Publications : LSV
-
[BDJ+21]
-
D. Baelde, S. Delaune, C. Jacomme, A. Koutsos, and
S. Moreau.
An Interactive Prover for Protocol Verification in the
Computational Model.
In Proceedings of the 42nd IEEE Symposium on Security and Privacy
(S&P'21), online, May 2021. IEEE Press.
To appear.
[ BibTex |
Web page |
PDF ]
-
[GH21]
-
S. Göller and M. Hilaire.
Reachability in two-parametric timed automata with one
parameter is EXPSPACE-complete.
In Proceedings of the 38th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'21), volume 187 of Leibniz
International Proceedings in Informatics, Saarbrücken, Germany, March
2021. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2021.36.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bae21]
-
D. Baelde.
Contributions to the Verification of Cryptographic
Protocols.
Mémoire d'habilitation, École Normale Supérieure
Paris-Saclay, France, February 2021.
[ BibTex |
Web page |
PDF ]
-
[DLM21a]
-
S. Demri, É. Lozes, and A. Mansutti.
A Complete Axiomatisation for Quantifier-Free
Separation Logic.
Research Report 2006.05156v2, Computing Research Repository, February
2021.
63 pages.
[ BibTex |
Web page |
PDF ]
-
[HB21]
-
G. Hondet and F. Blanqui.
Encoding of Predicate Subtyping with Proof Irrelevance in the
ΛΠ-Calculus Modulo Theory.
In Proceedings of the 26th International Conference on Types
for Proofs and Programs (TYPES'20), volume 188 of Leibniz International
Proceedings in Informatics, pages 6:1--6:18, Turin, Italy, 2021.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.TYPES.2020.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCC21b]
-
M. Boltenhagen, T. Chatain, and J. Carmona.
Optimized SAT encoding of conformance checking artefacts.
Computing, 103(1):29--50, 2021.
doi:
10.1007/s00607-020-00831-8.
[ BibTex |
DOI |
Web page ]
-
[BCC21a]
-
M. Boltenhagen, T. Chatain, and J. Carmona.
Anti-alignments—Measuring the precision of process models and
event logs.
Information Systems, 98, 2021.
To appear.
doi:
https://doi.org/10.1016/j.is.2020.101708.
[ BibTex |
DOI |
Web page ]
-
[BLRPR21]
-
V. Bruyère, S. Le Roux, A. Pauly, and J. Raskin.
On the existence of weak subgame perfect equilibria.
276, 2021.
doi:
https://doi.org/10.1016/j.ic.2020.104553.
[ BibTex |
DOI |
Web page ]
-
[BBF+21]
-
G. Bacci, P. Bouyer, U. Fahrenberg, K. Larsen, N. Markey, and
P. Reynier.
Optimal and robust controller synthesis using energy timed
automata with uncertainty.
Formal Aspects of Computing, 33:3--25, 2021.
doi:
10.1007/s00165-020-00521-4.
[ BibTex |
DOI |
Web page ]
-
[DFM21]
-
S. Demri, R. Fervari, and A. Mansutti.
Internal proof calculi for modal logics with separating
conjunction.
Journal of Logic and Computation, 2021.
Accepted for publication to the Special issue of JLC on External and
Internal Calculi for Non Classical Logics.
[ BibTex |
Web page |
PDF ]
-
[DLM21b]
-
S. Demri, É. Lozes, and A. Mansutti.
The Effects of Adding Reachability Predicates in Quantifier-Free
Separation Logic.
ACM Transactions on Computational Logic, 2021.
To appear.
[ BibTex |
Web page |
PDF ]
-
[DM21]
-
B. Dinis and É. Miquey.
Realizability with stateful computations for nonstandard
analysis.
In Proceedings of the 29th Annual EACSL Conference on
Computer Science Logic (CSL'21), Leibniz International Proceedings in
Informatics, pages 19:1--19:23, Ljubljana, Slovenia, January 2021.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2021.19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Lop21]
-
A. Lopez.
Preservation Theorems Through the Lens of Topology.
In Proceedings of the 29th Annual EACSL Conference on
Computer Science Logic (CSL'21), Leibniz International Proceedings in
Informatics, pages 32:1--32:17, Ljubljana, Slovenia, January 2021.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2021.32.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sch21]
-
Ph. Schnoebelen.
On flat lossy channel machines.
