zargayouna, F. Balbo, and S. Haddad. Agents Secure Interaction in Data Driven Languages. In Revised Selected Papers of the 2nd Workshop on LAnguages, methodologies and Development tools for multi-agent systemS (LADS'09), volume 6039 of Lecture Notes in Computer Science, pages 72--91, Turin, Italy, 2010. Springer.
doi: 10.1007/978-3-642-13338-1_5.
BibTex | DOI | Web page | PDF ]
[CCZ10]
H. Comon-Lundh, V. Cortier, and E. Zălinescu. Deciding security properties for cryptographic protocols. Application to key cycles. ACM Transactions on Computational Logic, 11(2), January 2010.
doi: 10.1145/1656242.1656244.
BibTex | DOI | Web page | PDF ]
[AF10b]
P. Arnoux and A. Finkel. Using mental imagery processes for teaching and research in mathematics and computer science. International Journal of Mathematical Education in Science and Technology, 41(2):229--242, January 2010.
doi: 10.1080/00207390903372429.
BibTex | DOI | Web page | PDF ]
[Ber10]
D. Berwanger. Infinite Coordination Games. In Logic and the Foundations of Game and Decision Theory (LOFT8), volume 6006 of Lecture Notes in Artificial Intelligence, pages 1--19. Springer, 2010.
doi: 10.1007/978-3-642-15164-4_1.
BibTex | DOI | Web page | PDF ]
[CDH10c]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. Quantitative Languages. ACM Transactions on Computational Logic, 11(4), 2010.
BibTex | Web page | PS | PDF ]
[MLRS10]
N. Markey, S. Li, J.-F. Raskin, and M. Stoelinga. Synthesizing controllers with bounded resources. Deliverable QUASIMODO 3.4 (ICT-FP7-STREP-214755), January 2010.
BibTex ]
[LS10a]
L. Libkin and C. Sirangelo. Disjoint pattern matching and implication in strings. Information Processing Letters, 110(4):143--147, January 2010.
doi: 10.1016/j.ipl.2009.11.009.
BibTex | DOI | Web page | PDF ]
[DFGvD10]
S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen. Model-checking CTL^* over Flat Presburger Counter Systems. Journal of Applied Non-Classical Logics, 20(4):313--344, 2010.
doi: 10.3166/jancl.20.313-344.
BibTex | DOI | Web page | PDF ]
[CDMP09]
F. Chevalier, D. D'Souza, R. M. Matteplackel, and P. Prabhakar. Automata and logics over finitely varying functions. Annals of Pure and Applied Logics, 161(3):324--336, December 2009.
doi: 10.1016/j.apal.2009.07.007.
BibTex | DOI | Web page | PDF ]
[Mer09]
A. Mercier. Contributions à l'analyse automatique des protocoles cryptographiques en présence de propriétés algébriques : protocoles de groupe, équivalence statique. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2009.
BibTex | Web page | PDF ]
[Bur09a]
S. Bursuc. Contraintes de déductibilité dans une algèbre quotient: réduction de modèles et applications à la sécurité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2009.
BibTex | Web page | PDF ]
[Gou09a]
J. Goubault-Larrecq. Logic Wins!. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 1--16, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10622-4_1.
BibTex | DOI | Web page | PDF ]
[DJLL09]
S. Demri, M. Jurdziński, O. Lachish, and R. Lazić. The covering and boundedness problems for branching vector addition systems. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), volume 4 of Leibniz International Proceedings in Informatics, pages 181--192, Kanpur, India, December 2009. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2009.2317.
BibTex | DOI | Web page | PDF ]
[DKP09]
S. Delaune, S. Kremer, and O. Pereira. Simulation based security in the applied pi calculus. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), volume 4 of Leibniz International Proceedings in Informatics, pages 169--180, Kanpur, India, December 2009. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2009.2316.
BibTex | DOI | Web page | PDF ]
[VLC09]
J. Villard, É. Lozes, and C. Calcagno. Proving Copyless Message Passing. In Proceedings of the 7th Asian Symposium on Programming Languages and Systems (APLAS'09), volume 5904 of Lecture Notes in Computer Science, pages 194--209, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10672-9_15.
BibTex | DOI | Web page | PDF ]
[BBC09]
P. Bouyer, Th. Brihaye, and F. Chevalier. Weighted O-Minimal Hybrid Systems. Annals of Pure and Applied Logics, 161(3):268--288, December 2009.
doi: 10.1016/j.apal.2009.07.014.
BibTex | DOI | Web page | PDF ]
[KMT09a]
S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 94--108, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10622-4_8.
BibTex | DOI | Web page | PS | PDF ]
[BDC09]
S. Bursuc, S. Delaune, and H. Comon-Lundh. Deducibility constraints. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 24--38, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10622-4_3.
BibTex | DOI | Web page | PS | PDF ]
[BDL09]
R. Brochenin, S. Demri, and É. Lozes. Reasoning about sequences of memory states. Annals of Pure and Applied Logics, 161(3):305--323, December 2009.
doi: 10.1016/j.apal.2009.07.004.
BibTex | DOI | Web page | PDF ]
[DG09a]
S. Demri and R. Gascon. The Effects of Bounding Syntactic Resources on Presburger LTL. Journal of Logic and Computation, 19(6):1541--1575, December 2009.
doi: 10.1093/logcom/exp037.
BibTex | DOI | Web page | PDF ]
[ASV09b]
S. Abiteboul, L. Segoufin, and V. Vianu. Static Analysis of Active XML Systems. ACM Transactions on Database Systems, 34(4), December 2009.
doi: 10.1145/1620585.1620590.
BibTex | DOI | Web page | PDF ]
[Haa09]
S. Haar. Qualitative Diagnosability of Labeled Petri Nets Revisited. In Proceedings of the Joint 48th IEEE Conference on Decision and Control (CDC'09) and 28th Chinese Control Conference (CCC'09), pages 1248--1253, Shanghai, China, December 2009. IEEE Control System Society.
doi: 10.1109/CDC.2009.5400917.
BibTex | DOI | Web page | PDF ]
[Bou09a]
F. Bouchy. Logiques et modèles pour la vérification de systèmes infinis. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2009.
BibTex | Web page | PDF ]
[Szn09]
N. Sznajder. Synthèse de systèmes distribués ouverts. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2009.
BibTex | Web page | PDF ]
[SRKK09]
B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh. Election verifiability in electronic voting protocols (Preliminary version). In Proceedings of the 4th Benelux Workshop on Information and System Security (WISSEC'09), Louvain-la-Neuve, Belgium, November 2009.
BibTex | Web page | PDF ]
[BFS09a]
F. Bouchy, A. Finkel, and P. San Pietro. Dense-choice Counter Machines Revisited. In Proceedings of the 11th International Workshops on Verification of Infinite State Systems (INFINITY'09), volume 10 of Electronic Proceedings in Theoretical Computer Science, pages 3--22, Bologna, Italy, November 2009.
doi: 10.4204/EPTCS.10.1.
BibTex | DOI | Web page | PDF ]
[AF09a]
É. André and L. Fribourg. An Inverse Method for Policy-Iteration Based Algorithms. In Proceedings of the 11th International Workshops on Verification of Infinite State Systems (INFINITY'09), volume 10 of Electronic Proceedings in Theoretical Computer Science, pages 44--61, Bologna, Italy, November 2009.
doi: 10.4204/EPTCS.10.4.
BibTex | DOI | Web page | PDF ]
[HMY09]
S. Haddad, L. Mokdad, and S. Youcef. Bornes du temps de réponse des services Web composites. In Actes du 7ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'09), volume 43 of Journal Européen des Systèmes Automatisés, pages 969--983, Nantes, France, November 2009. Hermès.
BibTex | Web page | PDF ]
[ACD+09a]
É. André, Th. Chatain, O. De Smet, L. Fribourg, and S. Ruel. Synthèse de contraintes temporisées pour une architecture d'automatisation en réseau. In Actes du 7ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'09), volume 43 of Journal Européen des Systèmes Automatisés, pages 1049--1064, Nantes, France, November 2009. Hermès.
BibTex | Web page | PDF ]
[Ste09b]
G. Steel. Towards a Formal Analysis of the SeVeCoM API. In Proceedings of the 7th Conference on Embedded Security in Cars (ESCAR'09), Düsseldorf, Germany, November 2009.
BibTex | Web page | PDF ]
[LCE+09]
LIAFA, CRIL, EDF, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F2.2 : Algorithmes de vérification -- Rapport final, November 2009. 25 pages.
BibTex | Web page | PDF ]
[FLS09a]
A. Finkel, É. Lozes, and A. Sangnier. Towards Model Checking Pointer Systems. In Revised Selected Papers of the International Conference on Infinity in Logic & Computation (ILC'07), volume 5489 of Lecture Notes in Artificial Intelligence, pages 56--82, Cape Town, South Africa, October 2009. Springer-Verlag.
doi: 10.1007/978-3-642-03092-5_6.
BibTex | DOI | Web page | PS | PDF ]
[AKSS09]
S. Abiteboul, B. Kimelfeld, Y. Sagiv, and P. Senellart. On the expressiveness of probabilistic XML models. The VLDB Journal, 18(5):1041--1064, October 2009.
doi: 10.1007/s00778-009-0146-1.
BibTex | DOI | Web page | PDF ]
[CM09]
F. Cassez and N. Markey. Control of Timed Systems. In Communicating Embedded Systems -- Software and Design, chapter 3, pages 83--120. Wiley-ISTE, October 2009.
BibTex | Web page ]
[DH09]
S. Donatelli and S. Haddad. Quantitative Verification of Markov Chains. In Communicating Embedded Systems -- Software and Design, chapter 5, pages 139--163. Wiley-ISTE, October 2009.
BibTex | Web page ]
[Cha09]
N. Chamseddine. Analyse quantitative parametrée d'automates temporisés probabilistes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2009.
BibTex | Web page | PDF ]
[CCD09]
V. Cheval, H. Comon-Lundh, and S. Delaune. A decision procedure for proving observational equivalence. In Preliminary Proceedings of the 7th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'09), Bologna, Italy, October 2009.
BibTex | Web page | PDF ]
[Dim09]
J. Dimino. Les systèmes à canaux non-fiables vus comme des transducteurs. Rapport de stage de M1, Master Parisien de Recherche en Informatique, Paris, France, October 2009.
BibTex | Web page | PDF ]
[FLS09b]
R. Focardi, F. L. Luccio, and G. Steel. Blunting Differential Attacks on PIN Processing APIs. In Proceedings of the 14th Nordic Workshop on Secure IT Systems (NordSec'09), volume 5838 of Lecture Notes in Computer Science, pages 88--103, Oslo, Norway, October 2009. Springer.
doi: 10.1007/978-3-642-04766-4_7.
BibTex | DOI | Web page | PDF ]
[BCHK09]
Y. Boichut, R. Courbis, P.-C. Héam, and O. Kouchnarenko. Handling Non-left Linear Rules when Completing Tree Automata. International Journal of Foundations of Computer Science, 20(5):837--849, October 2009.
doi: 10.1142/S0129054109006917.
BibTex | DOI | Web page | PDF ]
[ACEF09]
É. André, Th. Chatain, E. Encrenaz, and L. Fribourg. An Inverse Method for Parametric Timed Automata. International Journal of Foundations of Computer Science, 20(5):819--836, October 2009.
doi: 10.1142/S0129054109006905.
BibTex | DOI | Web page | PDF ]
[DHL09]
F. Dadeau, P.-C. Héam, and J. Levrey. On the Use of Uniform Random Generation of Automata for Testing. In Proceedings of the 5th Workshop on Model-Based Testing (MBT'09), volume 253 of Electronic Notes in Theoretical Computer Science, pages 37--51, York, UK, October 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.09.050.
BibTex | DOI | Web page | PDF ]
[BS09a]
M. Benedikt and L. Segoufin. Regular tree languages definable in FO and in FO_mod. ACM Transactions on Computational Logic, 11(1), October 2009.
doi: 10.1145/1614431.1614435.
BibTex | DOI | Web page | PDF ]
[DBB+09]
A. David, G. Behrmann, P. Bulychev, J. Byg, Th. Chatain, K. G. Larsen, P. Pettersson, J. I. Rasmussen, J. Srba, W. Yi, K. Y. Joergensen, D. Lime, M. Magnin, O. H. Roux, and L.-M. Traonouez. Tools for Model-Checking Timed Systems. In Communicating Embedded Systems -- Software and Design, chapter 6, pages 165--225. Wiley-ISTE, October 2009.
BibTex | Web page ]
[ASV09a]
S. Abiteboul, L. Segoufin, and V. Vianu. Modeling and Verifying Active XML Artifacts. IEEE Data Engineering Bulletin, 32(3):10--15, September 2009.
BibTex | DOI | Web page | PDF ]
[Che09]
V. Cheval. Algorithme de décision de l'équivalence symbolique de systèmes de contraintes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2009.
BibTex | Web page | PDF ]
[Bre09]
R. Brenguier. Calcul des équilibres de Nash dans les jeux temporisés. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2009.
BibTex | Web page | PS | PDF ]
[BCH+09]
C. Boutrous-Saab, D. Coulibaly, S. Haddad, T. Melliti, P. Moreaux, and S. Rampacek. An Integrated Framework for Web Services Orchestration. International Journal of Web Services Research, 6(4):1--29, September 2009.
BibTex | Web page | PDF ]
[AFS09]
É. André, L. Fribourg, and J. Sproston. An Extension of the Inverse Method to Probabilistic Timed Automata. In Proceedings of the 9th International Workshop on Automated Verification of Critical Systems (AVoCS'09), volume 23 of Electronic Communications of the EASST, Swansea, UK, September 2009. European Association of Software Science and Technology.
BibTex | Web page | PDF ]
[CDL09]
Th. Chatain, A. David, and K. G. Larsen. Playing Games with Timed Games. In Proceedings of the 3rd IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'09), Zaragoza, Spain, September 2009.
BibTex | Web page | PDF ]
[BHK09]
Y. Boichut, P.-C. Héam, and O. Kouchnarenko. How to Tackle Integer Weighted Automata Positivity. In Proceedings of the 3rd Workshop on Reachability Problems in Computational Models (RP'09), volume 5797 of Lecture Notes in Computer Science, pages 79--92, Palaiseau, France, September 2009. Springer.
doi: 10.1007/978-3-642-04420-5_9.
BibTex | DOI | Web page | PDF ]
[BCDL09]
P. Bulychev, Th. Chatain, A. David, and K. G. Larsen. Checking simulation relation between timed game automata. In Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813 of Lecture Notes in Computer Science, pages 73--87, Budapest, Hungary, September 2009. Springer.
doi: 10.1007/978-3-642-04368-0_8.
BibTex | DOI | Web page | PDF ]
[HP09]
S. Haddad and N. Pekergin. Using Stochastic Comparison for Efficient Model Checking of Uncertain Markov Chains. In Proceedings of the 6th International Conference on Quantitative Evaluation of Systems (QEST'09), pages 177--186, Budapest, Hungary, September 2009. IEEE Computer Society Press.
doi: 10.1109/QEST.2009.42.
BibTex | DOI | Web page | PDF ]
[CFLS09]
M. Centenaro, R. Focardi, F. L. Luccio, and G. Steel. Type-based Analysis of PIN Processing APIs. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 53--68, Saint Malo, France, September 2009. Springer.
doi: 10.1007/978-3-642-04444-1_4.
BibTex | DOI | Web page | PDF ]
[CS09]
V. Cortier and G. Steel. A generic security API for symmetric key management on cryptographic devices. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 605--620, Saint Malo, France, September 2009. Springer.
doi: 10.1007/978-3-642-04444-1_37.
BibTex | DOI | Web page | PDF ]
[CAM09]
B. Cautis, S. Abiteboul, and T. Milo. Reasoning about XML update constraints. Journal of Computer and System Sciences, 75(6):336--358, September 2009.
doi: 10.1016/j.jcss.2009.02.001.
BibTex | DOI | Web page | PDF ]
[BHR09a]
A. Bouillard, S. Haar, and S. Rosario. Critical paths in the Partial Order Unfolding of a Stochastic Petri Net. In Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813 of Lecture Notes in Computer Science, pages 43--57, Budapest, Hungary, September 2009. Springer.
doi: 10.1007/978-3-642-04368-0_6.
BibTex | DOI | Web page | PDF ]
[BDMR09]
P. Bouyer, M. Duflot, N. Markey, and G. Renault. Measuring Permissivity in Finite Games. In Proceedings of the 20th International Conference on Concurrency Theory (CONCUR'09), volume 5710 of Lecture Notes in Computer Science, pages 196--210, Bologna, Italy, September 2009. Springer.
doi: 10.1007/978-3-642-04081-8_14.
BibTex | DOI | Web page | PDF ]
[CC09]
S. Ciobâcă and V. Cortier. Algorithmes pour l'équivalence statique. Deliverable AVOTE 2.1 (ANR-07-SESU-002), September 2009. 17 pages.
BibTex | Web page | PDF ]
[BK09]
M. Boreale and S. Kremer, editors. Proceedings of the 7th International Workshop on Security Issues in Concurrency (SecCo'09), volume 7 of Electronic Proceedings in Theoretical Computer Science, Bologna, Italy, August 2009.
doi: 10.4204/EPTCS.7.
BibTex | DOI | Web page ]
[FS09a]
D. Figueira and L. Segoufin. Future-looking logics on data words and trees. In Proceedings of the 34th International Symposium on Mathematical Foundations of Computer Science (MFCS'09), volume 5734 of Lecture Notes in Computer Science, pages 331--343, Novy Smokovec, Slovakia, August 2009. Springer.
doi: 10.1007/978-3-642-03816-7_29.
BibTex | DOI | Web page | PS | PDF ]
[KAS09]
G. Keighren, D. Aspinall, and G. Steel. Towards a Type System for Security APIs. In Revised Selected Papers of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in Computer Science, pages 173--192, York, UK, August 2009. Springer.
doi: 10.1007/978-3-642-03459-6_12.
BibTex | DOI | Web page | PDF ]
[FS09b]
S. Fröschle and G. Steel. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. In Revised Selected Papers of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in Computer Science, pages 92--106, York, UK, August 2009. Springer.
doi: 10.1007/978-3-642-03459-6_7.
BibTex | DOI | Web page | PDF ]
[LA09]
D. Longuet and M. Aiguier. Integration Testing from Structured First-Order Specifications via Deduction Modulo. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture Notes in Computer Science, pages 261--276, Kuala Lumpur, Malaysia, August 2009. Springer.
doi: 10.1007/978-3-642-03466-4_17.
BibTex | DOI | Web page | PDF ]
[And09b]
É. André. IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture Notes in Computer Science, pages 336--342, Kuala Lumpur, Malaysia, August 2009. Springer.
doi: 10.1007/978-3-642-03466-4_22.
BibTex | DOI | Web page | PDF ]
[CDK09c]
S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), volume 5663 of Lecture Notes in Computer Science, pages 355--370, Montreal, Canada, August 2009. Springer.
doi: 10.1007/978-3-642-02959-2_27.
BibTex | DOI | Web page | PDF ]
[KP09]
S. Kremer and P. Panangaden, editors. Proceedings of the 6th International Workshop on Security Issues in Concurrency (SecCo'08), volume 242 of Electronic Notes in Theoretical Computer Science, Toronto, Canada, August 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.07.077.
BibTex | DOI | Web page ]
[EF09]
E. Encrenaz and A. Finkel. Automatic verification of counter systems with ranking functions. In Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science, pages 85--103. Elsevier Science Publishers, July 2009.
doi: 10.1016/j.entcs.2009.05.032.
BibTex | DOI | Web page | PS | PDF ]
[DKR09]
S. Delaune, S. Kremer, and M. D. Ryan. Verifying Privacy-type Properties of Electronic Voting Protocols. Journal of Computer Security, 17(4):435--487, July 2009.
doi: 10.3233/JCS-2009-0340.
BibTex | DOI | Web page | PS | PDF ]
[BFS09b]
F. Bouchy, A. Finkel, and A. Sangnier. Reachability in Timed Counter Systems. In Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science, pages 167--178. Elsevier Science Publishers, July 2009.
doi: 10.1016/j.entcs.2009.05.038.
BibTex | DOI | Web page | PDF ]
[HV09a]
P. Habermehl and T. Vojnar, editors. Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science. Elsevier Science Publishers, July 2009.
doi: 10.1016/j.entcs.2009.05.026.
BibTex | DOI ]
[And09a]
É. André. Everything You Always Wanted to Know About IMITATOR (But Were Afraid to Ask). Research Report LSV-09-20, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 11 pages.
BibTex | Web page | PDF ]
[AF09b]
C. Areces and D. Figueira. Which Semantics for Neighbourhood Semantics? In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI'09), pages 671--676, Pasadena, California, USA, July 2009. AAAI Press.
BibTex | Web page | PS | PDF ]
[BHS09]
B. Bérard, S. Haddad, and M. Sassolas. Verification on Interrupt Timed Automata. Research Report LSV-09-16, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 16 pages.
BibTex | Web page | PDF ]
[HN09]
P.-C. Héam and C. Nicaud. Seed: an Easy-to-Use Random Generator of Recursive Data Structures for Testing. Research Report LSV-09-15, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 16 pages.
BibTex | Web page | PDF ]
[CDK09b]
S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pages 47--58, Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PDF ]
[ACD09b]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocol. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pages 33--46, Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PS | PDF ]
[KMT09b]
S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence (Preliminary Version). In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PS | PDF ]
[AFGM09]
C. Areces, D. Figueira, D. Gorín, and S. Mera. Tableaux and Model Checking for Memory Logics. In Proceedings of the 18th International Workshop on Theorem Proving with Analytic Tableaux and Related Methods (TABLEAUX'09), volume 5607 of Lecture Notes in Artificial Intelligence, pages 47--61, Oslo, Norway, July 2009. Springer.
doi: 10.1007/978-3-642-02716-1_5.
BibTex | DOI | Web page | PS | PDF ]
[CHK09]
R. Courbis, P.-C. Héam, and O. Kouchnarenko. TAGED Approximations for Veriying Temporal Patterns. In Proceedings of the 14th International Conference on Implementation and Application of Automata (CIAA'09), volume 5642 of Lecture Notes in Computer Science, pages 135--144, Sydney, Australia, July 2009. Springer-Verlag.
doi: 10.1007/978-3-642-02979-0_17.
BibTex | DOI | Web page | PDF ]
[HNS09]
P.-C. Héam, C. Nicaud, and S. Schmitz. Random Generation of Deterministic Tree (Walking) Automata. In Proceedings of the 14th International Conference on Implementation and Application of Automata (CIAA'09), volume 5642 of Lecture Notes in Computer Science, pages 115--124, Sydney, Australia, July 2009. Springer-Verlag.
doi: 10.1007/978-3-642-02979-0_15.
BibTex | DOI | Web page | PDF ]
[PS09]
Th. Place and L. Segoufin. A decidable characterization of Locally Testable Tree Languages. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 285--296, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_24.
BibTex | DOI | Web page | PDF ]
[FG09b]
A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part II: Complete WSTS. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 188--199, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_16.
BibTex | DOI | Web page | PDF ]
[BBBB09]
C. Baier, N. Bertrand, P. Bouyer, and Th. Brihaye. When are Timed Automata Determinizable? In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 43--54, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_4.
BibTex | DOI | Web page | PDF ]
[BF09]
P. Bouyer and V. Forejt. Reachability in Stochastic Timed Games. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 103--114, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_9.
BibTex | DOI | Web page | PDF ]
[CD09a]
V. Cortier and S. Delaune. A method for proving observational equivalence. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), pages 266--276, Port Jefferson, New York, USA, July 2009. IEEE Computer Society Press.
doi: 10.1109/CSF.2009.9.
BibTex | DOI | Web page | PDF ]
[BHKL09]
B. Bollig, P. Habermehl, C. Kern, and M. Leucker. Angluin-Style Learning of NFA. In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI'09), pages 1004--1009, Pasadena, California, USA, July 2009. AAAI Press.
BibTex | Web page | PDF ]
[Ste09a]
G. Steel. Computational Soundness for APIs. In Proceedings of the 5th Workshop on Formal and Computational Cryptography (FCC'09), Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PDF ]
[LS09]
L. Libkin and C. Sirangelo. Open and closed world assumptions in data exchange. In Proceedings of the 22nd International Workshop Description Logic (DL'09), volume 477 of CEUR Workshop Proceedings, pages 1--6, Oxford, UK, July 2009. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[BYBJ09]
N. Ben Youssef, A. Bouhoula, and F. Jacquemard. Automatic Verification of Conformance of Firewall Configurations to Security Policies. In Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pages 526 -- 531, Sousse, Tunisia, July 2009. IEEE Computer Society Press.
doi: 10.1109/ISCC.2009.5202309.
BibTex | DOI | Web page | PDF ]
[LVN09]
F. Laroussinie, F. Vaandrager, and M. Neuhäußer. Extended timed automata for scheduling. Deliverable QUASIMODO 3.5 (ICT-FP7-STREP-214755), July 2009.
BibTex ]
[MBD+09]
N. Markey, J. Berendsen, A. David, T. Han, H. Hermanns, K. G. Larsen, and M. Neuhäußer. Symbolic data structures and analysis of models with multiple quantitative aspects. Deliverable QUASIMODO 2.2 (ICT-FP7-STREP-214755), July 2009.
BibTex ]
[ABGM09]
S. Abiteboul, P. Bourhis, A. Galland, and B. Marinoiu. The AXML Artifact Model. In Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME'09), pages 11--17, Brixen-Bressanone, Italy, July 2009. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[AP09]
S. Abiteboul and N. Polyzotis. Searching Shared Content in Communities with the Data Ring. IEEE Data Engineering Bulletin, 32(2):44--51, June 2009.
BibTex | DOI | Web page | PDF ]
[AEF09]
É. André, E. Encrenaz, and L. Fribourg. Synthesizing Parametric Constraints on Various Case Studies Using IMITATOR. Research Report LSV-09-13, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2009. 18 pages.
BibTex | Web page | PDF ]
[ABC09]
M. Abadi, B. Blanchet, and H. Comon-Lundh. Models and Proofs of Protocol Security: A Progress Report. In Proceedings of the 21st International Conference on Computer Aided Verification (CAV'09), volume 5643 of Lecture Notes in Computer Science, pages 35--49, Grenoble, France, June-July 2009. Springer.
doi: 10.1007/978-3-642-02658-4_5.
BibTex | DOI | Web page | PDF ]
[BRBH09]
A. Bouillard, S. Rosario, A. Benveniste, and S. Haar. Monotonicity in Service Orchestrations. In Proceedings of the 30th International Conference on Applications and Theory of Petri Nets (PETRI NETS'09), volume 5606 of Lecture Notes in Computer Science, pages 263--282, Paris, France, June 2009. Springer.
doi: 10.1007/978-3-642-02424-5_16.
BibTex | DOI | Web page | PDF ]
[HKP+09]
S. Haddad, F. Kordon, L. Petrucci, J.-F. Pradat-Peyre, and N. Trèves. Efficient State-Based Analysis by Introducing Bags in Petri Nets Color Domains. In Proceedings of the 28th American Control Conference (ACC'09), pages 5018--5025, Saint Louis, Missouri, USA, June 2009.
doi: 10.1109/ACC.2009.5160020.
BibTex | DOI | Web page | PDF ]
[BG09]
B. Bollig and P. Gastin. Weighted versus Probabilistic Logics. In Proceedings of the 13th International Conference on Developments in Language Theory (DLT'09), volume 5583 of Lecture Notes in Computer Science, pages 18--38, Stuttgart, Germany, June-July 2009. Springer.
doi: 10.1007/978-3-642-02737-6_2.
BibTex | DOI | Web page | PDF ]
[AGM09]
S. Abiteboul, G. Gottlob, and M. Manna. Distributed XML Design. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 247--258, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559833.
BibTex | DOI | Web page | PDF ]
[ABM09b]
S. Abiteboul, P. Bourhis, and B. Marinoiu. Satisfiability and relevance for queries over active documents. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 87--96, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559810.
BibTex | DOI | Web page | PDF ]
[BLPS09]
P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo. XML with Incomplete Information: Models, Properties, and Query Answering. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 237--246, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559832.
BibTex | DOI | Web page | PDF ]
[Fig09]
D. Figueira. Satisfiability of Downward XPath with Data Equality Tests. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 197--206, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559827.
BibTex | DOI | Web page | PS | PDF ]
[CDK09a]
R. Chadha, S. Delaune, and S. Kremer. Epistemic Logic for the Applied Pi Calculus. In Proceedings of IFIP International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE'09), volume 5522 of Lecture Notes in Computer Science, pages 182--197, Lisbon, Portugal, June 2009. Springer.
doi: 10.1007/978-3-642-02138-1_12.
BibTex | DOI | Web page | PS | PDF ]
[BC09a]
S. Bursuc and H. Comon-Lundh. Protocol security and algebraic properties: decision results for a bounded number of sessions. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 133--147, Brasília, Brazil, June-July 2009. Springer.
doi: 10.1007/978-3-642-02348-4_10.
BibTex | DOI | Web page | PDF ]
[GJ09]
G. Godoy and F. Jacquemard. Unique Normalization for Shallow TRS. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 63--77, Brasília, Brazil, June-July 2009. Springer.
doi: 10.1007/978-3-642-02348-4_5.
BibTex | DOI | Web page | PDF ]
[BCD09a]
M. Baudet, V. Cortier, and S. Delaune. YAPA: A generic tool for computing intruder knowledge. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 148--163, Brasília, Brazil, June-July 2009. Springer.
doi: 10.1007/978-3-642-02348-4_11.
BibTex | DOI | Web page | PDF ]
[GSZ09]
P. Gastin, N. Sznajder, and M. Zeitoun. Distributed synthesis for well-connected architectures. Formal Methods in System Design, 34(3):215--237, June 2009.
doi: 10.1007/s10703-008-0064-7.
BibTex | DOI | Web page | PDF ]
[BFCH09]
M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and S. Haddad. Parametric NdRFT for the derivation of optimal repair strategies. In Proceedings of the 39th Annual IEEEashIFIP International Conference on Dependable Systems and Networks (DSN'09), pages 399--408, Estoril, Portugal, June-July 2009. IEEE Computer Society Press.
doi: 10.1109/DSN.2009.5270312.
BibTex | DOI | Web page | PDF ]
[AC09]
R. Affeldt and H. Comon-Lundh. Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. In Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, pages 1--20. Springer, May 2009.
doi: 10.1007/978-3-642-02002-5_1.
BibTex | DOI | Web page | PDF ]
[Gou09b]
J. Goubault-Larrecq. On a Generalization of a Result by Valk and Jantzen. Research Report LSV-09-09, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2009. 18 pages.
BibTex | Web page | PDF ]
[BMSS09]
M. Bojańczyk, A. Muscholl, Th. Schwentick, and L. Segoufin. Two-variable logic on data trees and applications to XML reasoning. Journal of the ACM, 56(3), May 2009.
doi: 10.1145/1516512.1516515.
BibTex | DOI | Web page | PDF ]
[GGJ09]
A. Gascón, G. Godoy, and F. Jacquemard. Closure of Tree Automata Languages under Innermost Rewriting. In Proceedings of the 8th International Workshop on Reduction Strategies in Rewriting and Programming (WRS'08), volume 237 of Electronic Notes in Theoretical Computer Science, pages 23--38, Castle of Hagenberg, Austria, April 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.03.033.
BibTex | DOI | Web page | PDF ]
[Bur09b]
E. Bursztein. Extending Anticipation Games with Location, Penalty and Timeline. In Revised Selected Papers of the 5th International Workshop on Formal Aspects in Security and Trust (FAST'08), volume 5491 of Lecture Notes in Computer Science, pages 272--286, Malaga, Spain, April 2009. Springer.
doi: 10.1007/978-3-642-01465-9_18.
BibTex | DOI | Web page | PDF ]
[DL09]
S. Demri and R. Lazić. LTL with the freeze quantifier and register automata. ACM Transactions on Computational Logic, 10(3), April 2009.
doi: 10.1145/1507244.1507246.
BibTex | DOI | Web page | PDF ]
[EFSH09]
A. El Fallah Seghrouchni and S. Haddad. Interopérabilité des systèmes multi-agents à l'aide des services web. In Technologies des systèmes multi-agents et applications industrielles, chapter 3, pages 77--99. Hermès, April 2009.
BibTex | Web page ]
[JKV09]
F. Jacquemard, F. Klay, and C. Vacher. Rigid Tree Automata. In Proceedings of the 3rd International Conference on Language and Automata Theory and Applications (LATA'09), volume 5457 of Lecture Notes in Computer Science, pages 446--457, Tarragona, Spain, April 2009. Springer.
doi: 10.1007/978-3-642-00982-2_38.
BibTex | DOI | Web page | PDF ]
[BCK09]
M. Baudet, V. Cortier, and S. Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Information and Computation, 207(4):496--520, April 2009.
doi: 10.1016/j.ic.2008.12.005.
BibTex | DOI | Web page | PDF ]
[Bou09c]
P. Bouyer. Model-Checking Timed Temporal Logics. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science, pages 323--341, Cachan, France, March 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.02.044.
BibTex | DOI | Web page | PDF ]
[AD09]
C. Areces and S. Demri, editors. Proceedings of the 5th International Workshop on Methods for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science, Cachan, France, March 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.02.025.
BibTex | DOI | Web page ]
[ABM09a]
S. Abiteboul, P. Bourhis, and B. Marinoiu. Efficient maintenance techniques for views over active documents. In Advances in Database Technology --- Proceedings of the 12th International Conference on Extending Database Technology (EDBT'09), ACM International Conference Proceeding Series, pages 1076--1087, Saint Petersburg, Russia, March 2009. Springer.
doi: 10.1145/1516360.1516483.
BibTex | DOI | Web page | PDF ]
[AGMP09]
S. Abiteboul, O. Greenshpan, T. Milo, and N. Polyzotis. MatchUp: Autocompletion for Mashups. In Proceedings of the 25th International Conference on Data Engineering (ICDE'09), pages 1479--1482, Shanghai, China, March-April 2009. IEEE Computer Society Press.
doi: 10.1109/ICDE.2009.47.
BibTex | DOI | Web page | PDF ]
[CGM+09]
Th. Chatain, P. Gastin, A. Muscholl, N. Sznajder, I. Walukiewicz, and M. Zeitoun. Distributed control for restricted specifications. Deliverable DOTS 2.2 (ANR-06-SETI-003), March 2009.
BibTex ]
[BLLM09]
P. Bouyer, F. Laroussinie, D. Lime, and N. Markey. Synthesis of timed controllers. Deliverable DOTS 1.2a (ANR-06-SETI-003), March 2009.
BibTex ]
[DHS09]
S. Donatelli, S. Haddad, and J. Sproston. Model Checking Timed and Stochastic Properties with CSLTA. IEEE Transactions on Software Engineering, 35(2):224--240, March-April 2009.
doi: 10.1109/TSE.2008.108.
BibTex | DOI | Web page | PDF ]
[BCD+09b]
D. Berwanger, K. Chatterjee, M. De Wulf, L. Doyen, and Th. A. Henzinger. Alpaga: A Tool for Solving Parity Games with Imperfect Information. In Proceedings of the 15th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'09), volume 5505 of Lecture Notes in Computer Science, pages 58--61, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00768-2_7.
BibTex | DOI | Web page | PDF ]
[BBL09]
K. Bansal, R. Brochenin, and É. Lozes. Beyond Shapes: Lists with Ordered Data. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 425--439, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00596-1_30.
BibTex | DOI | Web page | PDF ]
[BH09]
B. Bérard and S. Haddad. Interrupt Timed Automata. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 197--211, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00596-1_15.
BibTex | DOI | Web page | PDF ]
[BGH09]
B. Bollig, M.-L. Grindei, and P. Habermehl. Realizability of Concurrent Recursive Programs. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 410--424, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00596-1_29.
BibTex | DOI | Web page | PDF ]
[BS09b]
M. Benedikt and L. Segoufin. Towards a Characterization of Order-Invariant Queries over Tame Structures. Journal of Symbolic Logic, 74(1):168--186, March 2009.
doi: 10.2178/jsl/1231082307.
BibTex | DOI | Web page | PDF ]
[CEFX09]
R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata. Formal Methods in System Design, 34(1):59--81, February 2009.
doi: 10.1007/s10703-008-0061-x.
BibTex | DOI | Web page | PS | PDF ]
[CD09b]
V. Cortier and S. Delaune. Safely Composing Security Protocols. Formal Methods in System Design, 34(1):1--36, February 2009.
doi: 10.1007/s10703-008-0059-4.
BibTex | DOI | Web page | PS | PDF ]
[BC09b]
S. Bursuc and H. Comon-Lundh. Protocols, insecurity decision and combination of equational theories. Research Report LSV-09-02, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2009. 43 pages.
BibTex | Web page | PDF ]
[FG09a]
A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part I: Completions. In Proceedings of the 26th Annual Symposium on Theoretical Aspects of Computer Science (STACS'09), volume 3 of Leibniz International Proceedings in Informatics, pages 433--444, Freiburg, Germany, February 2009. Leibniz-Zentrum für Informatik.
BibTex | Web page | PDF ]
[DG09c]
M. Droste and P. Gastin. Weighted automata and weighted logics. In Handbook of Weighted Automata, EATCS Monographs in Theoretical Computer Science, chapter 5, pages 175--211. Springer, 2009.
BibTex | Web page | PDF ]
[DG09b]
V. Diekert and P. Gastin. Local safety and local liveness for distributed systems. In Perspectives in Concurrency Theory, IARCS-Universities, pages 86--106. Universities Press, January 2009.
BibTex | Web page | PDF ]
[HI09]
S. Haddad and J.-M. Ilié. Symmetry and Temporal Logic. In Petri Nets: Fundamental Models, Verification and Applications, pages 435--460. Wiley-ISTE, 2009.
BibTex | Web page ]
[HV09c]
S. Haddad and F. Vernadat. Verification of Specific Properties. In Petri Nets: Fundamental Models, Verification and Applications, pages 349--414. Wiley-ISTE, 2009.
BibTex | Web page ]
[HM09c]
S. Haddad and P. Moreaux. Tensor Methods and Stochastic Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 321--346. Wiley-ISTE, 2009.
BibTex | Web page ]
[HM09b]
S. Haddad and P. Moreaux. Stochastic Well-formed Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 303--320. Wiley-ISTE, 2009.
BibTex | Web page ]
[HM09a]
S. Haddad and P. Moreaux. Stochastic Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 269--302. Wiley-ISTE, 2009.
BibTex | Web page ]
[Had09]
S. Haddad. Decidability and Complexity of Petri Net Problems. In Petri Nets: Fundamental Models, Verification and Applications, pages 87--122. Wiley-ISTE, 2009.
BibTex | Web page ]
[HV09b]
S. Haddad and F. Vernadat. Analysis Methods for Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 41--86. Wiley-ISTE, 2009.
BibTex | Web page ]
[BHR09b]
P. Bouyer, S. Haddad, and P.-A. Reynier. Undecidability Results for Timed Automata with Silent Transitions. Fundamenta Informaticae, 92(1-2):1--25, 2009.
BibTex | Web page | PS | PDF ]
[BKL+09]
P. Bouyer, J.-P. Katoen, R. Langerak, F. Laroussinie, N. Markey, and J.-F. Raskin. Transfer of correctness from models to implementation. Deliverable QUASIMODO 3.1 (ICT-FP7-STREP-214755), January 2009.
BibTex ]
[Bou09b]
P. Bouyer. From Qualitative to Quantitative Analysis of Timed Systems. Mémoire d'habilitation, Université Paris 7, Paris, France, January 2009.
BibTex | Web page | PDF ]
[GMNK09]
P. Gastin, M. Mukund, and K. Narayan Kumar. Reachability and boundedness in time-constrained MSC graphs. In Perspectives in Concurrency Theory, IARCS-Universities, pages 157--183. Universities Press, January 2009.
BibTex | Web page | PDF ]
[BP09]
P. Bouyer and A. Petit. On extensions of timed automata. In Perspectives in Concurrency Theory, IARCS-Universities, pages 35--63. Universities Press, January 2009.
BibTex ]
[CGS09]
Th. Chatain, P. Gastin, and N. Sznajder. Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems. In Proceedings of the 35th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'09), volume 5404 of Lecture Notes in Computer Science, pages 141--152, Špindlerův Mlýn, Czech Republic, January 2009. Springer.
doi: 10.1007/978-3-540-95891-8_16.
BibTex | DOI | Web page | PDF ]
[BDLM09]
Th. Brihaye, A. Da Costa, F. Laroussinie, and N. Markey. ATL with Strategy Contexts and Bounded Memory. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'09), volume 5407 of Lecture Notes in Computer Science, pages 92--106, Deerfield Beach, Florida, USA, January 2009. Springer.
doi: 10.1007/978-3-540-92687-0_7.
BibTex | DOI | Web page | PDF ]
[Com08a]
H. Comon-Lundh. About models of security protocols. In Proceedings of the 28th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'08), volume 2 of Leibniz International Proceedings in Informatics, Bangalore, India, December 2008. Leibniz-Zentrum für Informatik.
BibTex | Web page | PDF ]
[Ore08]
G. Oreiby. Logiques temporelles pour le contrôle temporisé. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2008.
BibTex | Web page | PDF ]
[GLN08]
J. Goubault-Larrecq, S. Lasota, and D. Nowak. Logical Relations for Monadic Types. Mathematical Structures in Computer Science, 18(6):1169--1217, December 2008. 81 pages.
doi: 10.1017/S0960129508007172.
BibTex | DOI | Web page | PDF ]
[Bol08]
B. Bollig. On the Expressive Power of 2-Stack Visibly Pushdown Automata. Logical Methods in Computer Science, 4(4:16), December 2008.
doi: 10.2168/LMCS-4(4:16)2008.
BibTex | DOI | Web page | PS | PDF ]
[DG08a]
S. Demri and R. Gascon. Verification of Qualitative Z constraints. Theoretical Computer Science, 409(1):24--40, December 2008.
doi: 10.1016/j.tcs.2008.07.023.
BibTex | DOI | Web page | PDF ]
[DDMR08]
M. De Wulf, L. Doyen, N. Markey, and J.-F. Raskin. Robust Safety of Timed Automata. Formal Methods in System Design, 33(1-3):45--84, December 2008.
doi: 10.1007/s10703-008-0056-7.
BibTex | DOI | Web page | PDF ]
[ACEF08]
É. André, Th. Chatain, E. Encrenaz, and L. Fribourg. An Inverse Method for Parametric Timed Automata. In Proceedings of the 2nd Workshop on Reachability Problems in Computational Models (RP'08), volume 223 of Electronic Notes in Theoretical Computer Science, pages 29--46, Liverpool, UK, December 2008. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2008.12.029.
BibTex | DOI | Web page | PDF ]
[Bur08a]
E. Bursztein. Anticipation games. Théorie des jeux appliqués à la sécurité réseau. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2008.
BibTex | Web page | PDF ]
[San08]
A. Sangnier. Vérification de systèmes avec compteurs et pointeurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2008.
BibTex | Web page | PS | PDF ]
[Ara08]
M. Arapinis. Sécurité des protocoles cryptographiques : décidabilité et résultats de réduction. Thèse de doctorat, Université Paris 12, Créteil, France, November 2008.
BibTex | Web page | PDF ]
[ADK08]
M. Arapinis, S. Delaune, and S. Kremer. From One Session to Many: Dynamic Tags for Security Protocols. In Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), volume 5330 of Lecture Notes in Artificial Intelligence, pages 128--142, Doha, Qatar, November 2008. Springer.
doi: 10.1007/978-3-540-89439-1_9.
BibTex | DOI | Web page | PDF ]
[AGM08]
S. Abiteboul, O. Greenshpan, and T. Milo. Modeling the mashup space. In Proceedings of the 10th ACM International Workshop on Web Information and Data Management (WIDM'08), pages 87--94, Napa Valley, California, USA, October 2008. ACM Press.
doi: 10.1145/1458502.1458517.
BibTex | DOI | Web page | PDF ]
[DH08]
S. Donatelli and S. Haddad. Vérification quantitative de chaînes de Markov. In Approches formelles des systèmes embarqués communicants, chapter 6, pages 177--198. Hermès, October 2008.
BibTex | Web page ]
[CM08]
F. Cassez and N. Markey. Contrôle des systèmes temporisés. In Approches formelles des systèmes embarqués communicants, chapter 4, pages 105--144. Hermès, October 2008.
BibTex | Web page ]
[CC08]
H. Comon-Lundh and V. Cortier. Computational Soundness of Observational Equivalence. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), pages 109--118, Alexandria, Virginia, USA, October 2008. ACM Press.
doi: 10.1145/1455770.1455786.
BibTex | DOI | Web page | PDF ]
[BCFH08]
M. Beccuti, D. Codetta-Raiteri, G. Franceschinis, and S. Haddad. Non Deterministic Repairable Fault Trees for Computing Optimal Repair Strategy. In Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'08), Athens, Greece, October 2008. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
doi: 10.4108/ICST.VALUETOOLS2008.4411.
BibTex | DOI | Web page | PDF ]
[Bur08c]
E. Bursztein. NetQi: A Model Checker for Anticipation Game. In Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis (ATVA'08), volume 5311 of Lecture Notes in Computer Science, pages 246--251, Seoul, Korea, October 2008. Springer.
doi: 10.1007/978-3-540-88387-6_22.
BibTex | DOI | Web page | PDF ]
[BFLP08]
S. Bardin, A. Finkel, J. Leroux, and L. Petrucci. FAST: Acceleration from theory to practice. International Journal on Software Tools for Technology Transfer, 10(5):401--424, October 2008.
doi: 10.1007/s10009-008-0064-3.
BibTex | DOI | Web page ]
[RBHJ08]
S. Rosario, A. Benveniste, S. Haar, and C. Jard. Probabilistic QoS and Soft Contracts for Transaction-Based Web Services Orchestrations. IEEE Transactions on Services Computing, 1(4):187--200, October-December 2008.
doi: 10.1109/TSC.2008.17.
BibTex | DOI | Web page | PDF ]
[BHK08]
Y. Boichut, P.-C. Héam, and O. Kouchnarenko. Approximation-based Tree Regular Model-Checking. Nordic Journal of Computing, 14(3):216--241, October 2008.
BibTex | Web page | PDF ]
[Cio08]
S. Ciobâcă. Verification of anonymity properties in e-voting protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2008.
BibTex | Web page | PDF ]
[L+08b]
F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 18 mois, September 2008. 5 pages.
BibTex ]
[CLLM08]
F. Cassez, F. Laroussinie, D. Lime, and N. Markey. Quantitative Objectives in Timed Games. Deliverable DOTS 1.1 (ANR-06-SETI-003), September 2008.
BibTex ]
[BBC+08]
B. Bollig, P. Bouyer, F. Cassez, Th. Chatain, P. Gastin, S. Haddad, and C. Jard. Model for distributed timed systems. Deliverable DOTS 3.1 (ANR-06-SETI-003), September 2008.
BibTex ]
[BBJ+08]
P. Bouyer, Th. Brihaye, M. Jurdziński, R. Lazić, and M. Rutkowski. Average-Price and Reachability-Price Games on Hybrid Automata with Strong Resets. In Proceedings of the 6th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215 of Lecture Notes in Computer Science, pages 63--77, Saint-Malo, France, September 2008. Springer.
doi: 10.1007/978-3-540-85778-5_6.
BibTex | DOI | Web page | PDF ]
[BFL+08b]
P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and J. Srba. Infinite Runs in Weighted Timed Automata with Energy Constraints. In Proceedings of the 6th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215 of Lecture Notes in Computer Science, pages 33--47, Saint-Malo, France, September 2008. Springer.
doi: 10.1007/978-3-540-85778-5_4.
BibTex | DOI | Web page | PDF ]
[ABH08]
M. F. Atig, B. Bollig, and P. Habermehl. Emptiness of multi-pushdown automata is 2ETIME-complete. In Proceedings of the 12th International Conference on Developments in Language Theory (DLT'08), volume 5257 of Lecture Notes in Computer Science, pages 121--133, Kyoto, Japan, September 2008. Springer.
doi: 10.1007/978-3-540-85780-8_9.
BibTex | DOI | Web page | PDF ]
[CDF+08]
N. Chamseddine, M. Duflot, L. Fribourg, C. Picaronny, and J. Sproston. Computing Expected Absorption Times for Parametric Determinate Probabilistic Timed Automata. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08), pages 254--263, Saint Malo, France, September 2008. IEEE Computer Society Press.
doi: 10.1109/QEST.2008.34.
BibTex | DOI | Web page | PDF ]
[Pla08]
Th. Place. Characterization of Logics Over Ranked Tree Languages. In Proceedings of the 17th Annual EACSL Conference on Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in Computer Science, pages 401--415, Bertinoro, Italy, September 2008. Springer.
doi: 10.1007/978-3-540-87531-4_29.
BibTex | DOI | Web page | PDF ]
[BDL08]
R. Brochenin, S. Demri, and É. Lozes. On the Almighty Wand. In Proceedings of the 17th Annual EACSL Conference on Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in Computer Science, pages 323--338, Bertinoro, Italy, September 2008. Springer.
doi: 10.1007/978-3-540-87531-4_24.
BibTex | DOI | Web page | PDF ]
[BBBM08]
N. Bertrand, P. Bouyer, Th. Brihaye, and N. Markey. Quantitative Model-Checking of One-Clock Timed Automata under Probabilistic Semantics. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08), pages 55--64, Saint Malo, France, September 2008. IEEE Computer Society Press.
doi: 10.1109/QEST.2008.19.
BibTex | DOI | Web page | PDF ]
[BCH+08]
B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H. Roux. When are Timed Automata Weakly Timed Bisimilar to Time Petri Nets? Theoretical Computer Science, 403(2-3):202--220, September 2008.
doi: 10.1016/j.tcs.2008.03.030.
BibTex | DOI | Web page | PDF ]
[BK08]
B. Bollig and D. Kuske. Muller Message-Passing Automata and Logics. Information and Computation, 206(9-10):1084--1094, September-October 2008.
doi: 10.1016/j.ic.2008.03.010.
BibTex | DOI | Web page | PS | PDF ]
[LHS08]
É. Lozes, D. Hirschkoff, and D. Sangiorgi. Separability in the Ambient Logic. Logical Methods in Computer Science, 4(3:4), September 2008.
doi: 10.2168/LMCS-4(3:4)2008.
BibTex | DOI | Web page | PS | PDF ]
[AAC+08]
S. Abiteboul, T. Allard, Ph. Chatalic, G. Gardarin, A. Ghitescu, F. Goasdoué, I. Manolescu, B. Nguyen, M. Ouazara, A. Somani, N. Travers, G. Vasile, and S. Zoupanos. WebContent: efficient P2P warehousing of web data. In Proceedings of the 34th International Conference on Very Large Data Bases (VLDB'08), volume 1 of Proceedings of the VLDB Endowment, pages 1428--1431, Auckland, New Zealand, August 2008. ACM Press.
BibTex | Web page | PDF ]
[ABM08]
S. Abiteboul, O. Benjelloun, and T. Milo. The Active XML project: an overview. The VLDB Journal, 17(5):1019--1040, August 2008.
doi: 10.1007/s00778-007-0049-y.
BibTex | DOI | Web page | PDF ]
[Mar08]
N. Markey. Infinite Runs In Weighted Times Games with Energy Constraints. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008.
BibTex ]
[Bou08b]
P. Bouyer. Probabilities in Timed Automata. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008.
BibTex ]
[Sch08]
Ph. Schnoebelen. The complexity of lossy channel systems. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008.
BibTex ]
[Com08b]
H. Comon-Lundh. Challenges in the Automated Verification of Security Protocols. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 396--409, Sydney, Australia, August 2008. Springer-Verlag.
doi: 10.1007/978-3-540-71070-7_34.
BibTex | DOI | Web page | PDF ]
[CS08a]
P. Chambart and Ph. Schnoebelen. Mixing Lossy and Perfect Fifo Channels. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 340--355, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_28.
BibTex | DOI | Web page | PS | PDF ]
[BCHK08]
P. Baldan, Th. Chatain, S. Haar, and B. König. Unfolding-based Diagnosis of Systems with an Evolving Topology. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 203--217, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_19.
BibTex | DOI | Web page | PDF ]
[BKKL08]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Smyle: A Tool for Synthesizing Distributed Models from Scenarios by Learning. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 162--166, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_15.
BibTex | DOI | Web page | PDF ]
[LV08]
É. Lozes and J. Villard. A Spatial Equational Logic for the Applied π-Calculus. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 387--401, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_31.
BibTex | DOI | Web page | PDF ]
[ABG+08]
S. Akshay, B. Bollig, P. Gastin, M. Mukund, and K. Narayan Kumar. Distributed Timed Automata with Independently Evolving Clocks. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 82--97, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_10.
BibTex | DOI | Web page | PDF ]
[FS08]
A. Finkel and A. Sangnier. Reversal-bounded Counter Machines Revisited. In Proceedings of the 33rd International Symposium on Mathematical Foundations of Computer Science (MFCS'08), volume 5162 of Lecture Notes in Computer Science, pages 323--334, Toruń, Poland, August 2008. Springer.
doi: 10.1007/978-3-540-85238-4_26.
BibTex | DOI | Web page | PS | PDF ]
[BJ08]
A. Bouhoula and F. Jacquemard. Automated Induction with Constrained Tree Automata. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 539--553, Sydney, Australia, August 2008. Springer-Verlag.
doi: 10.1007/978-3-540-71070-7_44.
BibTex | DOI | Web page | PDF ]
[KMT08]
S. Kremer, A. Mercier, and R. Treinen. Proving Group Protocols Secure Against Eavesdroppers. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 116--131, Sydney, Australia, August 2008. Springer-Verlag.
doi: 10.1007/978-3-540-71070-7_9.
BibTex | DOI | Web page | PDF ]
[AMZ08b]
S. Abiteboul, I. Manolescu, and S. Zoupanos. OptimAX: Optimizing Distributed ActiveXML Applications. In Proceedings of the 8th International Conference on Web Engineering (ICWE'08), pages 299--310, Yorktown Heights, New York, USA, July 2008. IEEE Computer Society Press.
doi: 10.1109/ICWE.2008.11.
BibTex | DOI | Web page | PDF ]
[JR08]
F. Jacquemard and M. Rusinowitch. Closure of Hedge-Automata Languages by Hedge Rewriting. In Proceedings of the 19th International Conference on Rewriting Techniques and Applications (RTA'08), volume 5117 of Lecture Notes in Computer Science, pages 157--171, Hagenberg, Austria, July 2008. Springer.
doi: 10.1007/978-3-540-70590-1_11.
BibTex | DOI | Web page | PDF ]
[BHH+08b]
A. Bouajjani, P. Habermehl, L. Holík, T. Touili, and T. Vojnar. Antichain-based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata. In Proceedings of the 13th International Conference on Implementation and Application of Automata (CIAA'08), volume 5148 of Lecture Notes in Computer Science, pages 57--67, San Francisco, California, USA, July 2008. Springer-Verlag.
doi: 10.1007/978-3-540-70844-5_7.
BibTex | DOI | Web page | PDF ]
[AFFM08]
C. Areces, D. Figueira, S. Figueira, and S. Mera. Expressive Power and Decidability for Memory Logics. In Proceedings of the 15th Workshop on Logic, Language, Information and Computation (WoLLIC'08), volume 5110 of Lecture Notes in Computer Science, pages 56--68, Edinburgh, Scotland, UK, July 2008. Springer.
doi: 10.1007/978-3-540-69937-8_7.
BibTex | DOI | Web page | PDF ]
[BS08]
M. Bojańczyk and L. Segoufin. Tree languages defined in first-order logic with one quantifier alternation. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) -- Part II, volume 5126 of Lecture Notes in Computer Science, pages 233--245, Reykjavik, Iceland, July 2008. Springer.
doi: 10.1007/978-3-540-70583-3_20.
BibTex | DOI | Web page | PDF ]
[BMOW08]
P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. On Expressiveness and Complexity in Real-time Model Checking. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) -- Part II, volume 5126 of Lecture Notes in Computer Science, pages 124--135, Reykjavik, Iceland, July 2008. Springer.
doi: 10.1007/978-3-540-70583-3_11.
BibTex | DOI | Web page | PDF ]
[HMY08]
S. Haddad, L. Mokdad, and S. Youcef. Response Time Analysis of Composite Web Services. In Proceedings of the 6th Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP'08), pages 506--510, Graz, Austria, July 2008. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[Gou08a]
J. Goubault-Larrecq. A Cone-Theoretic Krein-Milman Theorem. Research Report LSV-08-18, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2008. 8 pages.
BibTex | Web page | PDF ]
[CJP08]
H. Comon-Lundh, F. Jacquemard, and N. Perrin. Visibly Tree Automata with Memory and Constraints. Logical Methods in Computer Science, 4(2:8), June 2008.
doi: 10.2168/LMCS-4(2:8)2008.
BibTex | DOI | Web page | PDF ]
[DJ08]
S. Demri and Ch. S. Jensen, editors. Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), Montréal, Canada, June 2008. IEEE Computer Society Press.
BibTex ]
[tCS08]
B. ten Cate and L. Segoufin. XPath, Transitive Closure Logic, and Nested Tree Walking Automata. In Proceedings of the 27th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'08), pages 251--260, Vancouver, Canada, June 2008. ACM Press.
doi: 10.1145/1376916.1376952.
BibTex | DOI | Web page | PDF ]
[ASV08]
S. Abiteboul, L. Segoufin, and V. Vianu. Static Analysis of Active XML Systems. In Proceedings of the 27th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'08), pages 221--230, Vancouver, Canada, June 2008. ACM Press.
doi: 10.1145/1376916.1376948.
BibTex | DOI | Web page | PDF ]
[BLM08]
P. Bouyer, K. G. Larsen, and N. Markey. Model Checking One-clock Priced Timed Automata. Logical Methods in Computer Science, 4(2:9), June 2008.
doi: 10.2168/LMCS-4(2:9)2008.
BibTex | DOI | Web page | PDF ]
[Gou08d]
J. Goubault-Larrecq. Towards Producing Formally Checkable Security Proofs, Automatically. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 224--238, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/CSF.2008.21.
BibTex | DOI | Web page | PDF ]
[DKR08]
S. Delaune, S. Kremer, and M. D. Ryan. Composition of Password-based Protocols. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 239--251, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/CSF.2008.6.
BibTex | DOI | Web page | PDF ]
[DKS08a]
S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 331--344, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/CSF.2008.16.
BibTex | DOI | Web page | PDF ]
[BSS08]
M. Bojańczyk, L. Segoufin, and H. Straubing. Piecewise Testable Tree Languages. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 442--451, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/LICS.2008.46.
BibTex | DOI | Web page | PDF ]
[CS08c]
P. Chambart and Ph. Schnoebelen. The Ordinal Recursive Complexity of Lossy Channel Systems. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 205--216, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/LICS.2008.47.
BibTex | DOI | Web page | PDF ]
[BBB+08]
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and M. Größer. Almost-Sure Model Checking of Infinite Paths in One-Clock Timed Automata. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 217--226, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/LICS.2008.25.
BibTex | DOI | Web page | PDF ]
[DRS08]
S. Delaune, M. D. Ryan, and B. Smyth. Automatic verification of privacy properties in the applied pi-calculus. In Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM'08), volume 263 of IFIP Conference Proceedings, pages 263--278, Trondheim, Norway, June 2008. Springer.
BibTex | Web page | PS | PDF ]
[BFL08a]
F. Bouchy, A. Finkel, and J. Leroux. Decomposition of Decidable First-Order Logics over Integers and Reals. In Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), pages 147--155, Montréal, Canada, June 2008. IEEE Computer Society Press.
doi: 10.1109/TIME.2008.22.
BibTex | DOI | Web page | PDF ]
[BGMR08]
Th. Brihaye, M. Ghannem, N. Markey, and L. Rieg. Good friends are hard to find! In Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), pages 32--40, Montréal, Canada, June 2008. IEEE Computer Society Press.
doi: 10.1109/TIME.2008.10.
BibTex | DOI | Web page | PDF ]
[DGK08]
V. Diekert, P. Gastin, and M. Kufleitner. A Survey on Small Fragments of First-Order Logic over Finite Words. International Journal of Foundations of Computer Science, 19(3):513--548, June 2008.
doi: 10.1142/S0129054108005802.
BibTex | DOI | Web page | PDF ]
[DG08c]
M. Droste and P. Gastin. On aperiodic and star-free formal power series in partially commuting variables. Theory of Computing Systems, 42(4):608--631, May 2008.
doi: 10.1007/s00224-007-9064-z.
BibTex | DOI | Web page | PS | PDF ]
[LMO08]
F. Laroussinie, N. Markey, and G. Oreiby. On the Expressiveness and Complexity of ATL. Logical Methods in Computer Science, 4(2:7), May 2008.
doi: 10.2168/LMCS-4(2:7)2008.
BibTex | DOI | Web page | PDF ]
[BHH+08a]
B. Bérard, S. Haddad, L. M. Hillah, F. Kordon, and Y. Thierry-Mieg. Collision Avoidance in Intelligent Transport Systems: Towards an Application of Control Theory. In Proceedings of the 9th Workshop on Discrete Event Systems (WODES'08), pages 346--351, Gothenburg, Sweden, May 2008.
doi: 10.1109/WODES.2008.4605970.
BibTex | DOI | Web page | PDF ]
[Bur08e]
E. Bursztein. Probabilistic Protocol Identification for Hard to Classify Protocol. In Proceedings of the 2nd International Workshop on Information Security Theory and Practices (WISTP'08), volume 5019 of Lecture Notes in Computer Science, pages 49--63, Sevilla, Spain, May 2008. Springer. Best paper award.
doi: 10.1007/978-3-540-79966-5_4.
BibTex | DOI | Web page | PDF ]
[JRV08]
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Tree automata with equality constraints modulo equational theories. Journal of Logic and Algebraic Programming, 75(2):182--208, April 2008.
doi: 10.1016/j.jlap.2007.10.006.
BibTex | DOI | Web page | PDF ]
[AMP+08]
S. Abiteboul, I. Manolescu, N. Polyzotis, N. Preda, and C. Sun. XML processing in DHT networks. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 606--615, Cancun, Mexico, April 2008. IEEE Computer Society Press.
doi: 10.1109/ICDE.2008.4497469.
BibTex | DOI | Web page | PDF ]
[AMZ08a]
S. Abiteboul, I. Manolescu, and S. Zoupanos. OptimAX: efficient support for data-intensive mash-ups. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1564--1567, Cancun, Mexico, April 2008. IEEE Computer Society Press.
doi: 10.1109/ICDE.2008.4497622.
BibTex | DOI | Web page | PDF ]
[AMB08]
S. Abiteboul, B. Marinoiu, and P. Bourhis. Distributed Monitoring of Peer-to-Peer Systems. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1572--1575, Cancun, Mexico, April 2008. IEEE Computer Society Press.
doi: 10.1109/ICDE.2008.4497624.
BibTex | DOI | Web page | PDF ]
[EF08]
E. Encrenaz and L. Fribourg. Time Separation of Events: An Inverse Method. In Proceedings of the LIX Colloquium on Emerging Trends in Concurrency Theory (LIX'06), volume 209 of Electronic Notes in Theoretical Computer Science, pages 135--148, Palaiseau, France, April 2008. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2008.04.008.
BibTex | DOI | Web page | PDF ]
[DLS08]
S. Demri, R. Lazić, and A. Sangnier. Model checking freeze LTL over one-counter automata. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 490--504, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_34.
BibTex | DOI | Web page | PS | PDF ]
[HIV08]
P. Habermehl, R. Iosif, and T. Vojnar. What else is decidable about arrays? In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 474--489, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_33.
BibTex | DOI | Web page | PDF ]
[BMR08]
P. Bouyer, N. Markey, and P.-A. Reynier. Robust Analysis of Timed Automata via Channel Machines. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 157--171, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_12.
BibTex | DOI | Web page | PS | PDF ]
[CS08b]
P. Chambart and Ph. Schnoebelen. The ω-Regular Post Embedding Problem. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 97--111, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_8.
BibTex | DOI | Web page | PS | PDF ]
[Gou08c]
J. Goubault-Larrecq. Simulation Hemi-Metrics Between Infinite-State Stochastic Games. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 50--65, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_5.
BibTex | DOI | Web page ]
[Gou08b]
J. Goubault-Larrecq. Prevision Domains and Convex Powercones. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 318--333, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_23.
BibTex | DOI | Web page ]
[L+08a]
F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 12 mois, March 2008. 6 pages.
BibTex ]
[VLT08]
J. Villard, É. Lozes, and R. Treinen. A Spatial Equational Logic for the Applied pi-calculus. Research Report LSV-08-10, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2008. 44 pages.
BibTex | Web page | PDF ]
[GO08]
J. Goubault-Larrecq and J. Olivain. A Smell of Orchids. In Proceedings of the 8th Workshop on Runtime Verification (RV'08), volume 5289 of Lecture Notes in Computer Science, pages 1--20, Budapest, Hungary, March 2008. Springer.
doi: 10.1007/978-3-540-89247-2_1.
BibTex | DOI | Web page | PDF ]
[FL08]
A. Finkel and J. Leroux. Presburger Functions are Piecewise Linear. Research Report LSV-08-08, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2008. 9 pages.
BibTex | Web page | PDF ]
[DKS08b]
S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pages 267--278, Taipei, Taiwan, March 2008.
BibTex | Web page | PDF ]
[Bou08a]
P. Bouyer. Model-Checking Timed Temporal Logics. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pages 132--142, Taipei, Taiwan, March 2008.
BibTex | Web page | PDF ]
[BMO+08]
P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen, and J. Worrell. On Termination for Faulty Channel Machines. In Proceedings of the 25th Annual Symposium on Theoretical Aspects of Computer Science (STACS'08), volume 1 of Leibniz International Proceedings in Informatics, pages 121--132, Bordeaux, France, February 2008. Leibniz-Zentrum für Informatik.
BibTex | Web page | PS | PDF ]
[DLLT08]
S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 206(2-4):312--351, February-April 2008.
doi: 10.1016/j.ic.2007.07.005.
BibTex | DOI | Web page | PDF ]
[BBL08]
P. Bouyer, E. Brinksma, and K. G. Larsen. Optimal Infinite Scheduling for Multi-Priced Timed Automata. Formal Methods in System Design, 32(1):2--23, February 2008.
doi: 10.1007/s10703-007-0043-4.
BibTex | DOI | Web page | PS | PDF ]
[Bur08d]
E. Bursztein. Network Administrator and Intruder Strategies. Research Report LSV-08-02, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2008. 23 pages.
BibTex | Web page | PDF ]
[PPS+08]
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun, and J.-P. Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking. IEEE Communications Magazine, 46(2):132--139, February 2008.
doi: 10.1109/MCOM.2008.4473095.
BibTex | DOI | Web page | PDF ]
[BC08]
V. Bernat and H. Comon-Lundh. Normal proofs in intruder theories. In Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer Science, pages 151--166, Tokyo, Japan, January 2008. Springer.
doi: 10.1007/978-3-540-77505-8_12.
BibTex | DOI | Web page | PDF ]
[LNY08]
S. Lasota, D. Nowak, and Z. Yu. On completeness of logical relations for monadic types. In Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer Science, pages 223--230, Tokyo, Japan, January 2008. Springer.
doi: 10.1007/978-3-540-77505-8_17.
BibTex | DOI | Web page | PDF ]
[Kre08]
S. Kremer. Computational soundness of equational theories (Tutorial). In Revised Selected Papers from the 3rd Symposium on Trustworthy Global Computing (TGC'07), volume 4912 of Lecture Notes in Computer Science, pages 363--382, Sophia-Antipolis, France, 2008. Springer.
doi: 10.1007/978-3-540-78663-4.
BibTex | DOI | Web page | PDF ]
[TED08]
S. Taktak, E. Encrenaz, and J.-L. Desbarbieux. A tool for automatic detection of deadlocks in wormhole networks on chip. ACM Transactions on Design Automation of Electronic Systems, 13(1), January 2008.
doi: 10.1145/1297666.1297672.
BibTex | DOI | Web page | PS | PDF ]
[BHR08]
P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. Information and Computation, 206(1):73--107, January 2008.
doi: 10.1016/j.ic.2007.10.004.
BibTex | DOI | Web page | PDF ]
[SAG08]
P. Senellart, S. Abiteboul, and R. Gilleron. Understanding the Hidden Web. ERCIM News, 72:32--33, January 2008.
BibTex | Web page ]
[CKR08]
L. Chen, S. Kremer, and M. D. Ryan, editors. Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2008.
BibTex | Web page ]
[HM08]
S. Haddad and P. Moreaux. Verification of Probabilistic Systems Methods and Tools. In Modeling and Verification of Real-Time Systems, pages 289--318. ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008.
BibTex | Web page ]
[BL08]
P. Bouyer and F. Laroussinie. Model Checking Timed Automata. In Modeling and Verification of Real-Time Systems, pages 111--140. ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008.
BibTex | Web page | PDF ]
[Bur08b]
E. Bursztein. NetAnalyzer v0.7.5, January 2008. Written in C and Perl (about 25000 lines).
BibTex ]
[DG08b]
V. Diekert and P. Gastin. First-order definable languages. In Logic and Automata: History and Perspectives, volume 2 of Texts in Logic and Games, pages 261--306. Amsterdam University Press, 2008.
BibTex | Web page | PDF ]
[BG07]
E. Bursztein and J. Goubault-Larrecq. A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. In Proceedings of the 12th Asian Computing Science Conference (ASIAN'07), volume 4846 of Lecture Notes in Computer Science, pages 212--227, Doha, Qatar, December 2007. Springer.
doi: 10.1007/978-3-540-76929-3_20.
BibTex | DOI | Web page | PDF ]
[ABG07]
S. Akshay, B. Bollig, and P. Gastin. Automata and Logics for Timed Message Sequence Charts. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 290--302, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_24.
BibTex | DOI | Web page | PS | PDF ]
[CS07]
P. Chambart and Ph. Schnoebelen. Post Embedding Problem is not Primitive Recursive, with Applications to Channel Systems. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 265--276, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_22.
BibTex | DOI | Web page | PS | PDF ]
[CDD07]
V. Cortier, J. Delaitre, and S. Delaune. Safely Composing Security Protocols. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 352--363, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_29.
BibTex | DOI | Web page | PDF ]
[BBB+07]
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and M. Größer. Probabilistic and Topological Semantics for Timed Automata. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 179--191, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_15.
BibTex | DOI | Web page | PDF ]
[BKM07]
B. Bollig, D. Kuske, and I. Meinecke. Propositional Dynamic Logic for Message-Passing Systems. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 303--315, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_25.
BibTex | DOI | Web page | PS | PDF ]
[DKR07]
S. Delaune, S. Kremer, and M. D. Ryan. Symbolic Bisimulation for the Applied Pi-Calculus. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 133--145, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_11.
BibTex | DOI | Web page | PDF ]
[BBS07]
C. Baier, N. Bertrand, and Ph. Schnoebelen. Verifying nondeterministic probabilistic channel systems against ω-regular linear-time properties. ACM Transactions on Computational Logic, 9(1), December 2007.
doi: 10.1145/1297658.1297663.
BibTex | DOI | Web page | PS | PDF ]
[Car07]
J.-L. Carré. Réécriture, confluence. Course notes, Préparation à l'agrégation, ENS Cachan, France, December 2007.
BibTex ]
[Bur07a]
E. Bursztein. NetQi v1rc1. Available at http://www.netqi.org/, December 2007. Written in C and Java (about 10000 lines).
BibTex | Web page ]
[Gas07a]
R. Gascon. Spécification et vérification de propriétés quantitatives sur des automates à contraintes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2007.
BibTex | Web page | PS | PDF ]
[GPT07]
J. Goubault-Larrecq, C. Palamidessi, and A. Troina. A Probabilistic Applied Pi-Calculus. In Proceedings of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07), volume 4807 of Lecture Notes in Computer Science, pages 175--290, Singapore, November-December 2007. Springer.
doi: 10.1007/978-3-540-76637-7_12.
BibTex | DOI | Web page | PDF ]
[GK07]
P. Gastin and D. Kuske. Uniform satisfiability in PSPACE for local temporal logics over Mazurkiewicz traces. Fundamenta Informaticae, 80(1-3):169--197, November 2007.
BibTex | Web page | PDF ]
[CDG+07]
H. Comon-Lundh, M. Dauchet, R. Gilleron, C. Löding, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. November 2007.
BibTex | Web page ]
[Gas07b]
P. Gastin. Algorithmique. Course notes, Magistère STIC, ENS Cachan, France, November 2007.
BibTex ]
[Bur07b]
E. Bursztein. Time has something to tell us about network address translation. In Proceedings of the 12th Nordic Workshop on Secure IT Systems (NordSec'07), Reykjavik, Iceland, October 2007.
BibTex | Web page | PDF ]
[JR07]
F. Jacquemard and M. Rusinowitch. Rewrite Closure of Hedge-Automata Languages. Research Report LSV-07-31, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2007. 22 pages.
BibTex | Web page | PDF ]
[HIRV07]
P. Habermehl, R. Iosif, A. Rogalewicz, and T. Vojnar. Proving Termination of Tree Manipulating Programs. In Proceedings of the 5th International Symposium on Automated Technology for Verification and Analysis (ATVA'07), volume 4762 of Lecture Notes in Computer Science, pages 145--161, Tokyo, Japan, October 2007. Springer.
doi: 10.1007/978-3-540-75596-8_12.
BibTex | DOI | Web page | PS | PDF ]
[DR07]
S. Demri and A. Rabinovich. The complexity of temporal logic with until and since over ordinals. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 531--545, Yerevan, Armenia, October 2007. Springer.
doi: 10.1007/978-3-540-75560-9_38.
BibTex | DOI | Web page | PDF ]
[DLL07]
S. Delaune, H. Lin, and Ch. Lynch. Protocol verification via rigidashflexible resolution. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 242--256, Yerevan, Armenia, October 2007. Springer.
doi: 10.1007/978-3-540-75560-9_19.
BibTex | DOI | Web page | PDF ]
[CD07]
V. Cortier and S. Delaune. Deciding Knowledge in Security Protocols for Monoidal Equational Theories. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 196--210, Yerevan, Armenia, October 2007. Springer.
doi: 10.1007/978-3-540-75560-9_16.
BibTex | DOI | Web page | PS | PDF ]
[CDP07]
F. Chevalier, D. D'Souza, and P. Prabhakar. Counter-free Input Determined Timed Automata. In Proceedings of the 5th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763 of Lecture Notes in Computer Science, pages 82--97, Salzburg, Austria, October 2007. Springer.
doi: 10.1007/978-3-540-75454-1_8.
BibTex | DOI | Web page | PS | PDF ]
[BM07b]
P. Bouyer and N. Markey. Costs are Expensive! In Proceedings of the 5th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763 of Lecture Notes in Computer Science, pages 53--68, Salzburg, Austria, October 2007. Springer.
doi: 10.1007/978-3-540-75454-1_6.
BibTex | DOI | Web page | PS | PDF ]
[Laf07d]
P. Lafourcade. Rapport final d'activité à 11 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, October 2007. 6 pages.
BibTex | Web page | PS ]
[BGP07]
B. Bérard, P. Gastin, and A. Petit. Timed substitutions for regular signal-event languages. Formal Methods in System Design, 31(2):101--134, October 2007.
doi: 10.1007/s10703-007-0034-5.
BibTex | DOI | Web page | PDF ]
[BBBR07]
P. Bouyer, Th. Brihaye, V. Bruyère, and J.-F. Raskin. On the optimal reachability problem on weighted timed automata. Formal Methods in System Design, 31(2):135--175, October 2007.
doi: 10.1007/s10703-007-0035-4.
BibTex | DOI | Web page | PS | PDF ]
[Pro07]
A. ProNoBis. ProNoBis: Probability and Nondeterminism, Bisimulations and Security -- Rapport Final, October 2007.
BibTex | Web page | PDF ]
[GL07]
J. Goubault-Larrecq. Pronobis: Probability and nondeterminism, bisimulations and security. Rapport final ARC ProNoBis, October 2007.
BibTex ]
[Cha07]
P. Chambart. Canaux fiables et non-fiables : frontières de la décidabilité. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[Da 07]
A. Da Costa. Propriétés de jeux multi-agents. Rapport de Master, Master de Logique Mathématique et Fondements de l'Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[Vil07]
J. Villard. Logique spatiale pour le pi-calcul appliqué. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[Vac07]
C. Vacher. Accessibilité inverse dans les automates d'arbres à mémoire d'ordre supérieur. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[CL07]
C. Cremers and P. Lafourcade. Comparing State Spaces in Automatic Security Protocol Verification. In Pre-proceedings of the 7th International Workshop on Automated Verification of Critical Systems (AVoCS'07), Oxford, UK, September 2007.
BibTex | Web page | PDF ]
[AMNK07]
S. Akshay, M. Mukund, and K. Narayan Kumar. Checking Coverage for Infinite Collections of Timed Scenarios. In Proceedings of the 18th International Conference on Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in Computer Science, pages 181--196, Lisbon, Portugal, September 2007. Springer.
doi: 10.1007/978-3-540-74407-8_13.
BibTex | DOI | Web page | PDF ]
[ACD07]
M. Arnaud, V. Cortier, and S. Delaune. Combining algorithms for deciding knowledge in security protocols. In Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), volume 4720 of Lecture Notes in Artificial Intelligence, pages 103--117, Liverpool, UK, September 2007. Springer.
doi: 10.1007/978-3-540-74621-8_7.
BibTex | DOI | Web page | PS | PDF ]
[KM07]
S. Kremer and L. Mazaré. Adaptive Soundness of Static Equivalence. In Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS'07), volume 4734 of Lecture Notes in Computer Science, pages 610--625, Dresden, Germany, September 2007. Springer.
doi: 10.1007/978-3-540-74835-9_40.
BibTex | DOI | Web page | PDF ]
[BLMO07]
Th. Brihaye, F. Laroussinie, N. Markey, and G. Oreiby. Timed Concurrent Game Structures. In Proceedings of the 18th International Conference on Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in Computer Science, pages 445--459, Lisbon, Portugal, September 2007. Springer.
doi: 10.1007/978-3-540-74407-8_30.
BibTex | DOI | Web page | PS | PDF ]
[Gou07c]
J. Goubault-Larrecq. Continuous Previsions. In Proceedings of the 16th Annual EACSL Conference on Computer Science Logic (CSL'07), volume 4646 of Lecture Notes in Computer Science, pages 542--557, Lausanne, Switzerland, September 2007. Springer.
doi: 10.1007/978-3-540-74915-8_40.
BibTex | DOI | Web page | PDF ]
[OBRS07]
A. Ourghanlian, M. Bozga, A. Roglewicz, and A. Sangnier. Projet RNTL Averiles -- Fourniture F1.6 : Expérimentation, September 2007. 16 pages.
BibTex | Web page | PDF ]
[LLV07]
LIAFA, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.4 : Prototypes d'outil, September 2007. 3 pages.
BibTex | Web page | PDF ]
[LCE+07c]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.3 : Algorithmes de vérification, September 2007. 19 pages.
BibTex | Web page | PDF ]
[LCE+07b]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.2 : Extraction de modèles, September 2007. 19 pages.
BibTex | Web page | PDF ]
[LCE+07a]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.1 : Modèles, September 2007. 6 pages.
BibTex | Web page | PDF ]
[LCE+07d]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Rapport à mi-parcours du projet RNTL Averiles (analyse et vérification de logiciels embarqués avec structures de mémoire dynamique, September 2007. 4 pages.
BibTex | Web page | PDF ]
[BHJS07]
A. Bouajjani, P. Habermehl, Y. Jurski, and M. Sighireanu. Rewriting Systems with Data -- A Framework for Reasoning About Systems with Unbounded Structures over Infinite Data Domains. In Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture Notes in Computer Science, pages 1--22, Budapest, Hungary, August 2007. Springer.
doi: 10.1007/978-3-540-74240-1_1.
BibTex | DOI | Web page | PS | PDF ]
[BGMNK07]
P. Bhateja, P. Gastin, M. Mukund, and K. Narayan Kumar. Local testing of message sequence charts is difficult. In Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture Notes in Computer Science, pages 76--87, Budapest, Hungary, August 2007. Springer.
doi: 10.1007/978-3-540-74240-1_8.
BibTex | DOI | Web page | PDF ]
[L+07]
F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 6 mois, August 2007. 7 pages.
BibTex ]
[GO07]
P. Gastin and D. Oddoux. LTL2BA v1.1, August 2007. Written in C++ (about 4000 lines).
BibTex | Web page ]
[Laf07a]
P. Lafourcade. Intruder Deduction for the Equational Theory of phExclusive-or with Commutative and Distributive Encryption. In Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), volume 171 of Electronic Notes in Theoretical Computer Science, pages 37--57, Venice, Italy, July 2007. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2007.02.054.
BibTex | DOI | Web page | PS | PDF ]
[BJ07b]
A. Bouhoula and F. Jacquemard. Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction. In Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07), pages 27--44, Wroclaw, Poland, July 2007.
BibTex | Web page | PDF ]
[BE07]
C. Braunstein and E. Encrenaz. Using CTL formulae as component abstraction in a design and verification flow. In Proceedings of the 7th International Conference on Application of Concurrency to System Design (ACSD'07), pages 80--89, Bratislava, Slovak Republik, July 2007. IEEE Computer Society Press.
doi: 10.1109/ACSD.2007.76.
BibTex | DOI | Web page | PDF ]
[NT07]
M. Nesi and R. Treinen, editors. Preliminary Proceedings of the 2nd International Workshop on Security and Rewriting Techniques (SecReT'07), Paris, France, July 2007.
BibTex ]
[GM07]
P. Gastin and P. Moro. Minimal counter-example generation for SPIN. In Proceedings of the 14th International SPIN Workshop on Model Checking Software (SPIN'07), volume 4595 of Lecture Notes in Computer Science, pages 24--38, Berlin, Germany, July 2007. Springer.
doi: 10.1007/978-3-540-73370-6_4.
BibTex | DOI | Web page | PS | PDF ]
[Gou07b]
J. Goubault-Larrecq. Continuous Capacities on Continuous State Spaces. In Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07), volume 4596 of Lecture Notes in Computer Science, pages 764--776, Wroclaw, Poland, July 2007. Springer.
doi: 10.1007/978-3-540-73420-8_66.
BibTex | DOI | Web page | PDF ]
[BHPR07]
Th. Brihaye, Th. A. Henzinger, V. Prabhu, and J.-F. Raskin. Minimum-Time Reachability in Timed Games. In Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07), volume 4596 of Lecture Notes in Computer Science, pages 825--837, Wroclaw, Poland, July 2007. Springer.
doi: 10.1007/978-3-540-73420-8_71.
BibTex | DOI | Web page | PS | PDF ]
[CDS07]
V. Cortier, S. Delaune, and G. Steel. A Formal Theory of Key Conjuring. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07), pages 79--93, Venice, Italy, July 2007. IEEE Computer Society Press.
doi: 10.1109/CSF.2007.5.
BibTex | DOI | Web page | PS | PDF ]
[Gou07d]
J. Goubault-Larrecq. On Noetherian Spaces. In Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), pages 453--462, Wroclaw, Poland, July 2007. IEEE Computer Society Press.
doi: 10.1109/LICS.2007.34.
BibTex | DOI | Web page | PDF ]
[BMOW07]
P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. The Cost of Punctuality. In Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), pages 109--118, Wroclaw, Poland, July 2007. IEEE Computer Society Press.
doi: 10.1109/LICS.2007.49.
BibTex | DOI | Web page | PS | PDF ]
[SC07]
G. Steel and J. Courant. A formal model for detecting parallel key search attacks. In Proceedings of the 3rd Workshop on Formal and Computational Cryptography (FCC'07), Venice, Italy, July 2007.
BibTex | Web page | PDF ]
[Sch07]
Ph. Schnoebelen. Model Checking Branching-Time Logics. In Proceedings of the 14th International Symposium on Temporal Representation and Reasoning (TIME'07), page 5, Alicante, Spain, June 2007. IEEE Computer Society Press.
doi: 10.1109/TIME.2007.52.
BibTex | DOI | Web page | PS | PDF ]
[BCD07b]
S. Bursuc, H. Comon-Lundh, and S. Delaune. Deducibility Constraints, Equational Theory and Electronic Money. In Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of Lecture Notes in Computer Science, pages 196--212, Cachan, France, June 2007. Springer.
doi: 10.1007/978-3-540-73147-4_10.
BibTex | DOI | Web page | PS ]
[CKK07]
H. Comon-Lundh, C. Kirchner, and H. Kirchner, editors. Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of Lecture Notes in Computer Science, Cachan, France, June 2007. Springer.
doi: 10.1007/978-3-540-73147-4.
BibTex | DOI | Web page ]
[Che07]
F. Chevalier. Logiques pour les systèmes temporisés : contrôle et expressivité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2007.
BibTex | Web page | PS | PDF ]
[Rey07b]
P.-A. Reynier. Vérification de systèmes temporisés et distribués : modèles, algorithmes et implémentabilité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2007.
BibTex | Web page | PS | PDF ]
[Dem07]
S. Demri. Logiques pour la spécification et vérification. Mémoire d'habilitation, Université Paris 7, Paris, France, June 2007.
BibTex | Web page | PDF ]
[Enc07]
E. Encrenaz-Tiphène. Contributions pour la conception et la vérification de systèmes matériels embarqués. Mémoire d'habilitation, Université Paris 6, Paris, France, June 2007.
BibTex | Web page | PDF ]
[Boz07]
L. Bozzelli. Complexity results on branching-time pushdown model checking. Theoretical Computer Science, 379(1-2):286--297, June 2007.
doi: 10.1016/j.tcs.2007.03.049.
BibTex | DOI | Web page | PDF ]
[DG07a]
S. Demri and R. Gascon. The Effects of Bounding Syntactic Resources on Presburger LTL (Extended Abstract). In Proceedings of the 14th International Symposium on Temporal Representation and Reasoning (TIME'07), pages 94--104, Alicante, Spain, June 2007. IEEE Computer Society Press.
doi: 10.1109/TIME.2007.63.
BibTex | DOI | Web page | PDF ]
[BDL07b]
R. Brochenin, S. Demri, and É. Lozes. Reasoning about sequences of memory states. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 100--114, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_8.
BibTex | DOI | Web page | PDF ]
[LS07]
F. Laroussinie and J. Sproston. State Explosion in Almost-Sure Probabilistic Reachability. Information Processing Letters, 102(6):236--241, June 2007.
doi: 10.1016/j.ipl.2007.01.003.
BibTex | DOI | Web page | PDF ]
[BM07a]
B. Bollig and I. Meinecke. Weighted Distributed Systems and Their Logics. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 54--68, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_5.
BibTex | DOI | Web page | PS | PDF ]
[DDG07]
S. Demri, D. D'Souza, and R. Gascon. Decidable Temporal Logic with Repeating Values. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 180--194, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_13.
BibTex | DOI | Web page | PDF ]
[BBC07]
P. Bouyer, Th. Brihaye, and F. Chevalier. Weighted O-Minimal Hybrid Systems are more Decidable than Weighted Timed Automata! In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 69--83, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_6.
BibTex | DOI | Web page | PS | PDF ]
[VG07]
K. N. Verma and J. Goubault-Larrecq. Alternating Two-Way AC-Tree Automata. Information and Computation, 205(6):817--869, June 2007.
doi: 10.1016/j.ic.2006.12.006.
BibTex | DOI | Web page | PS | PDF ]
[DG07b]
M. Droste and P. Gastin. Weighted automata and weighted logics. Theoretical Computer Science, 380(1-2):69--86, June 2007.
doi: 10.1016/j.tcs.2007.02.055.
BibTex | DOI | Web page | PS | PDF ]
[DK07]
S. Delaune and F. Klay. Synthèse des expérimentations. Technical Report 10, projet RNTL PROUVÉ, May 2007. 10 pages.
BibTex | Web page | PDF ]
[CDFP07]
N. Chamseddine, M. Duflot, L. Fribourg, and C. Picaronny. Determinate Probabilistic Timed Automata as Markov Chains with Parametric Costs. Research Report LSV-07-21, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2007. 17 pages.
BibTex | Web page | PDF ]
[Bre07]
R. Bresciani. The ZRTP Protocol --- Security Considerations. Research Report LSV-07-20, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2007. 23 pages.
BibTex | Web page | PS | PDF ]
[Gas07c]
P. Gastin. Langages formels. Course notes, Magistère STIC, ENS Cachan, France, May 2007.
BibTex ]
[Laf07c]
P. Lafourcade. Rapport d'activités à 6 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, April 2007. 5 pages.
BibTex | Web page | PS ]
[LLT07]
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for the Equational Theory of Abelian Groups with Distributive Encryption. Information and Computation, 205(4):581--623, April 2007.
doi: 10.1016/j.ic.2006.10.008.
BibTex | DOI | Web page | PS | PDF ]
[BDL07a]
R. Brochenin, S. Demri, and É. Lozes. Reasoning about Sequences of Memory States. In Proceedings of the 1st Workshop on Heap Analysis and Verification (HAV'07), Braga, Portugal, March 2007.
BibTex | Web page | PDF ]
[Maz07]
L. Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. In Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS'07), pages 6--21, Braga, Portugal, March 2007.
BibTex | Web page | PDF ]
[BK07]
B. Bollig and D. Kuske. Muller Message-Passing Automata and Logics. In Preliminary Proceedings of the 1st International Conference on Language and Automata Theory and Applications (LATA'07), Tarragona, Spain, March-April 2007.
BibTex | Web page | PS | PDF ]
[JLS07]
M. Jurdziński, F. Laroussinie, and J. Sproston. Model Checking Probabilistic Timed Automata with One or Two Clocks. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 170--184, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71209-1_15.
BibTex | DOI | Web page | PDF ]
[DDSS07]
D. D'Aprile, S. Donatelli, A. Sangnier, and J. Sproston. From Time Petri Nets to Timed Automata: An Untimed Approach. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 216--230, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71209-1_18.
BibTex | DOI | Web page | PS | PDF ]
[BKKL07]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Replaying Play in and Play out: Synthesis of Design Models from Scenarios by Learning. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 435--450, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71209-1_33.
BibTex | DOI | Web page | PS | PDF ]
[CJP07]
H. Comon-Lundh, F. Jacquemard, and N. Perrin. Tree Automata with Memory, Visibility and Structural Constraints. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 168--182, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71389-0_13.
BibTex | DOI | Web page | PDF ]
[LMO07]
F. Laroussinie, N. Markey, and G. Oreiby. On the Expressiveness and Complexity of ATL. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 243--257, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71389-0_18.
BibTex | DOI | Web page | PS | PDF ]
[BLM07]
P. Bouyer, K. G. Larsen, and N. Markey. Model-Checking One-Clock Priced Timed Automata. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 108--122, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71389-0_9.
BibTex | DOI | Web page | PS | PDF ]
[DD07]
S. Demri and D. D'Souza. An automata-theoretic approach to constraint LTL. Information and Computation, 205(3):380--415, March 2007.
doi: 10.1016/j.ic.2006.09.006.
BibTex | DOI | Web page | PDF ]
[BJ07a]
A. Bouhoula and F. Jacquemard. Tree Automata, Implicit Induction and Explicit Destructors for Security Protocol Verification. Research Report LSV-07-10, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2007. 21 pages.
BibTex | Web page | PDF ]
[KL07]
B. Ksieżopolski and P. Lafourcade. Attack and Revison of an Electronic Auction Protocol using OFMC. Technical Report 549, Department of Computer Science, ETH Zurich, Switzerland, February 2007. 13 pages.
BibTex | Web page | PDF ]
[DN07]
S. Demri and D. Nowak. Reasoning about transfinite sequences. International Journal of Foundations of Computer Science, 18(1):87--112, February 2007.
doi: 10.1142/S0129054107004589.
BibTex | DOI | Web page | PS | PDF ]
[BCD07a]
S. Bursuc, H. Comon-Lundh, and S. Delaune. Associative-Commutative Deducibility Constraints. In Proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science (STACS'07), volume 4393 of Lecture Notes in Computer Science, pages 634--645, Aachen, Germany, February 2007. Springer.
doi: 10.1007/978-3-540-70918-3_54.
BibTex | DOI | Web page | PS | PDF ]
[Laf07b]
P. Lafourcade. Rapport d'activités à 3 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, January 2007. 3 pages.
BibTex | Web page | PS ]
[Gou07a]
J. Goubault-Larrecq. Believe It Or Not, GOI is a Model of Classical Linear Logic. Research Report LSV-07-03, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. 18 pages.
BibTex | Web page | PDF ]
[DO07]
S. Demri and E. Orlowska. Relative Nondeterministic Information Logic is EXPTIME-complete. Fundamenta Informaticae, 75(1-4):163--178, 2007.
BibTex | Web page | PDF ]
[Rey07a]
P.-A. Reynier. Diagonal constraints handled efficiently in UPPAAL. Research Report LSV-07-02, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. 4 pages.
BibTex | Web page | PS | PDF ]
[Bau07]
M. Baudet. Sécurité des protocoles cryptographiques : aspects logiques et calculatoires. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007.
BibTex | Web page | PS | PDF ]
[DLN07]
S. Demri, R. Lazić, and D. Nowak. On the freeze quantifier in constraint LTL: Decidability and complexity. Information and Computation, 205(1):2--24, January 2007.
doi: 10.1016/j.ic.2006.08.003.
BibTex | DOI | Web page | PDF ]
[Com07]
H. Comon-Lundh. Soundness of abstract cryptography, 2007. Course notes (part 1), Symposium on Cryptography and Information Security (SCIS2008), Tokai, Japan.
BibTex | Web page | PDF ]
[Gou06]
J. Goubault-Larrecq. Preuve et vérification pour la sécurité et la sûreté. In Encyclopédie de l'informatique et des systèmes d'information, chapter I.6, pages 683--703. Vuibert, December 2006.
BibTex | Web page ]
[BKŘS06]
L. Bozzelli, M. Křetínský, V. Řehák, and J. Strejček. On Decidability of LTL Model Checking for Process Rewrite Systems. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 248--259, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_24.
BibTex | DOI | Web page | PDF ]
[BLMR06]
P. Bouyer, K. G. Larsen, N. Markey, and J. I. Rasmussen. Almost Optimal Strategies in One-Clock Priced Timed Automata. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 345--356, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_32.
BibTex | DOI | Web page | PS | PDF ]
[Che06]
F. Chevalier. Decision procedures for timed logics. Invited talk, Advances and Issues in Timed Systems, Kolkata, India, December 2006.
BibTex ]
[Gas06c]
P. Gastin. Refinements and Abstractions of Signal-Event (Timed) Languages. Invited talk, Advances and Issues in Timed Systems, Kolkata, India, December 2006.
BibTex ]
[GSZ06]
P. Gastin, N. Sznajder, and M. Zeitoun. Distributed synthesis for well-connected architectures. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 321--332, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_30.
BibTex | DOI | Web page | PDF ]
[CDP06]
F. Chevalier, D. D'Souza, and P. Prabhakar. On continuous timed automata with input-determined guards. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 369--380, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_34.
BibTex | DOI | Web page | PS | PDF ]
[CKKW06]
V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 176--187, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_18.
BibTex | DOI | Web page | PS | PDF ]
[Del06b]
S. Delaune. An Undecidability Result for AGh. Theoretical Computer Science, 368(1-2):161--167, December 2006.
doi: 10.1016/j.tcs.2006.08.018.
BibTex | DOI | Web page | PS | PDF ]
[BBS06b]
C. Baier, N. Bertrand, and Ph. Schnoebelen. On Computing Fixpoints in Well-Structured Regular Model Checking, with Applications to Lossy Channel Systems. In Proceedings of the 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 347--361, Phnom Penh, Cambodia, November 2006. Springer.
doi: 10.1007/11916277_24.
BibTex | DOI | Web page | PS | PDF ]
[BG06]
L. Bozzelli and R. Gascon. Branching Time Temporal Logic Extended with Presburger Constraints. In Proceedings of the 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 197--211, Phnom Penh, Cambodia, November 2006. Springer.
doi: 10.1007/11916277_14.
BibTex | DOI | Web page | PS | PDF ]
[TED06]
S. Taktak, E. Encrenaz, and J.-L. Desbarbieux. A Tool for Automatic Detection of Deadlock in Wormhole Networks on Chip. In Proceedings of the IEEE High Level Design Verification and Test Workshop (HLDVT'06), pages 203--210, Monterey, California, USA, November 2006. IEEE Computer Society Press.
doi: 10.1109/HLDVT.2006.319992.
BibTex | DOI | Web page | PDF ]
[DG06b]
V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. Information and Computation, 204(11):1597--1619, November 2006.
doi: 10.1016/j.ic.2006.07.002.
BibTex | DOI | Web page | PDF ]
[Sch06]
Ph. Schnoebelen. De nouvelles applications pour le model-checking. Invited lecture, Journées à l'occasion des 20 ans du LIPN, Villetaneuse, France, November 2006.
BibTex ]
[KBL+06]
F. Klay, L. Bozga, Y. Lakhnech, L. Mazaré, S. Delaune, and S. Kremer. Retour d'expérience sur la validation du vote électronique. Technical Report 9, projet RNTL PROUVÉ, November 2006. 47 pages.
BibTex | Web page | PDF ]
[B+06]
P. Bouyer et al. ACI Sécurité Informatique CORTOS --- Rapport final, November 2006. 17 pages.
BibTex | Web page | PDF ]
[SBS06]
Ph. Schnoebelen, A. Bouajjani, and G. Sutre. ACI Sécurité Informatique PERSÉE --- Rapport final, November 2006. 12 pages.
BibTex | Web page | PDF ]
[Gas06b]
P. Gastin. GasTEX: Graphs and Automata Simplified in TEX (v2.8), November 2006. Written in TEX(about 2000 lines).
BibTex | Web page ]
[BBBL06]
H. Bel mokadem, B. Bérard, P. Bouyer, and F. Laroussinie. Timed temporal logics for abstracting transient states. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 337--351, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_26.
BibTex | DOI | Web page | PDF ]
[BHR06c]
P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Unfoldings for Networks of Timed Automata. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 292--306, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_23.
BibTex | DOI | Web page | PS | PDF ]
[DFGvD06]
S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen. Towards a model-checker for counter systems. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 493--507, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_36.
BibTex | DOI | Web page | PDF ]
[BGM06]
P. Bhateja, P. Gastin, and M. Mukund. A fresh look at testing for asynchronous communication. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 369--383, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_28.
BibTex | DOI | Web page | PS | PDF ]
[Mar06]
N. Markey. Verification of Multi-Agent Systems with ATL. Invited talk, FNRS meeting on "Synthesis and Verification", October 2006.
BibTex ]
[Ber06b]
N. Bertrand. Modèles stochastiques pour les pertes de messages dans les protocoles asynchrones et techniques de vérification automatique. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2006.
BibTex | Web page | PS | PDF ]
[G+06]
P. Gastin et al. ACI Sécurité Informatique VERSYDIS --- Rapport final, October 2006. 10 pages.
BibTex | Web page | PDF ]
[BBS06c]
C. Baier, N. Bertrand, and Ph. Schnoebelen. Symbolic verification of communicating systems with probabilistic message losses: liveness and fairness. In Proceedings of 26th IFIP WG6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE'06), volume 4229 of Lecture Notes in Computer Science, pages 212--227, Paris, France, September 2006. Springer.
doi: 10.1007/11888116_17.
BibTex | DOI | Web page | PS | PDF ]
[MBDC+06]
F. Mancinelli, J. Boender, R. Di Cosmo, J. Vouillon, B. Durak, X. Leroy, and R. Treinen. Managing the Complexity of Large Free and Open Source Package-Based Software Distributions. In Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pages 199--208, Tokyo, Japan, September 2006. IEEE Computer Society Press.
doi: 10.1109/ASE.2006.49.
BibTex | DOI | Web page | PDF ]
[AB06]
E. Asarin and P. Bouyer, editors. Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, Paris, France, September 2006. Springer.
doi: 10.1007/11867340.
BibTex | DOI | Web page ]
[BGP06b]
B. Bérard, P. Gastin, and A. Petit. Refinements and abstractions of signal-event (timed) languages. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 67--81, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_6.
BibTex | DOI | Web page | PS | PDF ]
[BGP06a]
B. Bérard, P. Gastin, and A. Petit. Intersection of regular signal-event (timed) languages. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 52--66, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_5.
BibTex | DOI | Web page | PS | PDF ]
[CEFX06b]
R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 113--127, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_9.
BibTex | DOI | Web page | PS | PDF ]
[LMO06]
F. Laroussinie, N. Markey, and G. Oreiby. Model Checking Timed ATL for Durational Concurrent Game Structures. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 245--259, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_18.
BibTex | DOI | Web page | PS | PDF ]
[MOJ06]
I. Mitsuhashi, M. Oyamaguchi, and F. Jacquemard. The Confluence Problem for Flat TRSs. In Proceedings of the 8th International Conference on Artificial Intelligence and Symbolic Computation (AISC'06), volume 4120 of Lecture Notes in Artificial Intelligence, pages 68--81, Beijing, China, September 2006. Springer.
doi: 10.1007/11856290_8.
BibTex | DOI | Web page | PDF ]
[Laf06]
P. Lafourcade. Vérification des protocoles cryptographiques en présence de théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006. 209 pages.
BibTex | Web page | PS | PDF ]
[Bel06]
H. Bel mokadem. Vérification des propriétés temporisées des automates programmables industriels. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006.
BibTex | Web page | PDF ]
[Nav06]
G. Naves. Accessibilité dans les automates temporisés à deux horloges. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2006.
BibTex | Web page | PS | PDF ]
[Aks06]
S. Akshay. Formal Specification and Verification of Timed Communicating Systems. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2006.
BibTex | Web page | PDF ]
[Bur06]
S. Bursuc. Contraintes de déductibilité modulo Associativité-Commutativité. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2006.
BibTex | Web page | PDF ]
[BP06]
M. Baclet and C. Pagetti. Around Hopcroft's Algorithm. In Proceedings of the 11th International Conference on Implementation and Application of Automata (CIAA'06), volume 4094 of Lecture Notes in Computer Science, pages 114--125, Taipei, Taiwan, August 2006. Springer-Verlag.
doi: 10.1007/11812128_12.
BibTex | DOI | Web page | PDF ]
[BM06]
P. Bouyer and P. Madhusudan, editors. Proceedings of the 3rd Workshop on Games in Design and Verification (GDV'06), Seattle, Washington, USA, August 2006.
BibTex ]
[BBC06a]
P. Bouyer, L. Bozzelli, and F. Chevalier. Controller Synthesis for MTL Specifications. In Proceedings of the 17th International Conference on Concurrency Theory (CONCUR'06), volume 4137 of Lecture Notes in Computer Science, pages 450--464, Bonn, Germany, August 2006. Springer.
doi: 10.1007/11817949_30.
BibTex | DOI | Web page | PS | PDF ]
[BBC06b]
P. Bouyer, Th. Brihaye, and F. Chevalier. Control in o-Minimal Hybrid Systems. In Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science (LICS'06), pages 367--378, Seattle, Washington, USA, August 2006. IEEE Computer Society Press.
doi: 10.1109/LICS.2006.22.
BibTex | DOI | Web page | PS | PDF ]
[BLP06]
S. Bardin, J. Leroux, and G. Point. FAST Extended Release. In Proceedings of the 18th International Conference on Computer Aided Verification (CAV'06), volume 4144 of Lecture Notes in Computer Science, pages 63--66, Seattle, Washington, USA, August 2006. Springer.
doi: 10.1007/11817963_9.
BibTex | DOI | Web page | PS | PDF ]
[DL06a]
S. Demri and R. Lazić. LTL with the freeze quantifier and register automata. In Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science (LICS'06), pages 17--26, Seattle, Washington, USA, August 2006. IEEE Computer Society Press.
doi: 10.1109/LICS.2006.31.
BibTex | DOI | Web page | PDF ]
[DL06b]
S. Demri and D. Lugiez. Presburger Modal Logic is Only PSPACE-complete. In Proceedings of the 3rd International Joint Conference on Automated Reasoning (IJCAR'06), volume 4130 of Lecture Notes in Artificial Intelligence, pages 541--556, Seattle, Washington, USA, August 2006. Springer-Verlag.
doi: 10.1007/11814771_44.
BibTex | DOI | Web page ]
[Dem06b]
S. Demri. LTL over integer periodicity constraints. Theoretical Computer Science, 360(1-3):96--123, August 2006.
doi: 10.1016/j.tcs.2006.02.019.
BibTex | DOI | Web page | PDF ]
[JRV06]
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Tree automata with equality constraints modulo equational theories. In Proceedings of the 3rd International Joint Conference on Automated Reasoning (IJCAR'06), volume 4130 of Lecture Notes in Artificial Intelligence, pages 557--571, Seattle, Washington, USA, August 2006. Springer-Verlag.
doi: 10.1007/11814771_45.
BibTex | DOI | Web page ]
[KS06]
A. Kučera and Ph. Schnoebelen. A General Approach to Comparing Infinite-State Systems with Their Finite-State Specifications. Theoretical Computer Science, 358(2-3):315--333, August 2006.
doi: 10.1016/j.tcs.2006.01.021.
BibTex | DOI | Web page | PS | PDF ]
[LLT06]
P. Lafourcade, D. Lugiez, and R. Treinen. ACUNh: Unification and Disunification Using Automata Theory. In Proceedings of the 20th International Workshop on Unification (UNIF'06), pages 6--20, Seattle, Washington, USA, August 2006.
BibTex | Web page | PS | PDF ]
[BJ06a]
A. Bouhoula and F. Jacquemard. Automating Sufficient Completeness Check for Conditional and Constrained TRS. In Proceedings of the 20th International Workshop on Unification (UNIF'06), Seattle, Washington, USA, August 2006.
BibTex | Web page | PDF ]
[MR06]
N. Markey and J.-F. Raskin. Model Checking Restricted Sets of Timed Paths. Theoretical Computer Science, 358(2-3):273--292, August 2006.
doi: 10.1016/j.tcs.2006.01.019.
BibTex | DOI | Web page | PS | PDF ]
[BJ06b]
A. Bouhoula and F. Jacquemard. Security Protocols Verification with Implicit Induction and Explicit Destructors. In Preliminary Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), pages 37--44, Venice, Italy, July 2006.
BibTex | Web page | PDF ]
[BHR06b]
P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) --- Part II, volume 4052 of Lecture Notes in Computer Science, pages 420--431, Venice, Italy, July 2006. Springer.
doi: 10.1007/11787006_36.
BibTex | DOI | Web page | PS | PDF ]
[BS06]
N. Bertrand and Ph. Schnoebelen. A short visit to the STS hierarchy. In Proceedings of the 12th International Workshop on Expressiveness in Concurrency (EXPRESS'05), volume 154 of Electronic Notes in Theoretical Computer Science, pages 59--69, San Francisco, California, USA, July 2006. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2006.05.007.
BibTex | DOI | Web page | PS | PDF ]
[CEFX06a]
R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Timing analysis of an embedded memory: SPSMALL. WSEAS Transactions on Circuits and Systems, 5(7):973--978, July 2006.
BibTex | Web page | PDF ]
[DKR06a]
S. Delaune, S. Kremer, and M. D. Ryan. Coercion-Resistance and Receipt-Freeness in Electronic Voting. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06), pages 28--39, Venice, Italy, July 2006. IEEE Computer Society Press.
doi: 10.1109/CSFW.2006.8.
BibTex | DOI | Web page | PS | PDF ]
[DLLT06]
S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and phExclusive Or. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) --- Part II, volume 4052 of Lecture Notes in Computer Science, pages 132--143, Venice, Italy, July 2006. Springer.
doi: 10.1007/11787006_12.
BibTex | DOI | Web page | PS | PDF ]
[CK06]
V. Cortier and S. Kremer, editors. Proceedings of the 2nd Workshop on Formal and Computational Cryptography (FCC'06), Venice, Italy, July 2006.
BibTex | Web page ]
[RS06]
A. Rabinovich and Ph. Schnoebelen. BTL_2 and the expressive power of ECTL^+. Information and Computation, 204(7):1023--1044, July 2006.
doi: 10.1016/j.ic.2005.07.006.
BibTex | DOI | Web page | PS | PDF ]
[BBLP06]
G. Behrmann, P. Bouyer, K. G. Larsen, and R. Pelánek. Lower and Upper Bounds in Zone-Based Abstractions of Timed Automata. International Journal on Software Tools for Technology Transfer, 8(3):204--215, June 2006.
doi: 10.1007/s10009-005-0190-0.
BibTex | DOI | Web page | PS | PDF ]
[BC06]
P. Bouyer and F. Chevalier. On the Control of Timed and Hybrid Systems. EATCS Bulletin, 89:79--96, June 2006.
BibTex | Web page | PS | PDF ]
[BBM06]
P. Bouyer, Th. Brihaye, and N. Markey. Improved Undecidability Results on Weighted Timed Automata. Information Processing Letters, 98(5):188--194, June 2006.
doi: 10.1016/j.ipl.2006.01.012.
BibTex | DOI | Web page | PS | PDF ]
[BH06b]
M. Bidoit and R. Hennicker. Proving Behavioral Refinements of COL-Specifications. In Algebra, Meaning and Computation --- Essays dedicated to Joseph A. Goguen on the Occasion of His 65th Birthday, volume 4060 of Lecture Notes in Computer Science, pages 333--354, San Diego, California, USA, June 2006. Springer.
doi: 10.1007/11780274_18.
BibTex | DOI | Web page | PDF ]
[BHR06a]
P. Bouyer, S. Haddad, and P.-A. Reynier. Extended Timed Automata and Time Petri Nets. In Proceedings of the 6th International Conference on Application of Concurrency to System Design (ACSD'06), pages 91--100, Turku, Finland, June 2006. IEEE Computer Society Press.
doi: 10.1109/ACSD.2006.6.
BibTex | DOI | Web page | PS | PDF ]
[BL06]
P. Bouyer and F. Laroussinie. Vérification par automates temporisés. In Systèmes temps-réel 1 : techniques de description et de vérification, pages 121--150. Hermès, June 2006.
BibTex | Web page | PS | PDF ]
[Bol06]
B. Bollig. Formal Models of Communicating Systems --- Languages, Automata, and Monadic Second-Order Logic. Springer, June 2006.
BibTex | Web page ]
[BE06]
C. Braunstein and E. Encrenaz. Formalizing the incremental design and verification process of a pipelined protocol converter. In Proceedings of the 17th International Workshop on Rapid System Prototyping (RSP'06), pages 103--109, Chania, Crete, June 2006. IEEE Computer Society Press.
doi: 10.1109/RSP.2006.19.
BibTex | DOI | Web page | PS | PDF ]
[DKR06b]
S. Delaune, S. Kremer, and M. D. Ryan. Verifying Properties of Electronic Voting Protocols. In Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE'06), pages 45--52, Cambridge, UK, June 2006.
BibTex | Web page | PS | PDF ]
[DLS06]
S. Demri, F. Laroussinie, and Ph. Schnoebelen. A Parametric Analysis of the State Explosion Problem in Model Checking. Journal of Computer and System Sciences, 72(4):547--575, June 2006.
doi: 10.1016/j.jcss.2005.11.003.
BibTex | DOI | Web page | PS | PDF ]
[Ber06a]
V. Bernat. Théories de l'intrus pour la vérification des protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2006.
BibTex | Web page | PS | PDF ]
[Del06c]
S. Delaune. Vérification des protocoles cryptographiques et propriétés algébriques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2006.
BibTex | Web page | PS | PDF ]
[Bro06]
R. Brochenin. Techniques d'automates pour raisonner sur la mémoire. Rapport de Master, Master Recherche Informatique de Lyon --- Informatique Fondamentale, Lyon, France, June 2006.
BibTex | Web page | PS ]
[OG06]
J. Olivain and J. Goubault-Larrecq. Detecting Subverted Cryptographic Protocols by Entropy Checking. Research Report LSV-06-13, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2006. 19 pages.
BibTex | Web page | PDF ]
[Gas06a]
P. Gastin. Distributed synthesis: synchronous and asynchronous semantics. Invited talk, 34ème École de Printemps en Informatique Théorique, Ile de Ré, France, May 2006.
BibTex ]
[Gas06d]
P. Gastin. Refinements and Abstractions of Signal-Event (Timed) Languages. Invited talk, 22nd Conference on Mathematical Foundations of Programming Semantics (MFPS'06), May 2006.
BibTex ]
[Bou06]
P. Bouyer. Weighted Timed Automata: Model-Checking and Games. In Proceedings of the 22nd Conference on Mathematical Foundations of Programming Semantics (MFPS'06), volume 158 of Electronic Notes in Theoretical Computer Science, pages 3--17, Genova, Italy, May 2006. Elsevier Science Publishers. Invited paper.
doi: 10.1016/j.entcs.2006.04.002.
BibTex | DOI | Web page | PS | PDF ]
[FGRV06]
A. Finkel, G. Geeraerts, J.-F. Raskin, and L. Van Begin. On the ω-Language Expressive Power of Extended Petri Nets. Theoretical Computer Science, 356(3):374--386, May 2006.
doi: 10.1016/j.tcs.2006.02.008.
BibTex | DOI | Web page | PDF ]
[DG06a]
V. Diekert and P. Gastin. From local to global temporal logics over Mazurkiewicz traces. Theoretical Computer Science, 356(1-2):126--135, May 2006.
doi: 10.1016/j.tcs.2006.01.035.
BibTex | DOI | Web page | PDF ]
[BK06]
B. Bollig and D. Kuske. Distributed Muller Automata and Logics. Research Report LSV-06-11, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2006. 23 pages.
BibTex | Web page | PS | PDF ]
[BFLS06]
S. Bardin, A. Finkel, É. Lozes, and A. Sangnier. From Pointer Systems to Counter Systems Using Shape Analysis. In Proceedings of the 5th International Workshop on Automated Verification of Infinite-State Systems (AVIS'06), Vienna, Austria, April 2006.
BibTex | Web page | PS | PDF ]
[BDCD+06]
J. Boender, R. Di Cosmo, B. Durak, X. Leroy, F. Mancinelli, M. Morgado, D. Pinheiro, R. Treinen, P. Trezentos, and J. Vouillon. News from the EDOS project: improving the maintenance of free software distributions. In Proceedings of the International Workshop on Free Software (IWFS'06), pages 199--207, Porto Allegre, Brazil, April 2006.
BibTex | Web page | PDF ]
[BH06a]
M. Bidoit and R. Hennicker. Constructor-Based Observational Logic. Journal of Logic and Algebraic Programming, 67(1-2):3--51, April-May 2006.
doi: 10.1016/j.jlap.2005.09.002.
BibTex | DOI | Web page | PDF ]
[ABW06]
M. Abadi, M. Baudet, and B. Warinschi. Guessing Attacks and the Computational Soundness of Static Equivalence. In Proceedings of the 9th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'06), volume 3921 of Lecture Notes in Computer Science, pages 398--412, Vienna, Austria, March 2006. Springer.
doi: 10.1007/11690634_27.
BibTex | DOI | Web page | PS | PDF ]
[BKSS06]
B. Bollig, C. Kern, M. Schlütter, and V. Stolz. MSCan: A Tool for Analyzing MSC Specifications. In Proceedings of the 12th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'06), volume 3920 of Lecture Notes in Computer Science, pages 455--458, Vienna, Austria, March 2006. Springer.
doi: 10.1007/11691372_32.
BibTex | DOI | Web page | PS | PDF ]
[Gas06e]
P. Gastin. Weigthed logics and weighted automata. Invited talk, Workshop Weighted Automata: Theory and Applications, Leipzig, Germany, March 2006.
BibTex ]
[BMR06]
P. Bouyer, N. Markey, and P.-A. Reynier. Robust Model-Checking of Linear-Time Properties in Timed Automata. In Proceedings of the 7th Latin American Symposium on Theoretical Informatics (LATIN'06), volume 3887 of Lecture Notes in Computer Science, pages 238--249, Valdivia, Chile, March 2006. Springer.
doi: 10.1007/11682462_25.
BibTex | DOI | Web page | PS | PDF ]
[Del06a]
S. Delaune. Easy Intruder Deduction Problems with Homomorphisms. Information Processing Letters, 97(6):213--218, March 2006.
doi: 10.1016/j.ipl.2005.11.008.
BibTex | DOI | Web page | PS | PDF ]
[LMS06]
F. Laroussinie, N. Markey, and Ph. Schnoebelen. Efficient Timed Model Checking for Discrete-Time Systems. Theoretical Computer Science, 353(1-3):249--271, March 2006.
doi: 10.1016/j.tcs.2005.11.020.
BibTex | DOI | Web page | PS | PDF ]
[MS06]
N. Markey and Ph. Schnoebelen. Mu-Calculus Path Checking. Information Processing Letters, 97(6):225--230, March 2006.
doi: 10.1016/j.ipl.2005.11.010.
BibTex | DOI | Web page | PS | PDF ]
[FMP06]
L. Fribourg, S. Messika, and C. Picaronny. Coupling and Self-Stabilization. Distributed Computing, 18(3):221--232, February 2006.
doi: 10.1007/s00446-005-0142-7.
BibTex | DOI | Web page | PS | PDF ]
[Ber06c]
N. Bertrand. SuMo -- Reachability analysis for lossy channels, February 2006. See [BBS06c] for a description. Written in OCaml (3000 lines).
BibTex ]
[CL06]
F. Cassez and F. Laroussinie. Contrôle des applications temps-réel : modèles temporisés et hybrides. Technique et Science Informatiques, 25(3), 2006.
BibTex | Web page ]
[BBS06a]
C. Baier, N. Bertrand, and Ph. Schnoebelen. A note on the attractor-property of infinite-state Markov chains. Information Processing Letters, 97(2):58--63, January 2006.
doi: 10.1016/j.ipl.2005.09.011.
BibTex | DOI | Web page | PS | PDF ]
[CDL06]
V. Cortier, S. Delaune, and P. Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security, 14(1):1--43, 2006.
BibTex | Web page | PS | PDF ]
[CKS06]
R. Chadha, S. Kremer, and A. Scedrov. Formal Analysis of Multi-Party Contract Signing. Journal of Automated Reasoning, 36(1-2):39--83, January 2006.
doi: 10.1007/s10817-005-9019-5.
BibTex | DOI | Web page | PDF ]
[DJ06]
S. Delaune and F. Jacquemard. Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Journal of Automated Reasoning, 36(1-2):85--124, January 2006.
doi: 10.1007/s10817-005-9017-7.
BibTex | DOI | Web page | PS ]
[Bau06]
M. Baudet. Random Polynomial-Time Attacks and Dolev-Yao Models. Journal of Automata, Languages and Combinatorics, 11(1):7--21, 2006.
BibTex | Web page | PS | PDF ]
[Dem06a]
S. Demri. Linear-Time Temporal Logics with Presburger Constraints: An Overview. Journal of Applied Non-Classical Logics, 16(3-4):311--347, 2006.
BibTex | Web page | PDF ]
[AGH+06]
S. Anantharaman, P. Gastin, G. Hains, J. Mullins, and M. Rusinowitch, editors. Selected papers of the International Workshop on Security Analysis of Systems: Formalisms and Tools (SASYFT'04), volume 11, Orléans, France, 2006.
BibTex ]
[BCM05]
P. Bouyer, F. Chevalier, and N. Markey. On the Expressiveness of TPTL and MTL. In Proceedings of the 25th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'05), volume 3821 of Lecture Notes in Computer Science, pages 432--443, Hyderabad, India, December 2005. Springer.
doi: 10.1007/11590156_35.
BibTex | DOI | Web page | PS | PDF ]
[Gas05a]
R. Gascon. Verifying qualitative and quantitative properties with LTL over concrete domains. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-4), volume 194 of Informatik Bericht, pages 54--61, Berlin, Germany, December 2005. Humboldt Universität zu Berlin.
BibTex | Web page | PS | PDF ]
[Lar05b]
F. Laroussinie. Timed modal logics for the verification of real-time systems. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-4), volume 194 of Informatik Bericht, pages 293--305, Berlin, Germany, December 2005. Humboldt Universität zu Berlin.
BibTex | Web page | PS | PDF ]
[KLT05]
S. Kremer, Y. Lakhnech, and R. Treinen. The Prouvé Manual: Specifications, Semantics, and Logics. Technical Report 7, projet RNTL PROUVÉ, December 2005. 49 pages.
BibTex | Web page | PS | PDF ]
[PR05b]
S. Pinchinat and S. Riedweg. On the Architectures in Decentralized Supervisory Control. In Proceedings of the 44th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC'05), pages 12--17, Seville, Spain, December 2005. IEEE Control System Society.
BibTex | Web page | PS | PDF ]
[Bac05]
M. Baclet. Applications du model-checking à des problèmes de vérification de systèmes sur puce. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2005.
BibTex | Web page | PDF ]
[Lar05a]
F. Laroussinie. Model checking temporisé --- Algorithmes efficaces et complexité. Mémoire d'habilitation, Université Paris 7, Paris, France, December 2005.
BibTex | Web page | PDF ]
[ABRS05]
P. A. Abdulla, N. Bertrand, A. Rabinovich, and Ph. Schnoebelen. Verification of Probabilistic Systems with Faulty Communication. Information and Computation, 202(2):141--165, November 2005.
doi: 10.1016/j.ic.2005.05.008.
BibTex | DOI | Web page | PS | PDF ]
[Bau05]
M. Baudet. Deciding Security of Protocols against Off-line Guessing Attacks. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), pages 16--25, Alexandria, Virginia, USA, November 2005. ACM Press.
doi: 10.1145/1102120.1102125.
BibTex | DOI | Web page | PS | PDF ]
[Gas05b]
P. Gastin. On the synthesis of distributed controllers. Invited talk, Workshop Perspectives in Verification, in honor of Wolfgang Thomas on the occasion of his Doctorate Honoris Causa, Cachan, France, November 2005.
BibTex ]
[BLR05]
P. Bouyer, F. Laroussinie, and P.-A. Reynier. Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems. In Proceedings of the 3rd International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'05), volume 3829 of Lecture Notes in Computer Science, pages 112--126, Uppsala, Sweden, November 2005. Springer.
doi: 10.1007/11603009_10.
BibTex | DOI | Web page | PS | PDF ]
[CF05]
G. Cécé and A. Finkel. Verification of Programs with Half-Duplex Communication. Information and Computation, 202(2):166--190, November 2005.
doi: 10.1016/j.ic.2005.05.006.
BibTex | DOI | Web page | PDF ]
[DZG05]
S. Dal Zilio and R. Gascon. Resource Bound Certification for a Tail-Recursive Virtual Machine. In Proceedings of the 3rd Asian Symposium on Programming Languages and Systems (APLAS'05), volume 3780 of Lecture Notes in Computer Science, pages 247--263, Tsukuba, Japan, November 2005. Springer.
doi: 10.1007/11575467_17.
BibTex | DOI | Web page | PS | PDF ]
[VG05]
K. N. Verma and J. Goubault-Larrecq. Karp-Miller Trees for a Branching Extension of VASS. Discrete Mathematics & Theoretical Computer Science, 7(1):217--230, November 2005.
BibTex | Web page | PS | PDF ]
[LS05b]
D. Lugiez and Ph. Schnoebelen. Decidable first-order transition logics for PA-processes. Information and Computation, 203(1):75--113, November 2005.
doi: 10.1016/j.ic.2005.02.003.
BibTex | DOI | Web page | PS | PDF ]
[S+05]
Ph. Schnoebelen et al. ACI Sécurité Informatique PERSÉE --- Rapport à mi-parcours, November 2005. 8 pages.
BibTex ]
[DKK05]
S. Delaune, F. Klay, and S. Kremer. Spécification du protocole de vote électronique. Technical Report 6, projet RNTL PROUVÉ, November 2005. 19 pages.
BibTex | Web page | PS | PDF ]
[Tre05]
R. Treinen. Résolution symbolique de contraintes. Mémoire d'habilitation, Université Paris-Sud 11, Orsay, France, November 2005.
BibTex | Web page | PS | PDF ]
[FL05]
A. Finkel and J. Leroux. The Convex Hull of a Regular Set of Integer Vectors is Polyhedral and Effectively Computable. Information Processing Letters, 96(1):30--35, October 2005.
doi: 10.1016/j.ipl.2005.04.004.
BibTex | DOI | Web page | PS | PDF ]
[BFLS05]
S. Bardin, A. Finkel, J. Leroux, and Ph. Schnoebelen. Flat acceleration in symbolic model checking. In Proceedings of the 3rd International Symposium on Automated Technology for Verification and Analysis (ATVA'05), volume 3707 of Lecture Notes in Computer Science, pages 474--488, Taipei, Taiwan, October 2005. Springer.
doi: 10.1007/11562948_35.
BibTex | DOI | Web page | PS | PDF ]
[BH05]
M. Bidoit and R. Hennicker. Externalized and Internalized Notions of Behavioral Refinement. In Proceedings of the 2nd International Colloquium on Theoretical Aspects of Computing (ICTAC'05), volume 3722 of Lecture Notes in Computer Science, pages 334--350, Hanoi, Vietnam, October 2005. Springer.
doi: 10.1007/11560647_22.
BibTex | DOI | Web page | PDF ]
[AMRT05]
K. Altisen, N. Markey, P.-A. Reynier, and S. Tripakis. Implémentabilité des automates temporisés. In Actes du 5ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'05), pages 395--406, Autrans, France, October 2005. Hermès.
BibTex | Web page | PS | PDF ]
[BCKT05]
P. Bouyer, F. Chevalier, M. Krichen, and S. Tripakis. Observation partielle des systèmes temporisés. In Actes du 5ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'05), pages 381--393, Autrans, France, October 2005. Hermès.
BibTex | Web page | PS | PDF ]
[ABC+05]
K. Altisen, P. Bouyer, T. Cachat, F. Cassez, and G. Gardey. Introduction au contrôle des systèmes temps-réel. In Actes du 5ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'05), pages 367--380, Autrans, France, October 2005. Hermès.
BibTex | Web page | PS | PDF ]
[Dem05b]
S. Demri. A reduction from DLP to PDL. Journal of Logic and Computation, 15(5):767--785, October 2005.
doi: 10.1093/logcom/exi043.
BibTex | DOI | Web page | PDF ]
[DN05]
S. Demri and D. Nowak. Reasoning about transfinite sequences (extended abstract). In Proceedings of the 3rd International Symposium on Automated Technology for Verification and Analysis (ATVA'05), volume 3707 of Lecture Notes in Computer Science, pages 248--262, Taipei, Taiwan, October 2005. Springer.
doi: 10.1007/11562948_20.
BibTex | DOI | Web page | PS | PDF ]
[LLT05b]
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption. Research Report LSV-05-19, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005. 39 pages.
BibTex | Web page | PS | PDF ]
[Bar05]
S. Bardin. Vers un model checking avec accélération plate de systèmes hétérogènes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005.
BibTex | Web page | PDF ]
[Zha05]
Y. Zhang. Cryptographic logical relations -- What is the contextual equivalence for cryptographic protocols and how to prove it? Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005.
BibTex | Web page | PS | PDF ]
[BBG+05]
H. Bel mokadem, B. Bérard, V. Gourcuff, J.-M. Roussel, and O. De Smet. Verification of a timed multitask system with Uppaal. In Proceedings of the 10th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'05), pages 347--354, Catania, Italy, September 2005. IEEE Industrial Electronics Society.
BibTex | Web page | PS | PDF ]
[DKR05]
S. Delaune, S. Kremer, and M. D. Ryan. Receipt-Freeness: Formal Definition and Fault Attacks (Extended Abstract). In Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy, September 2005.
BibTex | Web page | PDF ]
[LNZ05]
S. Lasota, D. Nowak, and Y. Zhang. On completeness of logical relations for monadic types. In Proceedings of the 3rd APPSEM II Workshop (APPSEM'05), Frauenchiemsee, Germany, September 2005.
BibTex | Web page | PDF ]
[Pin05]
S. Pinot. Analyse de stabilité d'algorithme distribués probabilistes. Rapport de Master, Master de Logique Mathématique et Fondements de l'Informatique, Paris, France, September 2005.
BibTex | Web page | PS | PDF ]
[Szn05]
N. Sznajder. Synthèse de contrôleur pour les systèmes distribués synchrones. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2005.
BibTex | Web page | PDF ]
[Bou05e]
P. Bouyer. Optimal Timed Games. Invited talk, 5th International Workshop on Automated Verification of Critical Systems (AVoCS'05), Warwick, UK, September 2005.
BibTex ]
[Bou05c]
P. Bouyer. An Introduction to Timed Automata. In Actes de la 4ème École Temps-Réel (ETR'05), pages 111--123, Nancy, France, September 2005.
BibTex | Web page | PDF ]
[Bou05b]
P. Bouyer. Foundations of Timed Systems. In Proc. of the ARTIST2 Summer School on Component & Modelling, Testing & Verification, and Statical Analysis of Embedded Systems, Nässlingen, Sweden, September-October 2005.
BibTex | Web page | PDF ]
[Bou05a]
F. Bouchy. Bibliothèque de méthodes pour la classification. Rapport de Master, Master Recherche Informatique, Tours, France, September 2005.
BibTex ]
[GRV05]
J. Goubault-Larrecq, M. Roger, and K. N. Verma. Abstraction and Resolution Modulo AC: How to Verify Diffie-Hellman-like Protocols Automatically. Journal of Logic and Algebraic Programming, 64(2):219--251, August 2005.
doi: 10.1016/j.jlap.2004.09.004.
BibTex | DOI | Web page | PS ]
[BBBL05]
H. Bel mokadem, B. Bérard, P. Bouyer, and F. Laroussinie. A New Modality for Almost Everywhere Properties in Timed Automata. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 110--124, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_12.
BibTex | DOI | Web page | PS | PDF ]
[BCL05]
P. Bouyer, F. Cassez, and F. Laroussinie. Modal Logics for Timed Control. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 81--94, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_10.
BibTex | DOI | Web page | PS | PDF ]
[Dem05a]
S. Demri. On the complexity of information logics. Invited talk, Workshop on Logical and Algebraic Foundations of Rough Sets, Regina, Canada, August 2005.
BibTex ]
[DG05a]
S. Demri and R. Gascon. Verification of Qualitative Z-Constraints. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 518--532, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_39.
BibTex | DOI | Web page | PDF ]
[Gou05a]
J. Goubault-Larrecq. Deciding H_1 by Resolution. Information Processing Letters, 95(3):401--408, August 2005.
doi: 10.1016/j.ipl.2005.04.007.
BibTex | DOI | Web page | PDF ]
[MKR05]
A. Mukhamedov, S. Kremer, and E. Ritter. Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. In Revised Papers from the 9th International Conference on Financial Cryptography and Data Security (FC'05), volume 3570 of Lecture Notes in Computer Science, pages 255--269, Roseau, The Commonwealth Of Dominica, August 2005. Springer.
doi: 10.1007/11507840_23.
BibTex | DOI | Web page | PDF ]
[GK05]
P. Gastin and D. Kuske. Uniform Satisfiability Problem for Local Temporal Logics over Mazurkiewicz Traces. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 533--547, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_40.
BibTex | DOI | Web page | PS | PDF ]
[BJ05b]
A. Bouhoula and F. Jacquemard. Automatic Verification of Sufficient Completeness for Specifications of Complex Data Structures. Research Report LSV-05-17, Laboratoire Spécification et Vérification, ENS Cachan, France, August 2005. 14 pages.
BibTex | Web page | PS | PDF ]
[PR05a]
S. Pinchinat and S. Riedweg. A Decidable Class of Problems for Control under Partial Observation. Information Processing Letters, 95(4):454--465, August 2005.
doi: 10.1016/j.ipl.2005.04.011.
BibTex | DOI | Web page | PS | PDF ]
[The05]
The Artist Education Group. Guidelines for a graduate curriculum on embedded software and systems. ACM Transactions in Embedded Computing Systems, 4(3):587--611, August 2005.
doi: 10.1145/1086519.1086526.
BibTex | DOI | Web page | PDF ]
[Bou05i]
P. Bouyer. Weighted Timed Automata: Model-Checking and Games. Invited talk, Workshop CORTOS'06, Bonn, Germany, August 2005.
BibTex ]
[Bou05d]
P. Bouyer. Optimal Reachability Timed Games. Invited talk, 7th International Workshop on Verification of Infinite State Systems (INFINITY'05), San Francisco, USA, August 2005.
BibTex ]
[Bou05f]
P. Bouyer. Partial Observation of Timed Systems. Invited talk, 2nd Workshop on Games in Design and Verification, Edinburgh, Scotland, July 2005.
BibTex ]
[BCK05]
M. Baudet, V. Cortier, and S. Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of Lecture Notes in Computer Science, pages 652--663, Lisboa, Portugal, July 2005. Springer.
doi: 10.1007/11523468_53.
BibTex | DOI | Web page | PDF ]
[FM05]
L. Fribourg and S. Messika. Brief Announcement: Coupling for Markov Decision Processes --- Application to Self-Stabilization with Arbitrary Schedulers. In Proceedings of the Twenty-Fourth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC'05), page 322, Las Vegas, Nevada, USA, July 2005. ACM Press.
doi: 10.1145/1073814.1073875.
BibTex | DOI | Web page | PS | PDF ]
[DG05b]
M. Droste and P. Gastin. Weighted Automata and Weighted Logics. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of Lecture Notes in Computer Science, pages 513--525, Lisboa, Portugal, July 2005. Springer.
doi: 10.1007/11523468_42.
BibTex | DOI | Web page | PS | PDF ]
[BJ05a]
A. Bouhoula and F. Jacquemard. Automated Induction for Complex Data Structures. Research Report LSV-05-11, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2005. 24 pages.
BibTex | Web page | PS | PDF ]
[OG05]
J. Olivain and J. Goubault-Larrecq. The Orchids Intrusion Detection Tool. In Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 286--290, Edinburgh, Scotland, UK, July 2005. Springer.
doi: 10.1007/11513988_28.
BibTex | DOI | Web page | PDF ]
[DdN05]
S. Demri and H. de Nivelle. Deciding Regular Grammar Logics with Converse through First-Order Logic. Journal of Logic, Language and Information, 14(3):289--319, June 2005.
doi: 10.1007/s10849-005-5788-9.
BibTex | DOI | Web page | PDF ]
[DLN05]
S. Demri, R. Lazić, and D. Nowak. On the Freeze Quantifier in Constraint LTL: Decidability and Complexity. In Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME'05), pages 113--121, Burlington, Vermont, USA, June 2005. IEEE Computer Society Press.
doi: 10.1109/TIME.2005.28.
BibTex | DOI | Web page | PS | PDF ]
[BHS+05]
S. Bardin, F. Herbreteau, M. Sighireanu, G. Sutre, and A. Vincent. Intégration des outils PERSÉE (Proposition d'architecture). Délivrable 3.1 --- Partie 1 du Projet PERSÉE de l'ACI Sécurité Informatique, June 2005. 35 pages.
BibTex | Web page | PDF ]
[PR05c]
S. Pinchinat and S. Riedweg. You Can Always Compute Maximally Permissive Controllers Under Partial Observation When They Exist. In Proceedings of the 24th American Control Conference (ACC'05), pages 2287--2292, Portland, Oregon, USA, June 2005. IEEECSP.
BibTex | Web page | PS | PDF ]
[DFH+05]
M. Duflot, L. Fribourg, Th. Hérault, R. Lassaigne, F. Magniette, S. Messika, S. Peyronnet, and C. Picaronny. Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC. In Proceedings of the 4th International Workshop on Automated Verification of Critical Systems (AVoCS'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 195--214, London, UK, May 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2005.04.012.
BibTex | DOI | Web page | PDF ]
[DFV05]
Ch. Darlot, A. Finkel, and L. Van Begin. About Fast and TReX Accelerations. In Proceedings of the 4th International Workshop on Automated Verification of Critical Systems (AVoCS'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 87--103, London, UK, May 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2005.04.006.
BibTex | DOI | Web page | PDF ]
[KR05a]
S. Kremer and M. D. Ryan. Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. In Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 84--107, London, UK, May 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2004.11.043.
BibTex | DOI | Web page | PDF ]
[BC05a]
M. Baclet and R. Chevallier. Timed Verification of the SPSMALL Memory. In Proceedings of the 1st International Conference on Memory Technology and Design (ICMTD'05), pages 89--92, Giens, France, May 2005.
BibTex | Web page | PDF ]
[FGRV05b]
A. Finkel, G. Geeraerts, J.-F. Raskin, and L. Van Begin. On the Omega-Language Expressive Power of Extended Petri Nets. In Proceedings of the 11th International Workshop on Expressiveness in Concurrency (EXPRESS'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 87--101, London, UK, April 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2004.11.030.
BibTex | DOI | Web page | PDF ]
[Gou05b]
J. Goubault-Larrecq. Extensions of Valuations. Mathematical Structures in Computer Science, 15(2):271--297, April 2005.
doi: 10.1017/S096012950400461X.
BibTex | DOI | Web page | PS ]
[BCD05]
P. Bouyer, F. Chevalier, and D. D'Souza. Fault Diagnosis Using Timed Automata. In Proceedings of the 8th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'05), volume 3441 of Lecture Notes in Computer Science, pages 219--233, Edinburgh, Scotland, UK, April 2005. Springer.
doi: 10.1007/b106850.
BibTex | DOI | Web page | PS | PDF ]
[CD05]
H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), volume 3467 of Lecture Notes in Computer Science, pages 294--307, Nara, Japan, April 2005. Springer.
doi: 10.1007/b135673.
BibTex | DOI | Web page | PS | PDF ]
[B+05]
P. Bouyer et al. ACI Sécurité Informatique CORTOS << Control and Observation of Real-Time Open Systems >> --- Rapport à mi-parcours, April 2005. 6 pages.
BibTex | Web page | PDF ]
[KR05b]
S. Kremer and M. D. Ryan. Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus. In Programming Languages and Systems --- Proceedings of the 14th European Symposium on Programming (ESOP'05), volume 3444 of Lecture Notes in Computer Science, pages 186--200, Edinburgh, Scotland, UK, April 2005. Springer.
doi: 10.1007/b107380.
BibTex | DOI | Web page | PS | PDF ]
[LLT05a]
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for AC-like Equational Theories with Homomorphisms. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), volume 3467 of Lecture Notes in Computer Science, pages 308--322, Nara, Japan, April 2005. Springer.
doi: 10.1007/b135673.
BibTex | DOI | Web page | PS | PDF ]
[LS05a]
F. Laroussinie and J. Sproston. Model Checking Durational Probabilistic Systems. In Proceedings of the 8th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'05), volume 3441 of Lecture Notes in Computer Science, pages 140--154, Edinburgh, Scotland, UK, April 2005. Springer.
doi: 10.1007/b106850.
BibTex | DOI | Web page | PS | PDF ]
[Bou05h]
P. Bouyer. Timed Automata and Extensions: Decidability Limits. Invited talk, 5èmes Journées Systèmes Infinis (JSI'05), Cachan, France, March 2005.
BibTex ]
[Bou05g]
P. Bouyer. Synthesis of Timed Systems. Invited lecture, Spring School on Infinite Games and Their Applications, Bonn, Germany, March 2005.
BibTex ]
[BDKV05]
L. Bozga, S. Delaune, F. Klay, and L. Vigneron. Retour d'expérience sur la validation du porte-monnaie électronique. Technical Report 5, projet RNTL PROUVÉ, March 2005. 29 pages.
BibTex | Web page | PS ]
[BCFL05]
P. Bouyer, F. Cassez, E. Fleury, and K. G. Larsen. Synthesis of Optimal Strategies Using HyTech. In Proceedings of the Workshop on Games in Design and Verification (GDV'04), volume 119 of Electronic Notes in Theoretical Computer Science, pages 11--31, Boston, Massachusetts, USA, February 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2004.07.006.
BibTex | DOI | Web page | PS | PDF ]
[CC05]
H. Comon and V. Cortier. Tree Automata with One Memory, Set Constraints and Cryptographic Protocols. Theoretical Computer Science, 331(1):143--214, February 2005.
doi: 10.1016/j.tcs.2004.09.036.
BibTex | DOI | Web page | PS ]
[Cou05]
J.-M. Couvreur. A BDD-like Implementation of an Automata Package. In Revised Selected Papers of the 9th International Conference on Implementation and Application of Automata (CIAA'04), volume 3317 of Lecture Notes in Computer Science, pages 310--311, Kingston, Ontario, Canada, January 2005. Springer.
doi: 10.1007/b105090.
BibTex | DOI ]
[BS05]
B. Bouyssonouse and J. Sifakis, editors. Embedded Systems Design: The ARTIST Roadmap for Research and Development, volume 3436 of Lecture Notes in Computer Science. Springer, 2005.
doi: 10.1007/b106761.
BibTex | DOI | Web page ]
[GP05]
J. Goubault-Larrecq and F. Parrennes. Cryptographic Protocol Analysis on Real C Code. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363--379, Paris, France, January 2005. Springer.
doi: 10.1007/b105073.
BibTex | DOI | Web page | PDF ]
[FGRV05a]
A. Finkel, G. Geeraerts, J.-F. Raskin, and L. Van Begin. A counter-example the the minimal coverability tree algorithm. Technical Report 535, Université Libre de Bruxelles, Belgium, 2005.
BibTex | Web page | PDF ]
[BC05b]
P. Bouyer and F. Chevalier. On Conciseness of Extensions of Timed Automata. Journal of Automata, Languages and Combinatorics, 10(4):393--405, 2005.
BibTex | Web page | PS | PDF ]
[Dem05c]
S. Demri. Temporal logics, 2005. Course notes, Master Parisien de Recherche en Informatique, Paris, France.
BibTex | Web page | PDF ]
[Bou04c]
P. Bouyer. Timed Automata --- From Theory to Implementation. Invited tutorial, 6th Winter School on Modelling and Verifying Parallel Processes (MOVEP'04), Brussels, Belgium, December 2004. 27 pages.
BibTex ]
[Gas04a]
P. Gastin. Basics of model checking. Invited tutorial, 6th Winter School on Modelling and Verifying Parallel Processes (MOVEP'04), Brussels, Belgium, December 2004.
BibTex ]
[BCFL04]
P. Bouyer, F. Cassez, E. Fleury, and K. G. Larsen. Optimal Strategies in Priced Timed Game Automata. In Proceedings of the 24th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'04), volume 3328 of Lecture Notes in Computer Science, pages 148--160, Chennai, India, December 2004. Springer.
BibTex | Web page | PS | PDF ]
[Mes04]
S. Messika. Méthodes probabilistes pour la vérification des systèmes distribués. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2004.
BibTex | Web page | PDF ]
[BCC+04]
V. Bernat, H. Comon-Lundh, V. Cortier, S. Delaune, F. Jacquemard, P. Lafourcade, Y. Lakhnech, and L. Mazaré. Sufficient conditions on properties for an automated verification: theoretical report on the verification of protocols for an extended model of the intruder. Technical Report 4, projet RNTL PROUVÉ, December 2004. 33 pages.
BibTex | Web page | PS ]
[GLZ04]
P. Gastin, B. Lerman, and M. Zeitoun. Distributed games with causal memory are decidable for series-parallel systems. In Proceedings of the 24th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'04), volume 3328 of Lecture Notes in Computer Science, pages 275--286, Chennai, India, December 2004. Springer.
BibTex | Web page | PS | PDF ]
[DG04]
V. Diekert and P. Gastin. Local temporal logic is expressively complete for cograph dependence alphabets. Information and Computation, 195(1-2):30--52, November 2004.
doi: 10.1016/j.ic.2004.08.001.
BibTex | DOI | Web page | PS | PDF ]
[FMP04a]
A. Finkel, P. McKenzie, and C. Picaronny. A Well-Structured Framework for Analysing Petri Net Extensions. Information and Computation, 195(1-2):1--29, November 2004.
doi: 10.1016/j.ic.2004.01.005.
BibTex | DOI | Web page | PS ]
[DK04]
S. Delaune and F. Klay. Vérification automatique appliquée à un protocole de commerce électronique. In Actes des 6èmes Journées Doctorales Informatique et Réseau (JDIR'04), pages 260--269, Lannion, France, November 2004.
BibTex | Web page | PDF ]
[BF04]
S. Bardin and A. Finkel. Composition of accelerations to verify infinite heterogeneous systems. In Proceedings of the 2nd International Symposium on Automated Technology for Verification and Analysis (ATVA'04), volume 3299 of Lecture Notes in Computer Science, pages 248--262, Taipei, Taiwan, October-November 2004. Springer.
BibTex | Web page | PS ]
[FMP04b]
L. Fribourg, S. Messika, and C. Picaronny. Coupling and Self-Stabilization. In Proceedings of the 18th International Symposium on Distributed Computing (DISC'04), volume 3274 of Lecture Notes in Computer Science, pages 201--215, Amsterdam, The Netherlands, October 2004. Springer.
BibTex | Web page | PDF ]
[Ler04b]
J. Leroux. Disjunctive Invariants for Numerical Systems. In Proceedings of the 2nd International Symposium on Automated Technology for Verification and Analysis (ATVA'04), volume 3299 of Lecture Notes in Computer Science, pages 93--107, Taipei, Taiwan, October-November 2004. Springer.
BibTex | Web page | PS ]
[DJ04a]
S. Delaune and F. Jacquemard. A Decision Procedure for the Verification of Security Protocols with Explicit Destructors. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), pages 278--287, Washington, D.C., USA, October 2004. ACM Press.
BibTex | Web page | PS ]
[Bou04d]
P. Bouyer. Timed Automata --- From Theory to Implementation. Invited tutorial, 1st International Conference on the Quantitative Evaluation of System (QEST'04), Twente, The Netherlands, September 2004.
BibTex ]
[Che04]
F. Chevalier. Détection d'erreurs dans les systèmes temporisés. Rapport de DEA, DEA Algorithmique, Paris, France, September 2004. 59 pages.
BibTex | Web page | PS ]
[DDMR04]
M. De Wulf, L. Doyen, N. Markey, and J.-F. Raskin. Robustness and Implementability of Timed Automata. In Proceedings of the Joint Conferences Formal Modelling and Analysis of Timed Systems (FORMATS'04) and Formal Techniques in Real-Time and Fault-Tolerant Systems (FTRTFT'04), volume 3253 of Lecture Notes in Computer Science, pages 118--133, Grenoble, France, September 2004. Springer.
BibTex | Web page | PS | PDF ]
[GLNZ04]
J. Goubault-Larrecq, S. Lasota, D. Nowak, and Y. Zhang. Complete Lax Logical Relations for Cryptographic Lambda-Calculi. In Proceedings the 18th International Workshop on Computer Science Logic (CSL'04), volume 3210 of Lecture Notes in Computer Science, pages 400--414, Karpacz, Poland, September 2004. Springer.
BibTex | Web page | PS ]
[MS04b]
N. Markey and Ph. Schnoebelen. Symbolic Model Checking for Simply-Timed Systems. In Proceedings of the Joint Conferences Formal Modelling and Analysis of Timed Systems (FORMATS'04) and Formal Techniques in Real-Time and Fault-Tolerant Systems (FTRTFT'04), volume 3253 of Lecture Notes in Computer Science, pages 102--117, Grenoble, France, September 2004. Springer.
BibTex | Web page | PS | PDF ]
[MS04c]
N. Markey and Ph. Schnoebelen. TSMV: A Symbolic Model Checker for Quantitative Analysis of Systems. In Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST'04), pages 330--331, Enschede, The Netherlands, September 2004. IEEE Computer Society Press.
doi: 10.1109/QEST.2004.10028.
BibTex | DOI | Web page | PS | PDF ]
[Rat04]
B. Ratti. Automates d'arbre d'ordre deux. Rapport de DEA, DEA Programmation, Paris, France, September 2004. 45 pages.
BibTex | Web page | PS ]
[Rey04]
P.-A. Reynier. Analyse en avant des automates temporisés. Rapport de DEA, DEA Algorithmique, Paris, France, September 2004. 68 pages.
BibTex | Web page | PS ]
[BHKB04]
M. Bidoit, R. Hennicker, A. Knapp, and H. Baumeister. Glass-Box and Black-Box Views on Object-Oriented Specifications. In Proceedings of the 2nd IEEE International Conference on Software Engineering and Formal Methods (SEFM'04), pages 208--217, Beijing, China, September 2004. IEEE Computer Society Press.
doi: 10.1109/SEFM.2004.10014.
BibTex | DOI | Web page | PDF ]
[Oli04b]
J. Olivain. Net-entropy v1.0: An entropy checker for ciphered network connections, September 2004.
BibTex | Web page ]
[BDFP04]
P. Bouyer, C. Dufourd, E. Fleury, and A. Petit. Updatable Timed Automata. Theoretical Computer Science, 321(2-3):291--345, August 2004.
doi: 10.1016/j.tcs.2004.04.003.
BibTex | DOI | Web page | PS | PDF ]
[KS04]
A. Kučera and Ph. Schnoebelen. A General Approach to Comparing Infinite-State Systems with Their Finite-State Specifications. In Proceedings of the 15th International Conference on Concurrency Theory (CONCUR'04), volume 3170 of Lecture Notes in Computer Science, pages 372--386, London, UK, August 2004. Springer.
doi: 10.1007/978-3-540-28644-8_24.
BibTex | DOI | Web page | PDF ]
[LMS04]
F. Laroussinie, N. Markey, and Ph. Schnoebelen. Model Checking Timed Automata with One or Two Clocks. In Proceedings of the 15th International Conference on Concurrency Theory (CONCUR'04), volume 3170 of Lecture Notes in Computer Science, pages 387--401, London, UK, August 2004. Springer.
doi: 10.1007/978-3-540-28644-8_25.
BibTex | DOI | Web page | PS | PDF ]
[LS04]
J. Leroux and G. Sutre. On Flatness for 2-dimensional Vector Addition Systems with States. In Proceedings of the 15th International Conference on Concurrency Theory (CONCUR'04), volume 3170 of Lecture Notes in Computer Science, pages 402--416, London, UK, August 2004. Springer.
doi: 10.1007/978-3-540-28644-8_26.
BibTex | DOI | Web page | PS ]
[Ler04a]
J. Leroux. The Affine Hull of a Binary Automaton is Computable in Polynomial Time. In Proceedings of the 5th International Workshop on Verification of Infinite State Systems (INFINITY'03), volume 98 of Electronic Notes in Theoretical Computer Science, pages 89--104, Marseilles, France, August 2004. Elsevier Science Publishers.
BibTex | Web page | PS ]
[MR04]
N. Markey and J.-F. Raskin. Model Checking Restricted Sets of Timed Paths. In Proceedings of the 15th International Conference on Concurrency Theory (CONCUR'04), volume 3170 of Lecture Notes in Computer Science, pages 432--447, London, UK, August 2004. Springer.
doi: 10.1007/978-3-540-28644-8_28.
BibTex | DOI | Web page | PS | PDF ]
[Sch04a]
Ph. Schnoebelen, editor. Proceedings of the 5th International Workshop on Verification of Infinite State Systems (INFINITY'03), volume 98 of Electronic Notes in Theoretical Computer Science, Marseilles, France, August 2004. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2003.10.001.
BibTex | DOI ]
[Tre04a]
R. Treinen. The PROUVÉ Specification Language. Technical Report 3, Projet RNTL PROUVÉ, August 2004. 10 pages.
BibTex | Web page | PS ]
[BBP04]
B. Bérard, P. Bouyer, and A. Petit. Analysing the PGM Protocol with Uppaal. International Journal of Production Research, 42(14):2773--2791, July 2004.
BibTex | Web page | PS | PDF ]
[FL04a]
A. Finkel and J. Leroux. Image Computation in Infinite State Model Checking. In Proceedings of the 16th International Conference on Computer Aided Verification (CAV'04), volume 3114 of Lecture Notes in Computer Science, pages 361--371, Boston, Massachusetts, USA, July 2004. Springer.
BibTex | Web page | PS ]
[BH04]
M. Bidoit and R. Hennicker. Glass Box and Black Box Views of State-Based System Specifications. In Proceedings of the 10th International Conference on Algebraic Methodology and Software Technology (AMAST'04), volume 3116 of Lecture Notes in Computer Science, page 19, Stirling, UK, July 2004. Springer. Invited talk.
BibTex ]
[BJ04]
A. Bouhoula and F. Jacquemard. Constrained Tree Grammars to Pilot Automated Proof by Induction. In Proceedings of the 5th Workshop on Strategies in Automated Deduction (STRATEGIES'04), pages 64--78, Cork, Ireland, July 2004.
BibTex | Web page | PDF ]
[Oli04a]
J. Olivain. EVTGEN v1.0: A Programmable Generic Generator of Event Sequences, July 2004. Written in C (about 5000 lines).
BibTex | Web page ]
[Cou04]
J.-M. Couvreur. Contribution à l'algorithmique de la vérification. Mémoire d'habilitation, Université de Bordeaux I, Bordeaux, France, July 2004.
BibTex | Web page | PDF ]
[Rob04]
A. Robin. Aux frontières de la décidabilité... Rapport de DEA, DEA Algorithmique, Paris, France, July 2004. 33 pages.
BibTex | Web page | PS ]
[Hug04]
Th. Hugel. SSP: Stochastic Shortest Paths, July 2004. Written in Caml (about 500 lines).
BibTex ]
[DFH+04]
M. Duflot, L. Fribourg, Th. Hérault, R. Lassaigne, F. Magniette, S. Messika, S. Peyronnet, and C. Picaronny. Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC. Contract Report (Lot 4.2 fourniture 2), projet RNTL Averroes, June 2004. 22 pages.
BibTex | Web page | PS ]
[Bau04]
M. Baudet. Random Polynomial-Time Attacks and Dolev-Yao Models. In Proceedings of the Workshop on Security of Systems: Formalism and Tools (SASYFT'04), Orléans, France, June 2004.
BibTex | Web page | PS | PDF ]
[BBD04]
M. Ben Gaid, B. Bérard, and O. De Smet. Modélisation et vérification d'un évaporateur en Uppaal. In Actes du 6ème Atelier sur les Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'04), pages 223--238, Besançon, France, June 2004.
BibTex | Web page | PS | PDF ]
[BDF04a]
S. Bardin, Ch. Darlot, and A. Finkel. FAST: un model-checker pour systèmes à compteurs. In Actes du 6ème Atelier sur les Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'04), pages 377--380, Besançon, France, June 2004.
BibTex | Web page | PS ]
[BP04a]
S. Bardin and L. Petrucci. COAST: des réseaux de Petri à la planification assistée. In Actes du 6ème Atelier sur les Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'04), pages 285--298, Besançon, France, June 2004.
BibTex | Web page | PS ]
[BP04b]
S. Bardin and L. Petrucci. From PNML to Counter Systems for Accelerating Petri Nets with FAST. In Proceedings of the Workshop on Interchange Format for Petri Nets, pages 26--40, Bologna, Italy, June 2004.
BibTex | Web page | PS ]
[BDF+04b]
S. Bardin, Ch. Darlot, A. Finkel, J. Leroux, and L. Van Begin. FAST v1.5: Fast Acceleration of Symbolic Transition Systems. Available at http://www.lsv.ens-cachan.fr/fast/, June 2004.
BibTex | Web page ]
[FMP04c]
L. Fribourg, S. Messika, and C. Picaronny. Mixing Time of the Asymmetric Simple Exclusion Problem on a Ring with Two Particles. Research Report LSV-04-12, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2004. 15 pages.
BibTex | Web page | PS ]
[Mar04b]
N. Markey. TSMV: model-checking symbolique de systèmes simplement temporisés. In Actes du 6ème Atelier sur les Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'04), pages 349--352, Besançon, France, June 2004.
BibTex | Web page | PS | PDF ]
[BDKT04]
L. Bozga, S. Delaune, F. Klay, and R. Treinen. Spécification du protocole de porte-monnaie électronique. Technical Report 1, projet RNTL PROUVÉ, June 2004. 12 pages.
BibTex | Web page | PS ]
[CDL04]
V. Cortier, S. Delaune, and P. Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Technical Report 2, projet RNTL PROUVÉ, June 2004. 19 pages.
BibTex | Web page | PS ]
[BCG+04]
F. Bréant, J.-M. Couvreur, F. Gilliers, F. Kordon, I. Mounier, E. Paviot-Adet, D. Poitrenaud, D. M. Regep, and G. Sutre. Modeling and Verifying Behavioral Aspects. In Formal Methods for Embedded Distributed Systems: How to Master the Complexity, chapter 6, pages 171--211. Kluwer Academic Publishers, June 2004.
BibTex ]
[DJ04b]
S. Delaune and F. Jacquemard. A Theory of Dictionary Attacks and its Complexity. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), pages 2--15, Asilomar, Pacific Grove, California, USA, June 2004. IEEE Computer Society Press.
BibTex | Web page | PS ]
[MJ04]
O. Michel and F. Jacquemard. An Analysis of the Needham-Schroeder Public-Key Protocol with MGS. In Proceedings of the 5th Workshop on Membrane Computing (WMC'04), pages 295--315, Milano, Italy, June 2004.
BibTex | Web page | PDF ]
[BPP04]
M. Baclet, R. Pacalet, and A. Petit. Register Transfer Level Simulation. Research Report LSV-04-10, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2004. 15 pages.
BibTex | Web page | PS ]
[BC04a]
M. Baclet and R. Chevallier. Using UPPAAL to Verify an On-Chip Memory. Research Report LSV-04-11, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2004. 12 pages.
BibTex | Web page | PS ]
[BC04b]
M. Baclet and R. Chevallier. Using UPPAAL to verify an on-chip memory. Contract Report (Work Package 3.2 Fourniture 1), projet T126 MEDEA+ Blueberries, May 2004. 12 pages.
BibTex | Web page | PS ]
[Bou04b]
P. Bouyer. Forward Analysis of Updatable Timed Automata. Formal Methods in System Design, 24(3):281--320, May 2004.
doi: 10.1023/B:FORM.0000026093.21513.31.
BibTex | DOI | Web page | PS | PDF ]
[Now04]
D. Nowak. Logical Relations for Monadic Types. Invited talk, International Workshop on Formal Methods and Security (IWFMS'04), Nanjing, China, May 2004.
BibTex ]
[Mar04a]
N. Markey. Past is for Free: On the Complexity of Verifying Linear Temporal Properties with Past. Acta Informatica, 40(6-7):431--458, May 2004.
doi: 10.1007/s00236-003-0136-5.
BibTex | DOI | Web page | PS | PDF ]
[Bou04e]
P. Bouyer. Timed Models for Concurrent Systems. Invited lecture, 32nd Spring School on Theoretical Computer Science (Concurrency Theory), Luminy, France, April 2004.
BibTex ]
[Gas04b]
P. Gastin. Specifications for distributed systems. Invited lecture, 32nd Spring School on Theoretical Computer Science (Concurrency Theory), Luminy, France, April 2004.
BibTex ]
[BFN04]
S. Bardin, A. Finkel, and D. Nowak. Toward Symbolic Verification of Programs Handling Pointers. In Proceedings of the 3rd International Workshop on Automated Verification of Infinite-State Systems (AVIS'04), Barcelona, Spain, April 2004.
BibTex | Web page | PS ]
[BS04]
N. Bertrand and Ph. Schnoebelen. Verifying Nondeterministic Channel Systems With Probabilistic Message Losses. In Proceedings of the 3rd International Workshop on Automated Verification of Infinite-State Systems (AVIS'04), Barcelona, Spain, April 2004.
BibTex | Web page | PDF ]
[FL04b]
A. Finkel and J. Leroux. Polynomial Time Image Computation With Interval-Definable Counters Systems. In Proceedings of the 11th International SPIN Workshop on Model Checking Software (SPIN'04), volume 2989 of Lecture Notes in Computer Science, pages 182--197, Barcelona, Spain, April 2004. Springer.
BibTex | Web page | PS ]
[BBL04]
P. Bouyer, E. Brinksma, and K. G. Larsen. Staying Alive As Cheaply As Possible. In Proceedings of the 7th International Conference on Hybrid Systems: Computation and Control (HSCC'04), volume 2993 of Lecture Notes in Computer Science, pages 203--218, Philadelphia, Pennsylvania, USA, March 2004. Springer.
BibTex | Web page | PS | PDF ]
[BBLP04]
G. Behrmann, P. Bouyer, K. G. Larsen, and R. Pelánek. Lower and Upper Bounds in Zone Based Abstractions of Timed Automata. In Proceedings of the 10th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'04), volume 2988 of Lecture Notes in Computer Science, pages 312--326, Barcelona, Spain, March 2004. Springer.
BibTex | Web page | PS | PDF ]
[BFL04]
S. Bardin, A. Finkel, and J. Leroux. FASTer Acceleration of Counter Automata in Practice. In Proceedings of the 10th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'04), volume 2988 of Lecture Notes in Computer Science, pages 576--590, Barcelona, Spain, March 2004. Springer.
BibTex | Web page | PS ]
[CC04]
H. Comon-Lundh and V. Cortier. Security Properties: Two Agents are Sufficient. Science of Computer Programming, 50(1-3):51--71, March 2004.
BibTex | Web page | PS ]
[DCMM04]
J. M. Davoren, V. Coulthard, N. Markey, and Th. Moor. Non-deterministic Temporal Logics for General Flow Systems. In Proceedings of the 7th International Conference on Hybrid Systems: Computation and Control (HSCC'04), volume 2993 of Lecture Notes in Computer Science, pages 280--295, Philadelphia, Pennsylvania, USA, March 2004. Springer.
BibTex | Web page | PS | PDF ]
[Dem04b]
S. Demri. LTL over Integer Periodicity Constraints. In Proceedings of the 7th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'04), volume 2987 of Lecture Notes in Computer Science, pages 121--135, Barcelona, Spain, March 2004. Springer.
BibTex | Web page | PS | PDF ]
[Com04]
H. Comon-Lundh. Intruder Theories (Ongoing Work). In Proceedings of the 7th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'04), volume 2987 of Lecture Notes in Computer Science, pages 1--4, Barcelona, Spain, March 2004. Springer. Invited talk.
BibTex ]
[Bou04a]
P. Bouyer. Automates temporisés, de la théorie à l'implémentation. Invited talk, Journées Formalisation des Activit?s Concurrentes (FAC'04), Toulouse, France, March 2004.
BibTex ]
[DFP04]
M. Duflot, L. Fribourg, and C. Picaronny. Randomized Dining Philosophers Without Fairness Assumption. Distributed Computing, 17(1):65--76, February 2004.
doi: 10.1007/s00446-003-0102-z.
BibTex | DOI | Web page | PS ]
[BM04]
M. Bidoit and P. D. Mosses. CASL User Manual --- Introduction to Using the Common Algebraic Specification Language, volume 2900 of Lecture Notes in Computer Science. Springer, 2004.
doi: 10.1007/b11968.
BibTex | DOI | Web page ]
[Sch04b]
Ph. Schnoebelen. The Verification of Probabilistic Lossy Channel Systems. In Validation of Stochastic Systems: A Guide to Current Research, volume 2925 of Lecture Notes in Computer Science, pages 445--465. Springer, 2004.
BibTex | Web page | PS | PDF ]
[BST04]
M. Bidoit, D. Sannella, and A. Tarlecki. Toward Component-Oriented Formal Software Development: An Algebraic Approach. In Revised Papers of the 9th International Workshop on Radical Innovations of Software and Systems Engineering in the Future (RISSEF'02), volume 2941 of Lecture Notes in Computer Science, pages 75--90, Venice, Italy, 2004. Springer.
BibTex | Web page | PS | PDF ]
[MS04a]
N. Markey and Ph. Schnoebelen. A PTIME-Complete Matching Problem for SLP-Compressed Words. Information Processing Letters, 90(1):3--6, January 2004.
doi: 10.1016/j.ipl.2004.01.002.
BibTex | DOI | Web page | PS | PDF ]
[Tre04b]
R. Treinen. RTALOOP: The RTA List of Open Problems. Web site at http://www.lsv.ens-cachan.fr/rtaloop/, started 1997, 2004. Size as of July 2004: 100 problems, 90 pages, 432 references.
BibTex | Web page ]
[Dem04a]
S. Demri. Complexité algorithmique de variantes de LTL pour la vérification, 2004. Course notes, DEA Algorithmique, Paris, France.
BibTex | Web page | PDF ]
[Cor03a]
V. Cortier. A Guide for SECURIFY. Technical Report 13, projet RNTL EVA, December 2003. 9 pages.
BibTex | Web page | PDF ]
[Ler03]
J. Leroux. Algorithmique de la vérification des systèmes à compteurs. Approximation et accélération. Implémentation de l'outil FAST. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2003.
BibTex | Web page | PS ]
[BL03]
B. Bérard and F. Laroussinie. Vérification compositionnelle des p-automates. Contract Report (Lot 4.1 fourniture 1), Projet RNTL Averroes, November 2003. 16 pages.
BibTex ]
[BFN03b]
S. Bardin, A. Finkel, and D. Nowak. Rapport final. Contract Report P11L03/F01304/0 + 50.0241, collaboration entre EDF et le LSV, November 2003. 50 pages.
BibTex ]
[CJ03]
H. Comon and F. Jacquemard. Ground Reducibility is EXPTIME-complete. Information and Computation, 187(1):123--153, November 2003.
BibTex | Web page | PS | PDF ]
[GB03a]
A. Galland and M. Baudet. Controlling and Optimizing the Usage of One Resource. In Proceedings of the 1st Asian Symposium on Programming Languages and Systems (APLAS'03), volume 2895 of Lecture Notes in Computer Science, pages 195--211, Beijing, China, November 2003. Springer.
BibTex | Web page | PS | PDF ]
[KNT03]
M. Kerbœuf, D. Nowak, and J.-P. Talpin. Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures. In Proceedings of the 5th International Conference on Formal Engineering Methods (ICFEM'03), volume 2885 of Lecture Notes in Computer Science, pages 359--374, Singapore, November 2003. Springer.
BibTex | Web page | PS ]
[Del03c]
S. Delaune. Vérification de protocoles de sécurité dans un modèle de l'intrus étendu. Research Report LSV-03-15, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2003.
BibTex | Web page | PS ]
[BBP03]
B. Bérard, P. Bouyer, and A. Petit. Une analyse du protocole PGM avec UPPAAL. In Actes du 4ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'03), pages 415--430, Metz, France, October 2003. Hermès.
BibTex | Web page | PS ]
[BP03]
M. Baclet and R. Pacalet. Vérifications du protocole VCI. In Actes du 4ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'03), pages 431--445, Metz, France, October 2003. Hermès.
BibTex | Web page | PS ]
[GB03b]
A. Galland and M. Baudet. Économiser l'or du banquier. In Actes de la 3ème Conférence Française sur les Systèmes d'Exploitation (CFSE'03), pages 638--649, La Colle sur Loup, France, October 2003. INRIA.
BibTex | Web page | PS | PDF ]
[DDG+03]
S. Demri, M. Ducassé, J. Goubault-Larrecq, L. Mé, J. Olivain, C. Picaronny, J.-Ph. Pouzol, É. Totel, and B. Vivinis. Algorithmes de détection et langages de signatures. Contract Report (Sous-projet 3, livrable 3), projet RNTL DICO, October 2003. 72 pages.
BibTex ]
[Rog03b]
M. Roger. Raffinements de la résolution et vérification de protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2003.
BibTex | Web page | PS ]
[MS03b]
N. Markey and Ph. Schnoebelen. TSMV v1.0. Available at http://www.lsv.ens-cachan.fr/~markey/TSMV/, October 2003. See description in [MS04b]. Written in C (about 4000 lines on top of NuSMV v2.1.2).
BibTex | Web page ]
[Ber03]
V. Bernat. Towards a Logic for Verification of Security Protocols. In Proceedings of the Workshop on Security Protocols Verification (SPV'03), pages 31--35, Marseilles, France, September 2003.
BibTex | Web page | PS ]
[Del03a]
S. Delaune. Intruder Deduction Problem in Presence of Guessing Attacks. In Proceedings of the Workshop on Security Protocols Verification (SPV'03), pages 26--30, Marseilles, France, September 2003.
BibTex | Web page | PDF ]
[Del03b]
S. Delaune. Vérification de protocoles de sécurité dans un modèle de l'intrus étendu. Rapport de DEA, DEA Programmation, Paris, France, September 2003.
BibTex | Web page | PS ]
[Dem03a]
S. Demri. (Modal) Logics for Semistructured Data (Bis). Invited talk, 3rd Workshop on Methods for Modalities (M4M'03), Nancy, France, September 2003.
BibTex ]
[DdN03]
S. Demri and H. de Nivelle. Relational Translations into GF2. In Proceedings of the 3rd Workshop on Methods for Modalities (M4M-3), pages 93--108, Nancy, France, September 2003.
BibTex ]
[Jac03c]
F. Jacquemard. Reachability and Confluence are Indecidable for Flat Term Rewriting Systems. Information Processing Letters, 87(5):265--270, September 2003.
BibTex | Web page | PS ]
[Bac03]
M. Baclet. Logical Characterization of Aperiodic Data Languages. Research Report LSV-03-12, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2003. 16 pages.
BibTex | Web page | PS ]
[Boi03]
A. Boisseau. Abstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2003.
BibTex | Web page | PS | PDF ]
[Duf03]
M. Duflot. Algorithmes distribués sur des anneaux paramétrés --- Preuves de convergence probabiliste et déterministe. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2003.
BibTex | Web page | PS ]
[Ver03a]
K. N. Verma. Automates d'arbres bidirectionnels modulo théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2003.
BibTex | Web page | PS ]
[CSS03]
J.-M. Couvreur, N. Saheb, and G. Sutre. An Optimal Automata Approach to LTL Model Checking of Probabilistic Systems. In Proceedings of the 10th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'03), volume 2850 of Lecture Notes in Artificial Intelligence, pages 361--375, Almaty, Kazakhstan, September 2003. Springer.
BibTex | Web page | PS ]
[Lar03]
F. Laroussinie. Automates temporisés et hybrides, modélisation et vérification. Invited lecture, école d'été ETR 2003 (École Temps Réel), Toulouse, France, September 2003.
BibTex ]
[Ben03]
M. Ben Gaid. Modélisation et vérification des aspects temporisés des langages pour automates programmables industriels. Rapport de DEA, DEA Informatique Distribuée, Orsay, France, September 2003. 68 pages.
BibTex | Web page | PDF ]
[Ver03b]
K. N. Verma. On Closure under Complementation of Equational Tree Automata for Theories Extending AC. In Proceedings of the 10th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'03), volume 2850 of Lecture Notes in Artificial Intelligence, pages 183--195, Almaty, Kazakhstan, September 2003. Springer.
BibTex | Web page | PS ]
[BFN03a]
S. Bardin, A. Finkel, and D. Nowak. Note de synthèse à 10 mois. Contract Report P11L03/F01304/0 + 50.0241, collaboration entre EDF et le LSV, August 2003. 21 pages.
BibTex ]
[BFL+03b]
S. Bardin, A. Finkel, J. Leroux, L. Petrucci, and L. Worobel. FAST User's Manual, August 2003. 33 pages.
BibTex | Web page | PS ]
[Wor03]
L. Worobel. INTERFAST v1.0: A GUI for FAST, August 2003. See [BFL+03b] for description. Written in Java (6300 lines) and C (1600 lines), using Java Cup.
BibTex | Web page ]
[MS03a]
N. Markey and Ph. Schnoebelen. Model Checking a Path (Preliminary Report). In Proceedings of the 14th International Conference on Concurrency Theory (CONCUR'03), volume 2761 of Lecture Notes in Computer Science, pages 251--265, Marseilles, France, August 2003. Springer.
doi: 10.1007/b11938.
BibTex | DOI | Web page | PS | PDF ]
[ZN03]
Y. Zhang and D. Nowak. Logical Relations for Dynamic Name Creation. In Proceedings of the 17th International Workshop on Computer Science Logic (CSL'03), volume 2803 of Lecture Notes in Computer Science, pages 575--588, Vienna, Austria, August 2003. Springer.
BibTex | Web page | PS ]
[BDMP03]
P. Bouyer, D. D'Souza, P. Madhusudan, and A. Petit. Timed Control with Partial Observability. In Proceedings of the 15th International Conference on Computer Aided Verification (CAV'03), volume 2725 of Lecture Notes in Computer Science, pages 180--192, Boulder, Colorado, USA, July 2003. Springer.
BibTex | Web page | PS | PDF ]
[BFNS03]
S. Bardin, A. Finkel, D. Nowak, and Ph. Schnoebelen. Note de synthèse à 6 mois. Contract Report P11L03/F01304/0 + 50.0241, collaboration entre EDF et le LSV, July 2003. 43 pages.
BibTex ]
[Jac03a]
F. Jacquemard. The EVA Translator, version 2. Technical Report 9, projet RNTL EVA, July 2003. 38 pages.
BibTex | Web page | PDF ]
[Jac03b]
F. Jacquemard. The EVA translator, version 2, July 2003. See [Jac03a] for description. Written in OCaml (about 11000 lines).
BibTex ]
[BFLP03]
S. Bardin, A. Finkel, J. Leroux, and L. Petrucci. FAST: Fast Acceleration of Symbolic Transition Systems. In Proceedings of the 15th International Conference on Computer Aided Verification (CAV'03), volume 2725 of Lecture Notes in Computer Science, pages 118--121, Boulder, Colorado, USA, July 2003. Springer.
BibTex | Web page | PS ]
[BFL03a]
S. Bardin, A. Finkel, and J. Leroux. FAST v1.0: Fast Acceleration of Symbolic Transition Systems, July 2003. See [BFLP03] for description. Written in C++ (about 4400 lines on top of the MONA v1.4 library).
BibTex | Web page ]
[FMP03b]
L. Fribourg, S. Messika, and C. Picaronny. Traces of Randomized Distributed Algorithms As Markov Fields. Application to Rapid Mixing. Research Report LSV-03-10, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2003. 19 pages.
BibTex | Web page | PS ]
[Jac03d]
F. Jacquemard. SPORE: Security Protocols Open REpository, July 2003. Works with Perl scripts (about 1200 lines) and contains about 50 protocol descriptions (as of Aug. 2004).
BibTex | Web page ]
[CC03a]
H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols. In Proceedings of the 14th International Conference on Rewriting Techniques and Applications (RTA'03), volume 2706 of Lecture Notes in Computer Science, pages 148--164, Valencia, Spain, June 2003. Springer.
BibTex | Web page | PS ]
[PKBQ03]
L. Petrucci, L. M. Kristensen, J. Billington, and Z. H. Qureshi. Developing a Formal Specification for the Mission System of a Maritime Surveillance Aircraft. In Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD'03), pages 92--101, Guimarães, Portugal, June 2003. IEEE Computer Society Press.
BibTex | Web page | PS ]
[LN03]
R. Lazić and D. Nowak. On a Semantic Definition of Data Independence. In Proceedings of the 6th International Conference on Typed Lambda Calculi and Applications (TLCA'03), volume 2701 of Lecture Notes in Computer Science, pages 226--240, Valencia, Spain, June 2003. Springer.
BibTex | Web page | PS ]
[Sch03c]
Ph. Schnoebelen. Oracle circuits for branching-time model checking. In Proceedings of the 30th International Colloquium on Automata, Languages and Programming (ICALP'03), volume 2719 of Lecture Notes in Computer Science, pages 790--801, Eindhoven, The Netherlands, June 2003. Springer.
BibTex | Web page | PS | PDF ]
[CS03b]
H. Comon-Lundh and V. Shmatikov. Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive Or. In Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 271--280, Ottawa, Canada, June 2003. IEEE Computer Society Press.
BibTex ]
[BCvH+03]
J. Billington, S. Christensen, K. M. van Hee, E. Kindler, O. Kummer, L. Petrucci, R. Post, Ch. Stehno, and M. Weber. The Petri Net Markup Language: Concepts, Technology and Tools. In Proceedings of the 24th International Conference on Applications and Theory of Petri Nets (ICATPN'03), volume 2679 of Lecture Notes in Computer Science, pages 483--505, Eindhoven, The Netherlands, June 2003. Springer. Invited paper.
BibTex | Web page | PS ]
[Ver03c]
K. N. Verma. Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties. In Proceedings of the 14th International Conference on Rewriting Techniques and Applications (RTA'03), volume 2706 of Lecture Notes in Computer Science, pages 180--196, Valencia, Spain, June 2003. Springer.
BibTex | Web page | PS ]
[ABBL03]
L. Aceto, P. Bouyer, A. Burgueño, and K. G. Larsen. The Power of Reachability Testing for Timed Automata. Theoretical Computer Science, 300(1-3):411--475, May 2003.
doi: 10.1016/S0304-3975(02)00334-1.
BibTex | DOI | Web page | PS ]
[BPT03]
P. Bouyer, A. Petit, and D. Thérien. An Algebraic Approach to Data Languages and Timed Languages. Information and Computation, 182(2):137--162, May 2003.
BibTex | Web page | PS | PDF ]
[Dem03b]
S. Demri. A Polynomial-Space Construction of Tree-Like Models for Logics with Local Chains of Modal Connectives. Theoretical Computer Science, 300(1-3):235--258, May 2003.
doi: 10.1016/S0304-3975(02)00082-8.
BibTex | DOI | Web page | PS | PDF ]
[J+03]
B. Jonsson et al. Roadmap on Component-based Design and Integration Platforms. Contract Report (Deliverable W1.A2.N1.Y1), European Project IST-2001-34820 "ARTIST" Advanced Real-Time Systems, May 2003. 78 pages.
BibTex ]
[Sch03b]
Ph. Schnoebelen. Model Checking Branching-Time Temporal Logics. Invited talk, Franco-Israeli Workshop on Semantics and Verification of Hardware and Software Systems, Tel-Aviv, Israel, May 2003.
BibTex ]
[BBFL03]
G. Behrmann, P. Bouyer, E. Fleury, and K. G. Larsen. Static Guard Analysis in Timed Automata Verification. In Proceedings of the 9th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'03), volume 2619 of Lecture Notes in Computer Science, pages 254--277, Warsaw, Poland, April 2003. Springer.
BibTex | Web page | PS | PDF ]
[BS03]
N. Bertrand and Ph. Schnoebelen. Model Checking Lossy Channels Systems Is Probably Decidable. In Proceedings of the 6th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of Lecture Notes in Computer Science, pages 120--135, Warsaw, Poland, April 2003. Springer.
BibTex | Web page | PS | PDF ]
[CC03b]
H. Comon-Lundh and V. Cortier. Security properties: two agents are sufficient. In Proceedings of the 12th European Symposium on Programming (ESOP'03), volume 2618 of Lecture Notes in Computer Science, pages 99--113, Warsaw, Poland, April 2003. Springer.
BibTex | Web page | PS ]
[FMP03a]
L. Fribourg, S. Messika, and C. Picaronny. On the Absence of Phase Transition in Randomized Distributed Algorithms. Research Report LSV-03-7, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2003. 17 pages.
BibTex | Web page | PS ]
[Mar03a]
N. Markey. Logiques temporelles pour la vérification: expressivité, complexité, algorithmes. Thèse de doctorat, Laboratoire d'Informatique Fondamentale d'Orléans, France, April 2003.
BibTex | Web page | PS | PDF ]
[BHK03]
M. Bidoit, R. Hennicker, and A. Kurz. Observational Logic, Constructor-Based Logic, and their Duality. Theoretical Computer Science, 298(3):471--510, April 2003.
BibTex | Web page | PS ]
[Cor03b]
V. Cortier. Vérification automatique des protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2003.
BibTex | Web page | PS ]
[LST03]
F. Laroussinie, Ph. Schnoebelen, and M. Turuani. On the Expressivity and Complexity of Quantitative Branching-Time Temporal Logics. Theoretical Computer Science, 297(1-3):297--315, March 2003.
doi: 10.1016/S0304-3975(02)00644-8.
BibTex | DOI | Web page | PS ]
[Bou03]
P. Bouyer. Untameable Timed Automata! In Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS'03), volume 2607 of Lecture Notes in Computer Science, pages 620--631, Berlin, Germany, February 2003. Springer.
BibTex | Web page | PS | PDF ]
[CT03]
H. Comon-Lundh and R. Treinen. Easy Intruder Deductions. In Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, volume 2772 of Lecture Notes in Computer Science, pages 225--242. Springer, February 2003. Invited paper.
BibTex | Web page | PS ]
[FPS03]
A. Finkel, S. Purushothaman Iyer, and G. Sutre. Well-Abstracted Transition Systems: Application to FIFO Automata. Information and Computation, 181(1):1--31, February 2003.
BibTex | Web page | PS ]
[Mar03b]
N. Markey. Temporal Logic with Past is Exponentially More Succinct. EATCS Bulletin, 79:122--128, February 2003.
BibTex | Web page | PS | PDF ]
[Gou03]
J. Goubault-Larrecq, editor. Proceedings of the 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV 2001), volume 55 of Electronic Notes in Theoretical Computer Science, Paris, France, January 2003. Elsevier Science Publishers.
doi: 10.1016/S1571-0661(05)80576-6.
BibTex | DOI ]
[ADdR03]
N. Alechina, S. Demri, and M. de Rijke. A Modal Perspective on Path Constraints. Journal of Logic and Computation, 13(6):939--956, 2003.
BibTex | Web page | PS | PDF ]
[BFKM03]
B. Bérard, L. Fribourg, F. Klay, and J.-F. Monin. A Compared Study of Two Correctness Proofs for the Standardized Algorithm of ABR Conformance. Formal Methods in System Design, 22(1):59--86, January 2003.
doi: 10.1023/A:1021704214464.
BibTex | DOI | Web page | PS ]
[CNNR03]
H. Comon, P. Narendran, R. Nieuwenhuis, and M. Rusinowitch. Deciding the Confluence of Ordered Term Rewrite Systems. ACM Transactions on Computational Logic, 4(1):33--55, January 2003.
BibTex ]
[GG03]
J. Goubault-Larrecq and É. Goubault. On the Geometry of Intuitionistic S4 Proofs. Homology, Homotopy and Applications, 5(2):137--209, 2003.
BibTex | Web page | PS ]
[DW03]
Ph. David and H. Waeselynck, editors. Logiciel libre et sûreté de fonctionnement: cas des systèmes critiques. Hermès, 2003.
BibTex | Web page ]
[CS03a]
H. Comon-Lundh and V. Shmatikov. Constraint Solving, Exclusive Or and the Decision of Confidentiality for Security Protocols Assuming a Bounded Number of Sessions. Research Report LSV-03-1, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2003. 17 pages.
BibTex | Web page | PS ]
[Rog03a]
M. Roger. MOP: MOdular Prover, 2003. See description in [?]. Written in OCaml (9611 lines).
BibTex ]
[CP03]
J.-M. Couvreur and D. Poitrenaud. Dépliage pour la vérification de propriétés temporelles. In Vérification et mise en œuvre des réseaux de Petri --- Tome 2, chapter 3, pages 127--161. Hermès, January 2003.
BibTex ]
[Sch03a]
Ph. Schnoebelen. The Complexity of Temporal Logic Model Checking. In Selected Papers from the 4th Workshop on Advances in Modal Logics (AiML'02), pages 393--436, Toulouse, France, 2003. King's College Publication. Invited paper.
BibTex | Web page | PS | PDF ]
[CD03]
V. Cortier and S. Delaune. Securify version 2, 2003. See [Cor03a] for description. Written in Caml (about 3300 lines).
BibTex | Web page ]
[Pet03]
L. Petrucci. symprod: construction et analyse du produit synchronisé modulaire d'automates, 2003.
BibTex ]
[DD02]
S. Demri and D. D'Souza. An Automata-Theoretic Approach to Constraint LTL. In Proceedings of the 22nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'02), volume 2556 of Lecture Notes in Computer Science, pages 121--132, Kanpur, India, December 2002. Springer.
BibTex | Web page | PS ]
[FL02]
A. Finkel and J. Leroux. How To Compose Presburger-Accelerations: Applications to Broadcast Protocols. In Proceedings of the 22nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'02), volume 2556 of Lecture Notes in Computer Science, pages 145--156, Kanpur, India, December 2002. Springer.
BibTex | Web page | PS ]
[LN02]
R. Lazić and D. Nowak. On a Semantic Definition of Data Independence. Research Report CS-RR-392, Department of Computer Science, University of Warwick, UK, December 2002. 19 pages.
BibTex | Web page | PS ]
[Bla02]
B. Blanc. Prise en compte de principes architecturaux lors de la formalisation des besoins. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2002.
BibTex | Web page | PS ]
[Fle02]
E. Fleury. Automates temporisés avec mises à jour. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2002.
BibTex | Web page | PS ]
[HS02a]
N. Halbwachs and Ph. Schnoebelen. Vérification de propriétés quantitatives. Final report, Action Spécifique 22 du Département STIC du CNRS, December 2002.
BibTex ]
[Pet02]
L. Petrucci. Modélisation, vérification et applications. Mémoire d'habilitation, Université d'Évry, France, December 2002.
BibTex | Web page | PS ]
[Gou02h]
J. Goubault-Larrecq. Un algorithme pour l'analyse de logs. Research Report LSV-02-18, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2002. 33 pages.
BibTex | Web page | PS ]
[Bou02a]
P. Bouyer. A Logical Characterization of Data Languages. Information Processing Letters, 84(2):75--85, October 2002.
BibTex | Web page | PS ]
[KBP+02]
L. M. Kristensen, J. Billington, L. Petrucci, Z. H. Qureshi, and R. Kiefer. Formal specification and analysis of airborne mission systems. In Proceedings of the 21st IEEE Digital Avionics Systems Conference (DASC'02), volume 1, pages 4.D.4.1--4.D.4.13, Irvine, California, USA, October 2002. IEEE Aerospace and Electronic Systems Society.
BibTex | Web page | PS ]
[PKB02]
L. Petrucci, L. M. Kristensen, and J. Billington. Modelling and Analysis of Airborne Mission Systems. Final report, phase 4, DSTO/UniSA contract, October 2002. 68 pages.
BibTex ]
[Cor02a]
V. Cortier. About the Decision of Reachability for Register Machines. Informatique Théorique et Applications, 36(4):341--358, October-December 2002.
BibTex | Web page | PS ]
[Bac02]
M. Baclet. Langages de données. Rapport de DEA, DEA Algorithmique, Paris, France, September 2002.
BibTex | Web page | PS ]
[Ber02b]
V. Bernat. Transformation de l'authentification en secret. Rapport de DEA, DEA Algorithmique, Paris, France, September 2002.
BibTex ]
[GLN02]
J. Goubault-Larrecq, S. Lasota, and D. Nowak. Logical Relations for Monadic Types. In Proceedings of the 16th International Workshop on Computer Science Logic (CSL'02), volume 2471 of Lecture Notes in Computer Science, pages 553--568, Edinburgh, Scotland, UK, September 2002. Springer.
BibTex | Web page | PS ]
[HS02b]
S. Hornus and Ph. Schnoebelen. On Solving Temporal Logic Queries. In Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology (AMAST'02), volume 2422 of Lecture Notes in Computer Science, pages 163--177, Saint Gilles les Bains, Reunion Island, France, September 2002. Springer.
BibTex | Web page | PS | PDF ]
[Gou02b]
J. Goubault-Larrecq. Higher-Order Positive Set Constraints. In Proceedings of the 16th International Workshop on Computer Science Logic (CSL'02), volume 2471 of Lecture Notes in Computer Science, pages 473--489, Edinburgh, Scotland, UK, September 2002. Springer.
BibTex | Web page | PS ]
[Gou02a]
J. Goubault-Larrecq, editor. Actes du 1er Workshop International sur la Sécurité des Communications sur Internet (SECI'02), Tunis, Tunisia, September 2002. INRIA.
BibTex | Web page ]
[Gou02i]
J. Goubault-Larrecq. Vérification de protocoles cryptographiques: la logique à la rescousse! In Actes du 1er Workshop International sur la Sécurité des Communications sur Internet (SECI'02), pages 119--152, Tunis, Tunisia, September 2002. INRIA. Invited paper.
BibTex | Web page | PS ]
[GV02]
J. Goubault-Larrecq and K. N. Verma. Alternating Two-Way AC-Tree Automata. Research Report LSV-02-11, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2002. 21 pages.
BibTex | Web page | PS ]
[FMP02]
L. Fribourg, S. Messika, and C. Picaronny. Traces of Randomized Distributed Algorithms as Gibbs Fields. Research Report LSV-02-12, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2002. 16 pages.
BibTex | Web page | PS ]
[Las02b]
S. Lasota. A Polynomial-Time Algorithm for Deciding True Concurrency Equivalences of Basic Parallel Processes. Research Report LSV-02-13, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2002. 16 pages.
BibTex | Web page | PS ]
[Bau02]
M. Baudet. Contrôle de ressource et évitement des interblocages sur la mémoire. Rapport de DEA, DEA Programmation, Paris, France, September 2002.
BibTex | Web page | PS | PDF ]
[Ber02c]
N. Bertrand. Vérification de canaux à pertes stochastiques. Rapport de DEA, DEA Algorithmique, Paris, France, September 2002.
BibTex | Web page | PS ]
[ABK+02]
E. Astesiano, M. Bidoit, H. Kirchner, B. Krieg-Brückner, P. D. Mosses, D. Sannella, and A. Tarlecki. CASL: The Common Algebraic Specification Language. Theoretical Computer Science, 286(2):153--196, September 2002.
BibTex | Web page | PS ]
[Mes02]
S. Messika. Vérification paramétrée de réseaux à processus probabiliste. Application du théorème de Hammersley et Clifford aux algorithmes distribués. Rapport de DEA, DEA Logique et Fondements de l'Informatique, Paris, France, September 2002.
BibTex | Web page | PS ]
[Sch02b]
Ph. Schnoebelen. Verifying Lossy Channel Systems has Nonprimitive Recursive Complexity. Information Processing Letters, 83(5):251--261, September 2002.
doi: 10.1016/S0020-0190(01)00337-4.
BibTex | DOI | Web page | PS | PDF ]
[Zha02]
Y. Zhang. Logical Relations For Names. Rapport de DEA, DEA Programmation, Paris, France, September 2002.
BibTex | Web page | PS ]
[BST02b]
M. Bidoit, D. Sannella, and A. Tarlecki. Global Development via Local Observational Construction Steps. In Proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science (MFCS'02), volume 2420 of Lecture Notes in Computer Science, pages 1--24, Warsaw, Poland, August 2002. Springer. Invited paper.
BibTex | Web page | PS ]
[DFP02]
M. Duflot, L. Fribourg, and C. Picaronny. Randomized Dining Philosophers without Fairness Assumption. In Proceedings of the 2nd IFIP International Conference on Theoretical Computer Science (IFIP TCS'02), volume 223 of IFIP Conference Proceedings, pages 169--180, Montréal, Québec, Canada, August 2002. Kluwer Academic Publishers.
BibTex | Web page | PS ]
[FRSV02]
A. Finkel, J.-F. Raskin, M. Samuelides, and L. Van Begin. Monotonic Extensions of Petri Nets: Forward and Backward Search Revisited. In Proceedings of the 4th International Workshop on Verification of Infinite State Systems (INFINITY'02), volume 68 of Electronic Notes in Theoretical Computer Science, pages 121--144, Brno, Czech Republic, August 2002. Elsevier Science Publishers.
BibTex | Web page | PS ]
[MS02]
B. Masson and Ph. Schnoebelen. On Verifying Fair Lossy Channel Systems. In Proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science (MFCS'02), volume 2420 of Lecture Notes in Computer Science, pages 543--555, Warsaw, Poland, August 2002. Springer.
BibTex | Web page ]
[Mar02]
N. Markey. Past is for Free: On the Complexity of Verifying Linear Temporal Properties with Past. In Proceedings of the 9th International Workshop on Expressiveness in Concurrency (EXPRESS'02), volume 68 of Electronic Notes in Theoretical Computer Science, pages 87--104, Brno, Czech Republic, August 2002. Elsevier Science Publishers.
doi: 10.1016/S1571-0661(05)80366-4.
BibTex | DOI | Web page | PS | PDF ]
[PKG+02]
L. Petrucci, L. M. Kristensen, G. E. Gallasch, M. Elliot, P. Dauchy, J. Billington, and M. Aziz. Modelling and Analysis of Airborne Mission Systems. Contract Report Final report for phase 3, DSTO/UniSA contract, August 2002. 79 pages.
BibTex ]
[AL02]
L. Aceto and F. Laroussinie. Is Your Model Checker on Time? On the Complexity of Model Checking for Timed Modal Logics. Journal of Logic and Algebraic Programming, 52-53:7--51, August 2002.
doi: 10.1016/S1567-8326(02)00022-X.
BibTex | DOI | Web page | PS ]
[BBP02]
B. Bérard, P. Bouyer, and A. Petit. Analysing the PGM Protocol with UPPAAL. In Proceedings of the 2nd Workshop on Real-Time Tools (RT-TOOLS'02), Copenhagen, Denmark, August 2002. Uppsala University.
BibTex | Web page | PS ]
[Las02a]
S. Lasota. Decidability of Strong Bisimilarity for Timed BPP. In Proceedings of the 13th International Conference on Concurrency Theory (CONCUR'02), volume 2421 of Lecture Notes in Computer Science, pages 562--578, Brno, Czech Republic, August 2002. Springer.
BibTex | Web page | PS ]
[BST02a]
M. Bidoit, D. Sannella, and A. Tarlecki. Architectural Specifications in CASL. Formal Aspects of Computing, 13(3-5):252--273, July 2002.
doi: 10.1007/s001650200012.
BibTex | DOI | Web page | PS ]
[LMS02b]
F. Laroussinie, N. Markey, and Ph. Schnoebelen. Temporal Logic with Forgettable Past. In Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science (LICS'02), pages 383--392, Copenhagen, Denmark, July 2002. IEEE Computer Society Press.
doi: 10.1109/LICS.2002.1029846.
BibTex | DOI | Web page | PS | PDF ]
[Gou02f]
J. Goubault-Larrecq. SKInT Labels. Research Report LSV-02-7, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2002. 15 pages.
BibTex | Web page | PS ]
[Gou02c]
J. Goubault-Larrecq. A Note on the Completeness of Certain Refinements of Resolution. Research Report LSV-02-8, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2002. 16 pages.
BibTex | Web page | PS ]
[LS02a]
A. Labroue and Ph. Schnoebelen. An Automata-Theoretic Approach to the Reachability Analysis of RPPS Systems. Nordic Journal of Computing, 9(2):118--144, July 2002.
BibTex | Web page | PS ]
[GPD+02]
J. Goubault-Larrecq, J.-Ph. Pouzol, S. Demri, L. Mé, and P. Carle. Langages de détection d'attaques par signatures. Contract Report (Sous-projet 3, livrable 1), Projet RNTL DICO, June 2002. 30 pages.
BibTex ]
[PKBQ02]
L. Petrucci, L. M. Kristensen, J. Billington, and Z. H. Qureshi. Towards Formal Specification and Analysis of Avionics Mission Systems. In Proceedings of the Workshops on Software Ingineering and Formal Methods and Formal Methods Applied to Defence Systems, volume 12 of Conferences in Research and Practice in Information Technology, pages 95--104, Adelaide, Australia, June 2002. Australian Computer Society.
BibTex | Web page | PS ]
[Mag02]
F. Magniette. Preuves d'algorithmes auto-stabilisants. Thèse de doctorat, Université Paris-Sud 11, Orsay, France, June 2002.
BibTex | Web page | PS ]
[Sch02a]
Ph. Schnoebelen. Temporal Logic and Verification. Invited tutorial, 5th Summer School on Modelling and Verifying Parallel Processes (MOVEP'02), Nantes, France, June 2002.
BibTex ]
[Gou02d]
J. Goubault-Larrecq. Outils CPV et CPV2. Contract Report 8, Projet RNTL EVA, May 2002. 7 pages.
BibTex | Web page | PDF ]
[Cor02c]
V. Cortier. Outil de vérification SECURIFY. Contract Report 7, projet RNTL EVA, May 2002. 6 pages.
BibTex | Web page | PDF ]
[DS02b]
S. Demri and Ph. Schnoebelen. The Complexity of Propositional Linear Temporal Logics in Simple Cases. Information and Computation, 174(1):84--103, April 2002.
doi: 10.1006/inco.2001.3094.
BibTex | DOI | Web page | PS | PDF ]
[HCF+02]
F. Herbreteau, F. Cassez, A. Finkel, O. F. Roux, and G. Sutre. Verification of Embedded Reactive Fiffo Systems. In Proceedings of the 5th Latin American Symposium on Theoretical Informatics (LATIN'02), volume 2286 of Lecture Notes in Computer Science, pages 400--414, Cancun, Mexico, April 2002. Springer.
BibTex | Web page | PS ]
[LMS02a]
F. Laroussinie, N. Markey, and Ph. Schnoebelen. On Model Checking Durational Kripke Structures (Extended Abstract). In Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02), volume 2303 of Lecture Notes in Computer Science, pages 264--279, Grenoble, France, April 2002. Springer.
BibTex | Web page | PS | PDF ]
[Boi02]
A. Boisseau. Signatures électroniques de contrats. Research Report LSV-02-4, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2002. 22 pages.
BibTex | Web page | PS ]
[Bou02b]
P. Bouyer. Modèles et algorithmes pour la vérification des systèmes temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2002.
BibTex | Web page | PS | PDF ]
[Bér02a]
B. Bérard. Vérification de modèles temporisés. Mémoire d'habilitation, Université Paris 7, Paris, France, April 2002.
BibTex | Web page | PS ]
[BH02]
M. Bidoit and R. Hennicker. On the Integration of Observability and Reachability Concepts. In Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02), volume 2303 of Lecture Notes in Computer Science, pages 21--36, Grenoble, France, April 2002. Springer.
BibTex | Web page | PS ]
[DLS02]
S. Demri, F. Laroussinie, and Ph. Schnoebelen. A Parametric Analysis of the State Explosion Problem in Model Checking (Extended Abstract). In Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS'02), volume 2285 of Lecture Notes in Computer Science, pages 620--631, Antibes Juan-les-Pins, France, March 2002. Springer.
BibTex | Web page | PS | PDF ]
[Cor02b]
V. Cortier. Observational Equivalence and Trace Equivalence in an Extension of Spi-calculus. Application to Cryptographic Protocols Analysis. Extended Version. Research Report LSV-02-3, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2002. 33 pages.
BibTex | Web page | PS ]
[LS02c]
D. Lugiez and Ph. Schnoebelen. The Regular Viewpoint on PA-Processes. Theoretical Computer Science, 274(1-2):89--115, March 2002.
doi: 10.1016/S0304-3975(00)00306-6.
BibTex | DOI | Web page | PS | PDF ]
[LS02b]
A. Labroue and Ph. Schnoebelen. An Automata-Theoretic Approach to the Reachability Analysis of RPPS Systems. In Proceedings of the 8th International Workshop on Expressiveness in Concurrency (EXPRESS'01), volume 52 of Electronic Notes in Theoretical Computer Science, pages 1--20, Aalborg, Denmark, February 2002. Elsevier Science Publishers.
doi: 10.1016/S1571-0661(04)00213-0.
BibTex | DOI | Web page | PS | PDF ]
[BP02]
P. Bouyer and A. Petit. A KleeneashBüchi-like Theorem for Clock Languages. Journal of Automata, Languages and Combinatorics, 7(2):167--186, 2002.
BibTex | Web page | PS ]
[DO02]
S. Demri and E. Orlowska. Incomplete Information: Structure, Inference, Complexity. EATCS Monographs. Springer, 2002.
BibTex | Web page ]
[DS02a]
S. Demri and U. Sattler. Automata-Theoretic Decision Procedures for Information Logics. Fundamenta Informaticae, 53(1):1--22, 2002.
BibTex | Web page | PS | PDF ]
[HHB02]
R. Hennicker, H. Hußmann, and M. Bidoit. On the Precise Meaning of OCL Constraints. In Object Modeling with the OCL --- The Rationale behind the Object Constraint Language, volume 2263 of Lecture Notes in Computer Science, pages 69--84. Springer, 2002.
BibTex | Web page | PS ]
[Gou02g]
J. Goubault-Larrecq. Special Issue on Models and Methods for Cryptographic Protocol Verification. Journal of Telecommunications and Information Technology, 4/2002, 2002.
BibTex | Web page ]
[Gou02e]
J. Goubault-Larrecq. Sécurité, modélisation et analyse de protocoles cryptographiques. Phœbus, la revue de la sûreté de fonctionnement, 20, 2002.
BibTex | Web page ]
[Lab02]
A. Labroue. Méthodes algébriques pour la vérification des systèmes infinis. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2002.
BibTex | Web page | PS ]
[CS02]
H. Comon and V. Shmatikov. Is it Possible to Decide whether a Cryptographic Protocol is Secure or not? Journal of Telecommunications and Information Technology, 4/2002:5--15, 2002.
BibTex | Web page | PDF ]
[Cor02d]
V. Cortier. Securify version 1. Available at http://www.lsv.ens-cachan.fr/~cortier/EVA/securify.tar.gz, 2002. Started 2001. See [Cor02c] for description. Written in Caml (about 3200 lines).
BibTex ]
[CC01]
H. Comon and V. Cortier. Tree Automata with One Memory, Set Constraints and Cryptographic Protocols. Research Report LSV-01-13, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2001. 98 pages.
BibTex | Web page | PS ]
[PKD+01]
L. Petrucci, L. M. Kristensen, P. Dauchy, M. Aziz, and J. Billington. Modelling and analysis of airborne mission systems. Progress Report 1, DSTO/UniSA contract, December 2001. 54 pages.
BibTex ]
[Can01]
G. Canet. Vérification des programmes écrits dans les langages de programmation IL et ST définis par la norme IEC 61131-3. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2001.
BibTex | Web page | PS ]
[Nar01]
G. A. Narboni. Un cas remarquable de systèmes linéaires: les systèmes monotones. Résolution et application à la vérification formelle de programmes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2001.
BibTex | Web page | PS ]
[BBP01]
B. Bérard, P. Bouyer, and A. Petit. Modélisation du protocole PGM et de certaines de ses propriétés en UPPAAL. Contract Report 4.4, projet RNRT Calife, November 2001. 18 pages.
BibTex ]
[JL01]
F. Jacquemard and D. Le Métayer. Langage de spécification de protocoles cryptographiques de EVA: syntaxe concrète. Technical Report 1, projet RNTL EVA, November 2001. 25 pages.
BibTex | Web page | PDF ]
[BFJL01]
D. Bolignano, F. Fiorenza, F. Jacquemard, and D. Le Métayer. EVA test base. Technical Report 4, projet RNTL EVA, November 2001. 55 pages.
BibTex | Web page | PS | PDF ]
[Gou01b]
J. Goubault-Larrecq. Les syntaxes et la sémantique du langage de spécification EVA. Contract Report 3, projet RNTL EVA, November 2001. 32 pages.
BibTex | Web page | PS | PDF ]
[Gou01a]
J. Goubault-Larrecq. Higher-Order Automata, Pushdown Systems, and Set Constraints. Research Report LSV-01-9, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2001. 15 pages.
BibTex | Web page | PS ]
[DFP01]
M. Duflot, L. Fribourg, and C. Picaronny. Randomized Finite-State Distributed Algorithms as Markov Chains. In Proceedings of the 15th International Symposium on Distributed Computing (DISC'01), volume 2180 of Lecture Notes in Computer Science, pages 240--254, Lisbon, Portugal, October 2001. Springer.
BibTex | Web page | PS ]
[Sch01a]
Ph. Schnoebelen. Bisimulation and Other Undecidable Equivalences for Lossy Channel Systems. In Proceedings of the 4th International Workshop on Theoretical Aspects of Computer Software (TACS'01), volume 2215 of Lecture Notes in Computer Science, pages 385--399, Sendai, Japan, October 2001. Springer.
BibTex | Web page | PS | PDF ]
[CGN01]
H. Comon, G. Godoy, and R. Nieuwenhuis. The Confluence of Ground Term Rewrite Systems is Decidable in Polynomial Time. In Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS'01), pages 298--307, Las Vegas, Nevada, USA, October 2001. IEEE Computer Society Press.
BibTex | Web page | PS ]
[Sch01b]
Ph. Schnoebelen. Spécification et vérification des systèmes concurrents. Mémoire d'habilitation, Université Paris 7, Paris, France, October 2001.
BibTex | Web page | PS ]
[ADdR01]
N. Alechina, S. Demri, and M. de Rijke. Path Constraints from a Modal Logic Point of View (Extended Abstract). In Proceedings of the 8th International Workshop on Knowledge Representation meets Databases (KRDB'01), volume 45 of CEUR Workshop Proceedings, Rome, Italy, September 2001. RWTH Aachen, Germany.
BibTex | Web page | PS ]
[Fri01]
L. Fribourg, editor. Proceedings of the 15th International Workshop on Computer Science Logic (CSL'01), volume 2142 of Lecture Notes in Computer Science, Paris, France, September 2001. Springer.
BibTex | Web page ]
[BP01]
G. Berthelot and L. Petrucci. Specification and Validation of a Concurrent System: An Educational Project. International Journal on Software Tools for Technology Transfer, 3(4):372--381, September 2001.
doi: 10.1007/s100090100064.
BibTex | DOI | Web page | PS ]
[Gou01d]
J. Goubault-Larrecq. Well-Founded Recursive Relations. In Proceedings of the 15th International Workshop on Computer Science Logic (CSL'01), volume 2142 of Lecture Notes in Computer Science, pages 484--497, Paris, France, September 2001. Springer.
BibTex | Web page | PS ]
[RG01a]
X. Rival and J. Goubault-Larrecq. Experiments with Finite Tree Automata in Coq. In Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01), volume 2152 of Lecture Notes in Computer Science, pages 362--377, Edinburgh, Scotland, UK, September 2001. Springer.
BibTex | Web page | PS ]
[Cor01]
P. Corbineau. Autour de la clôture de congruence avec Coq. Master's thesis, DEA Programmation, Paris, France, September 2001.
BibTex | Web page | PS ]
[Hor01]
S. Hornus. Requêtes en logique temporelle. Master's thesis, DEA Algorithmique, Paris, France, September 2001.
BibTex | Web page | PS ]
[Pic01]
É. Pichon. Preuves observationnelles. Master's thesis, DEA Programmation, Paris, France, September 2001.
BibTex ]
[BPT01]
P. Bouyer, A. Petit, and D. Thérien. An Algebraic Characterization of Data and Timed Languages. In Proceedings of the 12th International Conference on Concurrency Theory (CONCUR'01), volume 2154 of Lecture Notes in Computer Science, pages 248--261, Aalborg, Denmark, August 2001. Springer.
BibTex | Web page | PS ]
[DFN01]
M. Duflot, L. Fribourg, and U. Nilsson. Unavoidable Configurations of Parameterized Rings of Processes. In Proceedings of the 12th International Conference on Concurrency Theory (CONCUR'01), volume 2154 of Lecture Notes in Computer Science, pages 472--486, Aalborg, Denmark, August 2001. Springer.
BibTex | Web page | PS ]
[Pet01]
A. Petit. About Extensions of Timed Automata. Invited talk, 8th International Workshop on Expressiveness in Concurrency (EXPRESS'01), Aalborg, Denmark, August 2001.
BibTex ]
[BCF01]
G. Berry, H. Comon, and A. Finkel, editors. Proceedings of the 13th International Conference on Computer Aided Verification (CAV'01), volume 2102 of Lecture Notes in Computer Science, Paris, France, July 2001. Springer.
BibTex | Web page ]
[Gou01c]
J. Goubault-Larrecq. Une proposition de langage de description de protocoles cryptographiques. Contract Report 2, projet RNTL EVA, July 2001. 12 pages.
BibTex ]
[CCM01]
H. Comon, V. Cortier, and J. Mitchell. Tree Automata with One Memory, Set Constraints and Ping-Pong Protocols. In Proceedings of the 28th International Colloquium on Automata, Languages and Programming (ICALP'01), volume 2076 of Lecture Notes in Computer Science, pages 682--693, Heraklion, Crete, Grece, July 2001. Springer.
BibTex | Web page | PS ]
[BT01]
B. Blanc and F. Tort. Co-développement de spécifications algébriques. In Actes du 4ème Atelier sur les Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'01), pages 141--156, Nancy, France, June 2001.
BibTex | Web page | PS ]
[RG01b]
M. Roger and J. Goubault-Larrecq. Log Auditing through Model Checking. In Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW'01), pages 220--236, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press.
BibTex | Web page | PS ]
[CMR01]
V. Cortier, J. K. Millen, and H. Rueß. Proving Secrecy is Easy Enough. In Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW'01), pages 97--110, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press.
BibTex | Web page | PS ]
[CCR01]
G. Canet, S. Couffin, and O. Rossi. Validation dans le cadre de l'utilisation des SFC, LD et ST. Final report, tâches 4, 5 et 6, projet VULCAIN, May 2001. 393 pages.
BibTex ]
[BB01]
M. Bidoit and A. Boisseau. Algebraic Abstractions. In Recent Trends in Algebraic Development Techniques --- Selected Papers of the 15th International Workshop on Algebraic Development Techniques (WADT'01), volume 2267 of Lecture Notes in Computer Science, pages 21--47, Genova, Italy, April 2001. Springer.
BibTex | Web page | PS ]
[BM01]
M. Bidoit and P. D. Mosses. A Gentle Introduction to CASL v1.0.1. Invited tutorial, CoFI Workshop at the 4th European Joint Conferences on Theory and Practice of Software (ETAPS 2001), Genova, Italy, April 2001.
BibTex | Web page ]
[BHK01]
M. Bidoit, R. Hennicker, and A. Kurz. On the Duality between Observability and Reachability. In Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'01), volume 2030 of Lecture Notes in Computer Science, pages 72--87, Genova, Italy, April 2001. Springer.
BibTex | Web page | PS ]
[FS01]
A. Finkel and Ph. Schnoebelen. Well-Structured Transition Systems Everywhere! Theoretical Computer Science, 256(1-2):63--92, April 2001.
doi: 10.1016/S0304-3975(00)00102-X.
BibTex | DOI | Web page | PS | PDF ]
[LMS01]
F. Laroussinie, N. Markey, and Ph. Schnoebelen. Model checking CTL^+ and FCTL is hard. In Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'01), volume 2030 of Lecture Notes in Computer Science, pages 318--331, Genova, Italy, April 2001. Springer.
BibTex | Web page | PS | PDF ]
[BBFM01]
J. Beauquier, B. Bérard, L. Fribourg, and F. Magniette. Proving Convergence of Self-Stabilizing Systems Using First-Order Rewriting and Regular Languages. Distributed Computing, 14(2):83--95, 2001.
doi: 10.1007/PL00008931.
BibTex | DOI | Web page | PS ]
[CMT01]
H. Comon, C. Marché, and R. Treinen, editors. Revised Lectures of the International Summer School on Constraints in Computational Logics (CCL'99), volume 2002 of Lecture Notes in Computer Science, Gif-sur-Yvette, France, 2001. Springer.
BibTex | Web page ]
[CK01]
H. Comon and C. Kirchner. Constraint Solving on Terms. In Revised Lectures of the International Summer School on Constraints in Computational Logics (CCL'99), volume 2002 of Lecture Notes in Computer Science, pages 47--103, Gif-sur-Yvette, France, 2001. Springer.
BibTex ]
[Com01]
H. Comon. Inductionless Induction. In Handbook of Automated Reasoning, volume 1, chapter 14, pages 913--962. Elsevier Science Publishers, 2001.
BibTex | Web page | PS ]
[BBF+01]
B. Bérard, M. Bidoit, A. Finkel, F. Laroussinie, A. Petit, L. Petrucci, and Ph. Schnoebelen. Systems and Software Verification. Model-Checking Techniques and Tools. Springer, 2001.
BibTex | Web page ]
[BBD+01]
É. Badouel, S. Boucheron, A. Dicky, A. Petit, M. Santha, P. Weil, and M. Zeitoun. Problèmes d'informatique fondamentale, volume 13 of Scopos. Springer, 2001.
BibTex | Web page ]
[VGPA00]
K. N. Verma, J. Goubault-Larrecq, S. Prasad, and S. Arun-Kumar. Reflecting BDDs in Coq. In Proceedings of the 6th Asian Computing Science Conference (ASIAN 2000), volume 1961 of Lecture Notes in Computer Science, pages 162--181, Penang, Malaysia, November 2000. Springer.
BibTex | Web page | PS ]
[BJL00]
A. Boisseau, F. Jacquemard, and D. Le Métayer. Exemple de modélisation de protocoles cryptographiques. Projet EVA, note interne, November 2000.
BibTex ]
[NDF00]
U. Nilsson, M. Duflot, and L. Fribourg. STABILO, a tool computing inevitable configurations in distributed protocols, November 2000. See description in [DFN01]. Written in PROLOG (about 500 lines on top of Gertjan van Noord's finite automata package).
BibTex ]
[Gou00a]
J. Goubault-Larrecq. Analyse de protocoles cryptographiques. Invited lecture, Journées ASPROM, Paris, France, October 2000.
BibTex ]
[Sut00]
G. Sutre. Abstraction et accélération de systèmes infinis. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2000.
BibTex | Web page | PS ]
[DCR+00]
O. De Smet, S. Couffin, O. Rossi, G. Canet, J.-J. Lesage, Ph. Schnoebelen, and H. Papini. Safe Programming of PLC Using Formal Verification Methods. In Proceedings of the 4th International PLCopen Conference on Industrial Control Programming (ICP 2000), pages 73--78, Utrecht, The Netherlands, October 2000. PLCopen.
BibTex | Web page | PS ]
[CCL+00]
G. Canet, S. Couffin, J.-J. Lesage, A. Petit, and Ph. Schnoebelen. Towards the Automatic Verification of PLC Programs Written in Instruction List. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC 2000), pages 2449--2454, Nashville, Tennessee, USA, October 2000. Argos Press.
doi: 10.1109/ICSMC.2000.884359.
BibTex | DOI | Web page | PS ]
[Fri00c]
L. Fribourg. Petri Nets, Flat Languages and Linear Arithmetic. In Proceedings of the 9th International Workshop on Functional and Logic Programming (WFLP 2000), pages 344--365, Benicassim, Spain, September 2000. Universidad Politécnica de Valencia, Spain. Invited lecture.
BibTex | Web page | PS ]
[Boi00]
A. Boisseau. Vérification de protocoles cryptographiques. Rapport de DEA, DEA Programmation, Paris, France, September 2000.
BibTex ]
[Duf00]
M. Duflot. Configurations récurrentes pour les anneaux de processus --- Application à l'auto-stabilisation. Rapport de DEA, DEA Algorithmique, Paris, France, September 2000.
BibTex | Web page | PS ]
[RS00]
O. Rossi and Ph. Schnoebelen. Formal modeling of timed function blocks for the automatic verification of Ladder Diagram programs. In Proceedings of the 4th International Conference on Automation of Mixed Processes: Hybrid Dynamic Systems (ADPM 2000), pages 177--182, Dortmund, Germany, September 2000. Shaker Verlag.
BibTex | Web page | PS ]
[BDFP00b]
P. Bouyer, C. Dufourd, E. Fleury, and A. Petit. Expressiveness of Updatable Timed Automata. In Proceedings of the 25th International Symposium on Mathematical Foundations of Computer Science (MFCS 2000), volume 1893 of Lecture Notes in Computer Science, pages 232--242, Bratislava, Slovakia, August 2000. Springer.
BibTex | Web page | PS ]
[FPS00]
A. Finkel, S. Purushothaman Iyer, and G. Sutre. Well-Abstracted Transition Systems. In Proceedings of the 11th International Conference on Concurrency Theory (CONCUR 2000), volume 1877 of Lecture Notes in Computer Science, pages 566--580, Pennsylvania State University, Pennsylvania, USA, August 2000. Springer.
BibTex | Web page | PS ]
[FS00a]
A. Finkel and G. Sutre. An Algorithm Constructing the Semilinear Post* for 2-Dim ResetashTransfer VASS. In Proceedings of the 25th International Symposium on Mathematical Foundations of Computer Science (MFCS 2000), volume 1893 of Lecture Notes in Computer Science, pages 353--362, Bratislava, Slovakia, August 2000. Springer.
BibTex | Web page | PS ]
[CC00]
H. Comon and V. Cortier. Flatness is not a Weakness. In Proceedings of the 14th International Workshop on Computer Science Logic (CSL 2000), volume 1862 of Lecture Notes in Computer Science, pages 262--276, Fischbachau, Germany, August 2000. Springer.
BibTex | Web page | PS ]
[BD00]
B. Bérard and C. Dufourd. Timed Automata and Additive Clock Constraints. Information Processing Letters, 75(1-2):1--7, July 2000.
BibTex | Web page | PS ]
[CL00]
F. Cassez and F. Laroussinie. Model-Checking for Hybrid Systems by Quotienting and Constraints Solving. In Proceedings of the 12th International Conference on Computer Aided Verification (CAV 2000), volume 1855 of Lecture Notes in Computer Science, pages 373--388, Chicago, Illinois, USA, July 2000. Springer.
BibTex | Web page | PS ]
[Pet00]
L. Petrucci. Design and Validation of a Controller. In Proceedings of the 4th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2000), pages 684--688, Orlando, Florida, USA, July 2000.
BibTex | Web page | PS ]
[BDFP00a]
P. Bouyer, C. Dufourd, E. Fleury, and A. Petit. Are Timed Automata Updatable? In Proceedings of the 12th International Conference on Computer Aided Verification (CAV 2000), volume 1855 of Lecture Notes in Computer Science, pages 464--479, Chicago, Illinois, USA, July 2000. Springer.
BibTex | Web page | PS ]
[CDP+00]
G. Canet, B. Denis, A. Petit, O. Rossi, and Ph. Schnoebelen. Un cadre pour la vérification automatique de programmes IL. In Actes de la 1ère Conférence Internationale Francophone d'Automatique (CIFA 2000), pages 693--698, Lille, France, July 2000. Union des Chercheurs Ingénieurs et Scientifiques, Villeneuve d'Ascq, France.
BibTex | Web page | PS ]
[FL00]
A. Finkel and J. Leroux. A Finite Covering Tree for Analysing Entropic Broadcast Protocols. In Proceedings of the International Workshop on Verification and Computational Logic (VCL 2000), London, UK, July 2000. University of Southampton, Southampton, UK.
BibTex | Web page | PS ]
[LS00d]
D. Lugiez and Ph. Schnoebelen. Decidable First-Order Transition Logics for PA-Processes. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP 2000), volume 1853 of Lecture Notes in Computer Science, pages 342--353, Geneva, Switzerland, July 2000. Springer.
BibTex | Web page | PS ]
[BEF+00]
A. Bouajjani, J. Esparza, A. Finkel, O. Maler, P. Rossmanith, B. Willems, and P. Wolper. An Efficient Automata Approach to some Problems on Context-Free Grammars. Information Processing Letters, 74(5-6):221--227, June 2000.
BibTex | Web page | PS ]
[BP00b]
G. Berthelot and L. Petrucci. Specification and Validation of a Concurrent System: An Educational Project. In Proceedings of the Workshop on Practical Use of High-Level Petri Nets, pages 55--72, Århus, Denmark, June 2000.
BibTex | Web page ]
[SS00]
Ph. Schnoebelen and N. Sidorova. Bisimulation and the Reduction of Petri Nets. In Proceedings of the 21st International Conference on Applications and Theory of Petri Nets (ICATPN 2000), volume 1825 of Lecture Notes in Computer Science, pages 409--423, Århus, Denmark, June 2000. Springer.
BibTex | Web page | PS ]
[Pad00]
V. Padovani. Decidability of Fourth-Order Matching. Mathematical Structures in Computer Science, 10(3):361--372, June 2000.
BibTex ]
[Mar00]
N. Markey. Complexité de la logique temporelle avec passé. Rapport de DEA, DEA Algorithmique, Paris, France, June 2000.
BibTex ]
[Gou00b]
J. Goubault-Larrecq. A Method for Automatic Cryptographic Protocol Verification (Extended Abstract). In Proceedings of the Workshops of the 15th International Parallel and Distributed Processing Symposium, volume 1800 of Lecture Notes in Computer Science, pages 977--984, Cancun, Mexico, May 2000. Springer.
BibTex | Web page | PS ]
[CN00]
H. Comon and R. Nieuwenhuis. Inductive Proofs = I-Axiomatization + First-Order Consistency. Information and Computation, 159(1-2):151--186, May-June 2000.
BibTex | Web page | PS ]
[BCF+00]
B. Bérard, P. Castéran, E. Fleury, L. Fribourg, J.-F. Monin, Ch. Paulin, A. Petit, and D. Rouillard. Document de spécification du modèle commun. Fourniture 1.1 du projet RNRT Calife, April 2000.
BibTex ]
[LST00]
F. Laroussinie, Ph. Schnoebelen, and M. Turuani. On the Expressivity and Complexity of Quantitative Branching-Time Temporal Logics. In Proceedings of the 4th Latin American Symposium on Theoretical Informatics (LATIN 2000), volume 1776 of Lecture Notes in Computer Science, pages 437--446, Punta del Este, Uruguay, April 2000. Springer.
doi: 10.1007/10719839_43.
BibTex | DOI | Web page | PS | PDF ]
[BBP00]
F. Belala, M. Bettaz, and L. Petrucci-Dauchy. Concurrent systems analysis using ECATNets. Logic Journal of the IGPL, 8(2):149--164, March 2000.
doi: 10.1093/jigpal/8.2.149.
BibTex | DOI | Web page | PS | PDF ]
[BLS00]
B. Bérard, A. Labroue, and Ph. Schnoebelen. Verifying Performance Equivalence for Timed Basic Parallel Processes. In Proceedings of the 3rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS 2000), volume 1784 of Lecture Notes in Computer Science, pages 35--47, Berlin, Germany, March 2000. Springer.
BibTex | Web page | PS ]
[LS00b]
F. Laroussinie and Ph. Schnoebelen. The State-Explosion Problem from Trace to Bisimulation Equivalence. In Proceedings of the 3rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS 2000), volume 1784 of Lecture Notes in Computer Science, pages 192--207, Berlin, Germany, March 2000. Springer.
BibTex | Web page | PS ]
[Sch00]
Ph. Schnoebelen. Le problème de l'explosion du nombre d'états. Invited talk, 8ème Journées Montoises d'Informatique Théorique (JM 2000), Marne-la-Vallée, France, March 2000.
BibTex ]
[FS00b]
A. Finkel and G. Sutre. Decidability of Reachability Problems for Classes of Two-Counter Automata. In Proceedings of the 17th Annual Symposium on Theoretical Aspects of Computer Science (STACS 2000), volume 1770 of Lecture Notes in Computer Science, pages 346--357, Lille, France, February 2000. Springer.
doi: 10.1007/3-540-46541-3_29.
BibTex | DOI | Web page | PS ]
[Com00]
H. Comon. Sequentiality, Monadic Second Order Logic and Tree Automata. Information and Computation, 157(1-2):25--51, February-March 2000.
BibTex | Web page | PS ]
[Wil00]
N. Williams. Application des spécifications algébriques à la rétro-ingénierie de codes Fortran. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2000.
BibTex | Web page | PS ]
[BP00a]
B. Bérard and C. Picaronny. Accepting Zeno Words: A Way Toward Timed Refinements. Acta Informatica, 37(1):45--81, 2000.
BibTex | Web page | PS ]
[Fri00b]
L. Fribourg. Document de synthèse sur les techniques d'abstraction. Fourniture 4.1 du projet RNRT Calife, January 2000.
BibTex ]
[BFP00]
P. Bouyer, E. Fleury, and A. Petit. Document de synthèse sur les procédures de vérification des systèmes temps réel : Les automates temporisés. Fourniture 4.2 du projet RNRT Calife, January 2000.
BibTex ]
[Fri00a]
L. Fribourg. Constraint Logic Programming Applied to Model Checking. In Proceedings of the 9th International Workshop on Logic Program Synthesis and Transformation (LOPSTR'99), volume 1817 of Lecture Notes in Computer Science, pages 31--42, Venezia, Italy, 2000. Springer. Invited tutorial.
BibTex | Web page | PS ]
[BS00]
B. Bérard and L. Sierra. Comparing Verification with HyTech, Kronos and Uppaal on the Railroad Crossing Example. Research Report LSV-00-2, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2000.
BibTex | Web page | PS ]
[CP00]
S. Christensen and L. Petrucci. Modular Analysis of Petri Nets. The Computer Journal, 43(3):224--242, 2000.
BibTex | Web page | PS ]
[LS00a]
F. Laroussinie and Ph. Schnoebelen. Specification in CTL+Past for verification in CTL. Information and Computation, 156(1-2):236--263, January 2000.
doi: 10.1006/inco.1999.2817.
BibTex | DOI | Web page | PS ]
[LS00c]
I. A. Lomazova and Ph. Schnoebelen. Some Decidability Results for Nested Petri Nets. In Proceedings of the 3rd International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI'99), volume 1755 of Lecture Notes in Computer Science, pages 208--220, Novosibirsk, Russia, 2000. Springer.
BibTex | Web page | PS ]
[Lar00]
F. Laroussinie. HCMC: An Extension of CMC for Hybrid Systems. Available at http://www.lsv.ens-cachan.fr/~fl/cmcweb.html, 2000. See [CL00] for description. Written in C++ (about 26000 lines).
BibTex | Web page ]
[CDJK99]
H. Comon, M. Dincbas, J.-P. Jouannaud, and C. Kirchner. A Methodological View of Constraint Solving. Constraints, 4(4):337--361, December 1999.
BibTex | Web page | PS ]
[Mey99]
R. Meyer. Contributions à l'étude des logiques temporelles sur les traces. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 1999.
BibTex | Web page | PS ]
[Jur99]
Y. Jurski. Expression de la relation binaire d'accessibilité pour les automates à compteurs plats et les automates temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 1999.
BibTex | Web page | PS ]
[BHTW99]
M. Bidoit, R. Hennicker, F. Tort, and M. Wirsing. Correct Realization of Interface Constraints with OCL. In Proceedings of the 2nd International Conference on the Unified Modeling Language (UML'99), volume 1723 of Lecture Notes in Computer Science, pages 399--415, Fort Collins, Colorado, USA, October 1999. Springer.
BibTex | Web page | PS ]
[Wil99]
N. Williams-Preston. New Type Signatures for Legacy Fortran Subroutines. In Proceedings of the ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE'99), pages 76--85, Toulouse, France, September 1999. ACM Press.
BibTex | Web page | PS ]
[BBF99]
J. Beauquier, B. Bérard, and L. Fribourg. A New Rewrite Method for Proving Convergence of Self-Stabilizing Systems. In Proceedings of the 13th International Symposium on Distributed Computing (DISC'99), volume 1693 of Lecture Notes in Computer Science, pages 240--253, Bratislava, Slovak republic, September 1999. Springer.
BibTex | Web page | PS ]
[Bla99]
B. Blanc. Modélisation et spécification d'architectures logicielles. Rapport de DEA, DEA Programmation, Paris, France, September 1999.
BibTex | Web page | PS ]
[Cor99]
V. Cortier. Vérification de systèmes à compteurs. Rapport de DEA, DEA de Logique, Paris, France, September 1999.
BibTex | Web page | PS ]
[AL99]
L. Aceto and F. Laroussinie. Is your Model Checker on Time? In Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science (MFCS'99), volume 1672 of Lecture Notes in Computer Science, pages 125--136, Szklarska Poreba, Poland, September 1999. Springer.
BibTex | Web page | PS ]
[Ler99]
J. Leroux. Vérification des systèmes paramétrés. Rapport de DEA, DEA Algorithmique, Paris, France, September 1999.
BibTex ]
[BH99]
M. Bidoit and R. Hennicker. Observer Complete Definitions are Behaviourally Coherent. In Proceedings of the OBJ/CafeOBJ/Maude Workshop at Formal Methods (FM'99), pages 83--94, Toulouse, France, September 1999. Theta, Bucharest, Romania.
BibTex | Web page | PS ]
[Tur99]
M. Turuani. Logique temporelle temporisée pour la vérification de programmes : expressivité et complexité. Rapport de DEA, DEA Programmation, Paris, France, September 1999.
BibTex | Web page | PS ]
[BF99b]
B. Bérard and L. Fribourg. Reachability Analysis of (Timed) Petri Nets Using Real Arithmetic. In Proceedings of the 10th International Conference on Concurrency Theory (CONCUR'99), volume 1664 of Lecture Notes in Computer Science, pages 178--193, Eindhoven, The Netherlands, August 1999. Springer.
BibTex | Web page | PS ]
[CJ99]
H. Comon and Y. Jurski. Timed Automata and the Theory of Real Numbers. In Proceedings of the 10th International Conference on Concurrency Theory (CONCUR'99), volume 1664 of Lecture Notes in Computer Science, pages 242--257, Eindhoven, The Netherlands, August 1999. Springer.
BibTex | Web page | PS ]
[DF99]
C. Dufourd and A. Finkel. A Polynomial λ-Bisimilar Normalization for Reset Petri Nets. Theoretical Computer Science, 222(1-2):187--194, July 1999.
BibTex | Web page | PS ]
[BP99]
P. Bouyer and A. Petit. Decomposition and Composition of Timed Automata. In Proceedings of the 26th International Colloquium on Automata, Languages and Programming (ICALP'99), volume 1644 of Lecture Notes in Computer Science, pages 210--219, Prague, Czech Republic, July 1999. Springer.
BibTex | Web page | PS ]
[BF99a]
B. Bérard and L. Fribourg. Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol. In Proceedings of the 11th International Conference on Computer Aided Verification (CAV'99), volume 1633 of Lecture Notes in Computer Science, pages 96--107, Trento, Italy, July 1999. Springer.
BibTex | Web page | PS ]
[CGJV99]
V. Cortier, H. Ganzinger, F. Jacquemard, and M. Veanes. Decidable Fragments of Simultaneous Rigid Reachability. In Proceedings of the 26th International Colloquium on Automata, Languages and Programming (ICALP'99), volume 1644 of Lecture Notes in Computer Science, pages 250--260, Prague, Czech Republic, July 1999. Springer.
BibTex | Web page | PS ]
[DJS99]
C. Dufourd, P. Jančar, and Ph. Schnoebelen. Boundedness of Reset P/T Nets. In Proceedings of the 26th International Colloquium on Automata, Languages and Programming (ICALP'99), volume 1644 of Lecture Notes in Computer Science, pages 301--310, Prague, Czech Republic, July 1999. Springer.
BibTex | Web page | PS ]
[EFM99]
J. Esparza, A. Finkel, and R. Mayr. On the verification of broadcast protocols. In Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science (LICS'99), pages 352--359, Trento, Italy, July 1999. IEEE Computer Society Press.
BibTex | Web page | PS ]
[MT99]
R. Meyer and P. S. Thiagarajan. LTrL Based Model-Checking for a Restricted Class of Signal Transition Graphs. In Proceedings of the 2nd International Workshop on Hardware Design and Petri Nets (HWPN'99), pages 3--14, Williamsburg, Virginia, USA, June 1999. Kluwer Academic Publishers.
BibTex ]
[CP99]
H. Comon and V. Padovani. Report on Specification Validation in Telecommunication Services. Contract report, June 1999.
BibTex ]
[PCLT99]
V. Padovani, H. Comon, J. Leneutre, and R. Tingaud. A Formal Verification of Telephone Supplementary Service Interactions. Research Report LSV-99-5, Laboratoire Spécification et Vérification, ENS Cachan, France, May 1999.
BibTex | Web page | PS ]
[SBB+99]
Ph. Schnoebelen, B. Bérard, M. Bidoit, F. Laroussinie, and A. Petit. Vérification de logiciels : techniques et outils du model-checking. Vuibert, April 1999.
BibTex | Web page ]
[Sut99]
G. Sutre. Vérification des automates à file réactifs : un modèle pour les systémes réactifs écrits en Electre. In Actes du 2ème Congrès sur la Modélisation des Systèmes Réactifs (MSR'99), pages 71--78, Cachan, France, March 1999. Hermès.
BibTex ]
[FMP99]
A. Finkel, P. McKenzie, and C. Picaronny. A Well-Structured Framework for Analysing Petri Net Extensions. Research Report LSV-99-2, Laboratoire Spécification et Vérification, ENS Cachan, France, February 1999.
BibTex | Web page | PS ]
[Sch99]
Ph. Schnoebelen. Decomposable Regular Languages and the Shuffle Operator. EATCS Bulletin, 67:283--289, February 1999.
BibTex | Web page | PS | PDF ]
[Pet99b]
L. Petrucci. Promela et Spin : exercices corrigés, 1999.
BibTex ]
[Pet99c]
L. Petrucci. Un exemple de langage parallèle asynchrone : Promela. Polycopié de cours, IEE, Évry, France, 1999.
BibTex ]
[Pet99a]
L. Petrucci. Promela et Spin : exercices. Polycopié, IEE, Évry, France, 1999.
BibTex ]
[HCRT99]
H. Hußmann, M. Cerioli, G. Reggio, and F. Tort. Abstract Data Types and UML Models. Technical Report DISI-TR-99-15, DISI, Universitá di Genova, Italy, 1999.
BibTex ]
[BST99]
M. Bidoit, D. Sannella, and A. Tarlecki. Architectural Specifications in CASL. In Proceedings of the 7th International Conference on Algebraic Methodology and Software Technology (AMAST'98), volume 1548 of Lecture Notes in Computer Science, pages 341--357, Amazonia, Brasil, January 1999. Springer.
BibTex | Web page | PS | PDF ]
[HB99]
R. Hennicker and M. Bidoit. Observational Logic. In Proceedings of the 7th International Conference on Algebraic Methodology and Software Technology (AMAST'98), volume 1548 of Lecture Notes in Computer Science, pages 263--277, Amazonia, Brasil, January 1999. Springer.
BibTex | Web page | PS ]
[BCH99]
M. Bidoit, M. V. Cengarle, and R. Hennicker. Proof systems for structured specifications and their refinements. In Algebraic Foundations of Systems Specification, chapter 11, pages 385--433. Springer, 1999.
BibTex | Web page | PS ]
[SFRC99]
G. Sutre, A. Finkel, O. F. Roux, and F. Cassez. Effective Recognizability and Model Checking of Reactive Fiffo Automata. In Proceedings of the 7th International Conference on Algebraic Methodology and Software Technology (AMAST'98), volume 1548 of Lecture Notes in Computer Science, pages 106--123, Amazonia, Brasil, January 1999. Springer.
BibTex | Web page | PS ]
[ABBL98]
L. Aceto, P. Bouyer, A. Burgueño, and K. G. Larsen. The Power of Reachability Testing for Timed Automata. In Proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'98), volume 1530 of Lecture Notes in Computer Science, pages 245--256, Chennai, India, December 1998. Springer.
BibTex | Web page | PS ]
[CP98c]
H. Comon and V. Padovani. Specifications Consistency Verification. Final Report. Contract Report MAR/UAO/C/98/0080, December 1998. 280 pages.
BibTex ]
[BDGP98]
B. Bérard, V. Diekert, P. Gastin, and A. Petit. Characterization of the Expressive Power of Silent Transitions in Timed Automata. Fundamenta Informaticae, 36(2):145--182, November 1998.
BibTex | Web page | PS ]
[BH98]
M. Bidoit and R. Hennicker. Modular Correctness Proofs of Behavioural Implementations. Acta Informatica, 35(11):951--1005, November 1998.
doi: 10.1007/s002360050149.
BibTex | DOI ]
[LL98]
F. Laroussinie and K. G. Larsen. CMC: A Tool for Compositional Model-Checking of Real-Time Systems. In Proceedings of IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE'XI) and Protocol Specification, Testing and Verification (PSTV'XVIII), volume 135 of IFIP Conference Proceedings, pages 439--456, Paris, France, November 1998. Kluwer Academic Publishers.
BibTex | Web page | PS ]
[CDF98]
G. Cécé, P.-É. Deutsch, and A. Finkel. FORMAashSSCOP --- LSV, bilan de l'année 1998. Contract report, FORMA, November 1998.
BibTex ]
[Pet98]
A. Petit. Le model-checking, une technique de vérification en plein essor. Introduction. Contract report, EDF/DER/MOS - LSV, October 1998.
BibTex ]
[LPS98]
F. Laroussinie, A. Petit, and Ph. Schnoebelen. Le model-checking, une technique de vérification en plein essor. I --- Principes et techniques. Contract report, EDF/DER/MOS - LSV, October 1998.
BibTex ]
[Sch98a]
Ph. Schnoebelen. Le model-checking, une technique de vérification en plein essor. III --- Spécifier pour vérifier. Contract report, EDF/DER/MOS - LSV, October 1998.
BibTex ]
[BCD+98]
B. Bérard, G. Cécé, C. Dufourd, A. Finkel, F. Laroussinie, A. Petit, Ph. Schnoebelen, and G. Sutre. Le model-checking, une technique de vérification en plein essor. II --- Quelques outils. Contract report, EDF/DER/MOS - LSV, October 1998.
BibTex ]
[CP98b]
S. Christensen and L. Petrucci. How to Determine and Use Place Flows in Coloured Petri Nets. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC 2000), pages 66--71, San Diego, California, USA, October 1998. Argos Press.
BibTex ]
[Duf98]
C. Dufourd. Réseaux de Petri avec ResetashTransfert : décidabilité et indécidabilité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 1998.
BibTex | Web page | PS ]
[GMPW98]
G. Guaiana, R. Meyer, A. Petit, and P. Weil. An Extension of the Wreath Product Principle for Finite Mazurkiewicz Traces. Information Processing Letters, 67(6):277--282, September 1998.
BibTex | Web page | PS ]
[CP98d]
H. Comon and V. Padovani. Specifications Consistency Verification. Intermediate Report. Contract Report MAR/UAO/C/98/0051, September 1998.
BibTex ]
[LS98]
D. Lugiez and Ph. Schnoebelen. The Regular Viewpoint on PA-Processes. In Proceedings of the 9th International Conference on Concurrency Theory (CONCUR'98), volume 1466 of Lecture Notes in Computer Science, pages 50--66, Nice, France, September 1998. Springer.
doi: 10.1007/BFb0055615.
BibTex | DOI | Web page | PS | PDF ]
[DM98]
M. Duflot and N. Markey. Évaluation de l'outil UPPAAL sur le problème de l'ICC. Contract report, EDF/DER/MOS - LSV, September 1998.
BibTex ]
[GMP98]
P. Gastin, R. Meyer, and A. Petit. A (non-elementary) modular decision procedure for LTrL. In Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science (MFCS'98), volume 1450 of Lecture Notes in Computer Science, pages 356--365, Brno, Czech Republic, August 1998. Springer.
BibTex | Web page | PS ]
[Fin98]
A. Finkel. Analyse des systèmes infinis bien structurés ou << reconnaissables >>. Invited tutorial, 3ème École d'été Modélisation et Vérification des Processus Parallèles (MOVEP'98), Nantes, France, July 1998.
BibTex ]
[Lab98]
A. Labroue. Conditions de vivacité dans les automates temporisés. Rapport de DEA, DEA Informatique, Orsay, France, July 1998.
BibTex | Web page | PS ]
[DFS98]
C. Dufourd, A. Finkel, and Ph. Schnoebelen. Reset Nets between Decidability and Undecidability. In Proceedings of the 25th International Colloquium on Automata, Languages and Programming (ICALP'98), volume 1443 of Lecture Notes in Computer Science, pages 103--115, Aalborg, Denmark, July 1998. Springer.
doi: 10.1007/BFb0055044.
BibTex | DOI | Web page | PS ]
[Sch98b]
Ph. Schnoebelen. Regular Tree Languages for Process Algebra. Invited lecture, 3rd International Workshop on Verification of Infinite State Systems (INFINITY'98), Aalborg, Denmark, July 1998.
BibTex ]
[BP98]
K. Barkaoui and L. Petrucci. Structural Analysis of Workflow Nets with Shared Resources. In Proceedings of Workflow Management: Net-Based Concepts, Models, Techniques and Tools (WFM'98), volume 98/7 of Computing Science Report, pages 82--95, Lisbon, Portugal, June 1998. Eindhoven University of Technology, Eindhoven, The Netherlands.
BibTex | Web page | PS ]
[AGP+98]
L. Albert, P. Gastin, B. Petazzoni, A. Petit, N. Puech, and P. Weil. Cours et exercices d'informatique, Classes préparatoires, premier et second cycles universitaires. Vuibert, June 1998.
BibTex ]
[Bou98]
P. Bouyer. Automates temporisés et modularité. Rapport de DEA, DEA Algorithmique, Paris, France, June 1998.
BibTex | Web page | PS ]
[CJ98b]
H. Comon and Y. Jurski. Multiple Counters Automata, Safety Analysis and Presburger Arithmetic. In Proceedings of the 10th International Conference on Computer Aided Verification (CAV'98), volume 1427 of Lecture Notes in Computer Science, pages 268--279, Vancouver, British Columbia, Canada, June 1998. Springer.
BibTex | Web page | PS ]
[CNNR98]
H. Comon, P. Narendran, R. Nieuwenhuis, and M. Rusinowitch. Decision Problems in Ordered Rewriting. In Proceedings of the 13th Annual IEEE Symposium on Logic in Computer Science (LICS'98), pages 276--286, Indianapolis, Indiana, USA, June 1998. IEEE Computer Society Press.
BibTex | Web page | PS ]
[Com98b]
H. Comon. Completion of Rewrite Systems with Membership Constraints. Part I: Deduction Rules. Journal of Symbolic Computation, 25(4):397--420, April 1998.
BibTex | Web page | PS ]
[Com98c]
H. Comon. Completion of Rewrite Systems with Membership Constraints. Part II: Constraint Solving. Journal of Symbolic Computation, 25(4):421--454, April 1998.
BibTex | Web page | PS ]
[FS98]
A. Finkel and Ph. Schnoebelen. Fundamental Structures in Well-Structured Infinite Transition Systems. In Proceedings of the 3rd Latin American Symposium on Theoretical Informatics (LATIN'98), volume 1380 of Lecture Notes in Computer Science, pages 102--118, Campinas, Brasil, April 1998. Springer.
doi: 10.1007/BFb0054314.
BibTex | DOI | Web page | PS ]
[VF98]
M. Veloso Peixoto and L. Fribourg. Unfolding Parametric Automata. In Proceedings of the 3rd Latin American Symposium on Theoretical Informatics (LATIN'98), volume 1380 of Lecture Notes in Computer Science, pages 88--101, Campinas, Brasil, April 1998. Springer.
BibTex ]
[Fri98]
L. Fribourg. A Closed-Form Evaluation for Extended Timed Automata. Research Report LSV-98-2, Laboratoire Spécification et Vérification, ENS Cachan, France, March 1998.
BibTex | Web page | PS ]
[Com98a]
H. Comon. About proofs by consistency. In Proceedings of the 9th International Conference on Rewriting Techniques and Applications (RTA'98), volume 1379 of Lecture Notes in Computer Science, pages 136--137, Tsukuba, Japan, March 1998. Springer. Invited lecture.
BibTex ]
[Lar98]
F. Laroussinie. Analyse de l'ICC: modélisation. Contract report, EDF/DER/MOS - LSV, March 1998.
BibTex ]
[MP98]
R. Meyer and A. Petit. Expressive Completeness of LTrL on Finite Traces: An Algebraic Proof. In Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS'98), volume 1373 of Lecture Notes in Computer Science, pages 533--543, Paris, France, February 1998. Springer.
BibTex ]
[DS98]
S. Demri and Ph. Schnoebelen. The Complexity of Propositional Linear Temporal Logics in Simple Cases (Extended Abstract). In Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS'98), volume 1373 of Lecture Notes in Computer Science, pages 61--72, Paris, France, February 1998. Springer.
doi: 10.1007/BFb0028549.
BibTex | DOI | Web page | PS ]
[BF98]
Z. Bouziane and A. Finkel. The Equivalence Problem for Commutative Semigroups and Reversible Petri Nets is Complete in Exponential Space under Log-Lin Reducibility. In Proceedings of the International Conference in Semigroups and its Related Topics, pages 63--76, Kunming, China, 1998. Springer.
BibTex ]
[BBP98]
B. Bérard, M. Bidoit, and A. Petit. Recommandations sur le cahier des charges SRC. Contract report, EDF/DER/MOS - LSV, 1998.
BibTex ]
[CFG98]
Ch. Collet, A. Finkel, and R. Gherbi. CapRe: A Gaze Tracking System in Man-Machine Interaction. Journal of Advanced Computational Intelligence, 2(3):77--81, 1998.
BibTex | Web page | PS ]
[CP98a]
Ch. Cérin and A. Petit. Application of Algebraic Techniques to Compute the Efficiency Measure for Multithreaded Architecture. In Proceedings of the Workshop on Multithreaded Execution, Architecture and Compilation (MTEAC'98), Las Vegas, Nevada, USA, January 1998.
BibTex | Web page | PS ]
[Céc98]
G. Cécé. Vérification, analyse et approximations symboliques des automates communicants. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 1998.
BibTex | Web page | PS ]
[CJ98a]
H. Comon and Y. Jurski. Higher-order matching and tree automata. In Selected Papers from the 11th International Workshop on Computer Science Logic (CSL'97), volume 1414 of Lecture Notes in Computer Science, pages 157--176, Århus, Denmark, 1998. Springer. Invited lecture.
BibTex | Web page | PS ]
[Sif98]
J. Sifakis. Action FORMA. Bilan de la première année. Contract report, DSP-STTC/CNRS/MENRT, January 1998.
BibTex ]
[DF97]
C. Dufourd and A. Finkel. Polynomial-Time Many-One Reductions for Petri Nets. In Proceedings of the 17th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'97), volume 1346 of Lecture Notes in Computer Science, pages 312--326, Kharagpur, India, December 1997. Springer.
BibTex | Web page | PS | PDF ]
[Wil97]
N. Williams-Preston. An Experiment in Reverse Engineering Using Algebraic Specifications. Research Report LSV-97-10, Laboratoire Spécification et Vérification, ENS Cachan, France, November 1997.
BibTex | Web page | PS | PDF ]
[BB97]
B. Bérard and M. Bidoit. Contribution du LSV à l'opération 2 << Étude de cas SRIC >>. Contract report, Action FORMA, October 1997. 29 pages.
BibTex ]
[CFG97b]
Ch. Collet, A. Finkel, and R. Gherbi. Gaze Capture System in Man-Machine Interaction. In Proceedings of the IEEE International Conference on Intelligent Engineering Systems (INES'97), pages 557--581, Budapest, Hungary, September 1997. IEEE Press.
BibTex | Web page | PS | PDF ]
[KS97a]
O. Kouchnarenko and Ph. Schnoebelen. A Formal Framework for the Analysis of Recursive-Parallel Programs. In Proceedings of the 4th International Conference on Parallel Computing Technologies (PaCT'97), volume 1277 of Lecture Notes in Computer Science, pages 45--59, Yaroslavl, Russia, September 1997. Springer.
doi: 10.1007/3-540-63371-5_6.
BibTex | DOI | Web page | PS | PDF ]
[LS97]
F. Laroussinie and Ph. Schnoebelen. Specification in CTL+Past, Verification in CTL. In Proceedings of the 4th International Workshop on Expressiveness in Concurrency (EXPRESS'97), volume 7 of Electronic Notes in Theoretical Computer Science, pages 161--184, Santa Margherita Ligure, Italy, September 1997. Elsevier Science Publishers.
doi: 10.1016/S1571-0661(05)80472-4.
BibTex | DOI | Web page | PS | PDF ]
[Sut97]
G. Sutre. Vérification de propriétés sur les automates à file réactifs produits par compilation de programmes Electre. Rapport de DEA, DEA Algorithmique, Paris, France, September 1997.
BibTex | Web page | PS | PDF ]
[BP97b]
B. Bérard and C. Picaronny. Accepting Zeno Words without Making Time Stand Still. In Proceedings of the 22nd International Symposium on Mathematical Foundations of Computer Science (MFCS'97), volume 1295 of Lecture Notes in Computer Science, pages 149--158, Bratislava, Slovakia, August 1997. Springer.
BibTex | Web page | PS | PDF ]
[MP97]
R. Meyer and A. Petit. Decomposition of TrPTL Formulas. In Proceedings of the 22nd International Symposium on Mathematical Foundations of Computer Science (MFCS'97), volume 1295 of Lecture Notes in Computer Science, pages 418--427, Bratislava, Slovakia, August 1997. Springer.
BibTex | Web page | PS | PDF ]
[FWW97]
A. Finkel, B. Willems, and P. Wolper. A Direct Symbolic Approach to Model Checking Pushdown Systems (Extended Abstract). In Proceedings of the 2nd International Workshop on Verification of Infinite State Systems (INFINITY'97), volume 9 of Electronic Notes in Theoretical Computer Science, pages 27--39, Bologna, Italy, July 1997. Elsevier Science Publishers.
BibTex | Web page | PS | PDF ]
[BF97]
Z. Bouziane and A. Finkel. Cyclic Petri Net Reachability Sets are Semi-Linear Effectively Constructible. In Proceedings of the 2nd International Workshop on Verification of Infinite State Systems (INFINITY'97), volume 9 of Electronic Notes in Theoretical Computer Science, pages 15--24, Bologna, Italy, July 1997. Elsevier Science Publishers.
BibTex | Web page | PS | PDF ]
[CJ97]
H. Comon and F. Jacquemard. Ground Reducibility is EXPTIME-Complete. In Proceedings of the 12th Annual IEEE Symposium on Logic in Computer Science (LICS'97), pages 26--34, Warsaw, Poland, July 1997. IEEE Computer Society Press.
BibTex | Web page | PS | PDF ]
[Com97a]
H. Comon. Applications of Tree Automata in Rewriting and Lambda-Calculus. Invited lecture, 12th Annual IEEE Symposium on Logic in Computer Science (LICS'97), Warsaw, Poland, July 1997.
BibTex ]
[FO97b]
L. Fribourg and H. Olsén. Proving Safety Properties of Infinite State Systems by Compilation into Presburger Arithmetic. In Proceedings of the 8th International Conference on Concurrency Theory (CONCUR'97), volume 1243 of Lecture Notes in Computer Science, pages 213--227, Warsaw, Poland, July 1997. Springer.
BibTex | Web page | PS | PDF ]
[FO97c]
L. Fribourg and H. Olsén. Reachability Sets of Parametrized Rings As Regular Languages. In Proceedings of the 2nd International Workshop on Verification of Infinite State Systems (INFINITY'97), volume 9 of Electronic Notes in Theoretical Computer Science, page 40, Bologna, Italy, July 1997. Elsevier Science Publishers.
BibTex | Web page | PS | PDF ]
[CF97]
G. Cécé and A. Finkel. Programs with Quasi-Stable Channels are Effectively Recognizable. In Proceedings of the 9th International Conference on Computer Aided Verification (CAV'97), volume 1254 of Lecture Notes in Computer Science, pages 304--315, Haifa, Israel, June 1997. Springer.
BibTex | Web page | PS | PDF ]
[BP97a]
F. Belala and L. Petrucci. Sémantique des ECATNets en termes de CPNets : application à un exemple de production. In Actes de la 1ère Conférence Francophone de Modélisation et de Simulation (MOSIM'97), Rouen, France, June 1997. Hermès.
BibTex ]
[MBBP97]
M. Maouche, M. Bettaz, G. Berthelot, and L. Petrucci. Du vrai parallélisme dans les réseaux algébriques et de son application dans les systèmes de production. In Actes de la 1ère Conférence Francophone de Modélisation et de Simulation (MOSIM'97), pages 417--424, Rouen, France, June 1997. Hermès.
BibTex ]
[Com97b]
H. Comon, editor. Proceedings of the 8th International Conference on Rewriting Techniques and Applications (RTA'97), volume 1232 of Lecture Notes in Computer Science. Springer, June 1997.
BibTex | Web page ]
[Com97c]
H. Comon. Une approche logique des contrôles logiques. Rapport de contrat EDF/DER/MOS--LSV, June 1997.
BibTex ]
[BPR97]
M. Bidoit, Ch. Pellen, and J. Ryckbosch. Plan de Défense --- Formalisation du cahier des charges du Point Central à l'aide de spécifications algébriques. In Application des techniques formelles au logiciel, ARAGO 20, chapter 7, pages 123--132. Observatoire Français des Techniques Avancées, June 1997.
BibTex ]
[CFG97a]
Ch. Collet, A. Finkel, and R. Gherbi. CapRe : un système de capture du regard dans un contexte d'interaction homme-machine. In Actes des 6èmes Journées Internationales Interfaces, pages 36--39, Montpellier, France, May 1997.
BibTex | Web page | PS | PDF ]
[Duf97]
C. Dufourd. Une extension d'un résultat d'indécidabilité pour les automates temporisés. In Actes des 9èmes Rencontres Francophones du Parallélisme (RENPAR'97), pages 219--222, Lausanne, Switzerland, May 1997.
BibTex | Web page | PS | PDF ]
[Céc97]
G. Cécé. Les programmes utilisant des canaux quasi-stables sont effectivement reconnaissables. In Actes des 9èmes Rencontres Francophones du Parallélisme (RENPAR'97), pages 215--218, Lausanne, Switzerland, May 1997.
BibTex ]
[CT97]
H. Comon and R. Treinen. The First-Order Theory of Lexicographic Path Orderings is Undecidable. Theoretical Computer Science, 176(1-2):67--87, April 1997.
BibTex | Web page | PS | PDF ]
[KLL+97]
K. J. Kristoffersen, F. Laroussinie, K. G. Larsen, P. Pettersson, and W. Yi. A Compositional Proof of a Real-Time Mutual Exclusion Protocol. In Proceedings of the 7th International Joint Conference CAAP/FASE on Theory and Practice of Software Development (TAPSOFT'97), volume 1214 of Lecture Notes in Computer Science, pages 565--579, Lille, France, April 1997. Springer.
doi: 10.1007/BFb0030626.
BibTex | DOI | Web page | PS | PDF ]
[BD97]
M. Bidoit and M. Dauchet, editors. Proceedings of the 7th International Joint Conference CAAP/FASE on Theory and Practice of Software Development (TAPSOFT'97), volume 1214 of Lecture Notes in Computer Science. Lille, France, Springer, April 1997.
BibTex | Web page ]
[Fin97]
A. Finkel. Algorithms and Semi-Algorithms for Infinite State Systems. In Proceedings of the Grenoble-Alpes d'Huez European School of Computer Science, Methods and Tools for the Verification of Infinite State Systems, pages 189--190, Grenoble, France, March 1997. Invited tutorial.
BibTex ]
[FM97]
A. Finkel and P. McKenzie. Verifying Identical Communicating Processes is Undecidable. Theoretical Computer Science, 174(1-2):217--230, March 1997.
BibTex | Web page | PS | PDF ]
[DGP97]
V. Diekert, P. Gastin, and A. Petit. Removing ε-Transitions in Timed Automata. In Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science (STACS'97), volume 1200 of Lecture Notes in Computer Science, pages 583--594, Lübeck, Germany, February 1997. Springer.
BibTex | Web page | PS | PDF ]
[HWB97]
R. Hennicker, M. Wirsing, and M. Bidoit. Proof Systems for Structured Specifications with Observability Operators. Theoretical Computer Science, 173(2):393--443, February 1997.
BibTex ]
[CFG97c]
Ch. Collet, A. Finkel, and R. Gherbi. Prise en compte dynamique des attitudes perceptive de l'usager. Rapport de synthèse (version IV de l'Action Inter-PRC 10.2 GDR-PRC ISIS & CHM : << Interaction Système-Environnement pour l'Interprétation des Signaux et des Images >>, 1997.
BibTex ]
[CCP97]
B. Charron-Bost, R. Cori, and A. Petit. Introduction à l'algorithmique en mémoire partagée. RAIRO Informatique Théorique et Applications, 31(2):97--148, 1997.
BibTex | Web page | PS | PDF ]
[BCK+97]
J.-C. Bajard, H. Comon, C. Kenyon, D. Krob, M. Morvan, J.-M. Muller, A. Petit, and Y. Robert. Exercices d'algorithmique (oraux d'ENS). Vuibert, January 1997.
BibTex ]
[KS97b]
O. Kouchnarenko and Ph. Schnoebelen. A Model for Recursive-Parallel Programs. In Proceedings of the 1st International Workshop on Verification of Infinite State Systems (INFINITY'96), volume 5 of Electronic Notes in Theoretical Computer Science, page 30, Pisa, Italy, 1997. Elsevier Science Publishers.
doi: 10.1016/S1571-0661(05)82512-5.
BibTex | DOI | Web page | PS | PDF ]
[FO97a]
L. Fribourg and H. Olsén. A Decompositional Approach for Computing Least Fixed-Points of Datalog Programs with Z-Counters. Constraints, 2(3-4):305--335, 1997.
BibTex | Web page | PS | PDF ]
[LS96]
F. Laroussinie and Ph. Schnoebelen. Translations for Model-Checking Temporal Logic with Past. In Actes des 5èmes Journées sur la Formalisation des Activités Concurrentes (FAC'96), pages 17--19, Toulouse, France, February 1996. Invited talk.
BibTex ]
[SL95]
Ph. Schnoebelen and F. Laroussinie. Temporal Logic with Past for the Specification and Verification of Reactive Systems. In Proceedings of the Conference Problèmes Actuels des Sciences Naturelles et Humaines, pages 143--146, Yaroslavl, Russia, November 1995. Yaroslavl University Press. Invited talk.
BibTex ]
[Fri91]
L. Fribourg. Automatic Generation of Simplification Lemmas for Inductive Proofs. In Proceedings of the 8th International Conference on Logic Programming (ICLP'91), pages 103--116, San Diego, California, USA, October 1991. MIT Press.
BibTex ]
[CF91]
P. H. Cheong and L. Fribourg. Efficient Integration of Simplification into Prolog. In Proceedings of the 3rd International Symposium on Programming Language Implementation and Logic Programming (PLILP'91), volume 528 of Lecture Notes in Computer Science, pages 359--370, Passau, Germany, August 1991. Springer-Verlag.
BibTex ]
[BS90]
Z. Belmesk and Ph. Schnoebelen. Une généralisation des présentations FP2 basée sur la théorie des réseaux. Research Report 832-I, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, November 1990.
BibTex ]
[Fri90a]
L. Fribourg. Contribution à la vérification des programmes logiques. Mémoire d'habilitation, Université Paris 7, Paris, France, October 1990.
BibTex ]
[Sch90]
Ph. Schnoebelen. Congruence Properties of the Process Equivalence Induced by Temporal Logic. Research Report 831-I, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, October 1990.
BibTex ]
[Fri90c]
L. Fribourg. A New Presburger Arithmetic Decision Procedure Based on Extended Prolog Execution. In Proceedings of the 2nd International Workshop on Programming Language Implementation and Logic Programming (PLILP'90), volume 456 of Lecture Notes in Computer Science, pages 174--188, Linköping, Sweden, August 1990. Springer-Verlag.
BibTex ]
[Fri90b]
L. Fribourg. Extracting Logic Programs from Proofs that use Extended Prolog Execution and Induction. In Proceedings of the 7th International Conference on Logic Programming (ICLP'90), pages 685--699, Jerusalem, Israel, June 1990. MIT Press.
BibTex ]
[JHI+89]
Ph. Jorrand, J.-M. Hufflen, M. B. Ibáñez, T. Karasek, S. Rogé, Ph. Schnoebelen, and A. Véron. Parallel Specification of the Connection Method on an FP2 Machine. Esprit Project 415, Deliverable D17, October 1989.
BibTex ]
[Fri89b]
L. Fribourg. A Strong Restriction of the Inductive Completion Procedure. Journal of Symbolic Computation, 8(3):253--276, September 1989.
BibTex ]
[Fri89a]
L. Fribourg. Proofs by Combinatory Induction on Recursively Reducible Expressions. In Resolution of Equations in Algebraic Structures, chapter 5, pages 117--141. Academic Press, March 1989.
BibTex ]
[Fri88b]
L. Fribourg. Functional Extensions to Prolog: Are They Needed? In Proceedings of the 1st International Workshop on Algebraic and Logic Programming (ALP'88), volume 343 of Lecture Notes in Computer Science, pages 21--29, Gaussig, German Democratic Republic, November 1988. Springer-Verlag. Invited paper.
BibTex ]
[Fri88a]
L. Fribourg. Equivalence-Preserving Transformations of Inductive Properties of Prolog Programs. In Proceedings of the 5th International Conference and Symposium on Logic Programming (ICLP/SLP'88), pages 893--908, Seattle, Washington, USA, August 1988. MIT Press.
BibTex ]
[SLC88]
Ph. Schnoebelen, D. Lugiez, and H. Comon. A Semantics for Polymorphic Subtypes in Computer Algebra. Research Report 711, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, March 1988.
BibTex ]
[BCFG86]
L. Bougé, N. Choquet, L. Fribourg, and M.-C. Gaudel. Test Sets Generation From Algebraic Specifications Using Logic Programming. Journal of Systems and Software, 6(4):343--360, November 1986.
BibTex ]
[Fri86]
L. Fribourg. A Strong Restriction of the Inductive Completion Procedure. In Proceedings of the 13th International Colloquium on Automata, Languages and Programming (ICALP'86), volume 226 of Lecture Notes in Computer Science, pages 105--115, Rennes, France, July 1986. Springer-Verlag.
BibTex ]
[Sch86b]
Ph. Schnoebelen. μ-FP2: A Prototype Interpreter for FP2. Research Report 573, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, January 1986.
BibTex ]
[Sch86a]
Ph. Schnoebelen. About the Implementation of FP2. Research Report 574, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, January 1986.
BibTex ]
[Sch85a]
Ph. Schnoebelen. The Semantics of Concurrency in FP2. Research Report 558, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, October 1985.
BibTex ]
[Fri85a]
L. Fribourg. SLOG: A Logic Programming Language Interpreter Based on Clausal Superposition and Rewriting. In Proceedings of the 2nd IEEE Symposium on Logic Programming (SLP'85), pages 172--184, Boston, Massachusetts, USA, July 1985. IEEE Computer Society Press.
BibTex ]
[Sch85b]
Ph. Schnoebelen. Sémantique du parallélisme en FP2. Rapport de DEA, Université de Grenoble, France, June 1985.
BibTex ]
[CFM85]
N. Choquet, L. Fribourg, and A. Mauboussin. Runnable Protocol Specifications Using the Logic Interpreter SLOG. In Proceedings of the IFIP WG6.1 5th International Conference on Protocol Specification, Testing and Verification (PSTV'85), pages 149--168, Toulouse-Moissac, France, June 1985. North-Holland.
BibTex ]
[JHM+85]
Ph. Jorrand, J.-M. Hufflen, A. Marty, J.- Ch. Marty, and Ph. Schnoebelen. FP2: The Language and its Formal Definition. Research Report 537, Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France, May 1985.
BibTex ]
[BCFG85]
L. Bougé, N. Choquet, L. Fribourg, and M.-C. Gaudel. Application of Prolog to Test Sets Generation from Algebraic Specifications. In Proceedings of the 1st International Joint Conference on Theory and Practice of Software Development (TAPSOFT'89), Volume 2: Colloquium on Software Engineering (CSE), volume 186 of Lecture Notes in Computer Science, pages 261--275, Berlin, Germany, March 1985. Springer-Verlag.
BibTex ]
[Fri85b]
L. Fribourg. A Superposition Oriented Theorem Prover. Theoretical Computer Science, 35(2-3):129--164, February 1985.
BibTex ]
[Fri84c]
L. Fribourg. Oriented Equational Clauses as a Programming Language. Journal of Logic Programming, 1(2):165--177, August 1984.
BibTex ]
[Fri84b]
L. Fribourg. Oriented Equational Clauses as a Programming Language. In Proceedings of the 11th International Colloquium on Automata, Languages and Programming (ICALP'84), volume 172 of Lecture Notes in Computer Science, pages 162--173, Antwerp, Belgium, July 1984. Springer-Verlag.
BibTex ]
[Fri84a]
L. Fribourg. A Narrowing Procedure for Theories with Constructors. In Proceedings of the 7th International Conference on Automated Deduction (CADE'84), volume 170 of Lecture Notes in Computer Science, pages 259--281, Napa, California, USA, May 1984. Springer-Verlag.
BibTex ]
[Fri83]
L. Fribourg. A Superposition Oriented Theorem Prover. In Proceedings of the 8th International Joint Conference on Artificial Intelligence (IJCAI'83), pages 923--925, Karlsruhe, West Germany, August 1983. William Kaufmann.
BibTex ]
[Fri82]
L. Fribourg. Démonstration automatique: réfutation par superposition de clauses équationnelles. Thèse de doctorat, Université Paris 7, Paris, France, September 1982.
BibTex ]

This file was generated by bibtex2html 1.98.

About LSV