In Proceedings of the 29th Annual EACSL Conference on
Computer Science Logic (CSL'21), Leibniz International Proceedings in
Informatics, pages 37:1--37:22, Ljubljana, Slovenia, January 2021.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2021.37.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BRS21]
-
B. Bollig, F. Ryabinin, and A. Sangnier.
Reachability in Distributed Memory Automata.
In Proceedings of the 29th Annual EACSL Conference on
Computer Science Logic (CSL'21), Leibniz International Proceedings in
Informatics, pages 13:1--13:16, Ljubljana, Slovenia, January 2021.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2021.13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LRP21]
-
S. Le Roux and A. Pauly.
Equilibria in multi-player multi-outcome infinite sequential
games.
Information and Computation, 276, 2021.
doi:
https://doi.org/10.1016/j.ic.2020.104557.
[ BibTex |
DOI |
Web page ]
-
[Thi20]
-
F. Thiré.
Meta-theory of Cumulative Types Systems and their embeddings to
the ΛΠ-calculus modulo theory.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, December 2020.
[ BibTex |
Web page |
PDF ]
-
[Man20b]
-
A. Mansutti.
Reasoning with Separation Logics: Complexity, Expressive Power,
Proof Systems.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, December 2020.
[ BibTex |
Web page |
PDF ]
-
[Gen20a]
-
G. Genestier.
Dependently-Typed Termination and Embedding of Extensional
Universe-Polymorphic Type Theory using Rewriting.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, December 2020.
[ BibTex ]
-
[HHSY20]
-
S. Haar, S. Haddad, S. Schwoon, and L. Ye.
Active Prediction for Discrete Event Systems.
In Proceedings of the 40th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'20),
volume 182 of Leibniz International Proceedings in Informatics, pages
48:1--48:16, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi:
https://doi.org/10.4230/LIPIcs.FSTTCS.2020.48.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBM20]
-
N. Bertrand, P. Bouyer, and A. Majumdar.
Synthesizing safe coalition strategies.
In Proceedings of the 40th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'20),
volume 182 of Leibniz International Proceedings in Informatics, pages
39:1--39:17, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi:
https://doi.org/10.4230/LIPIcs.FSTTCS.2020.39.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GMS20]
-
P. Gastin, S. Mukherjee, and B. Srivathsan.
Reachability for updatable timed automata made faster and more
effective.
In Proceedings of the 40th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'20),
volume 182 of Leibniz International Proceedings in Informatics, pages
47:1--47:17, Goa, India, December 2020. Leibniz-Zentrum für Informatik.
doi:
https://doi.org/10.4230/LIPIcs.FSTTCS.2020.47.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AG20]
-
C. Aiswarya and P. Gastin.
Weighted Tiling Systems for Graphs: Evaluation Complexity.
In Proceedings of the 40th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'20),
volume 182 of Leibniz International Proceedings in Informatics, Goa, India,
December 2020. Leibniz-Zentrum für Informatik.
doi:
https://doi.org/10.4230/LIPIcs.FSTTCS.2020.34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[For20]
-
M. Fortin.
Expressivity of first-order logic, star-free propositional
dynamic logic and communicating automata.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, November 2020.
[ BibTex |
Web page |
PDF ]
-
[CJS20b]
-
H. Comon, C. Jacomme, and G. Scerri.
Oracle simulation: a technique for protocol composition with
long term shared secrets.
In Proceedings of the 27th ACM Conference on Computer and
Communications Security (CCS'20), pages 1427--1444, Orlando, USA,
November 2020. ACM Press.
doi:
10.1145/3372297.3417229.
[ BibTex |
DOI ]
-
[BCH20]
-
M. Boltenhagen, B. Chetioui, and L. Huber.
Cost-Based Classification of Log Traces Using
Machine-Learning.
In Process Mining Workshops (ICPM'20), pages 136--148, Padua,
Italy, October 2020. SPRINGER.
doi:
https://doi.org/10.1007/978-3-030-72693-5_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FP20]
-
A. Finkel and M. Praveen.
Verification of Flat FIFO Systems.
Logical Methods in Computer Science, 20(4), October 2020.
doi:
10.23638/LMCS-16(4:4)2020.
[ BibTex |
DOI |
Web page ]
-
[CFH+20]
-
D. Cho, M. Függer, C. Hopper, M. Kushwaha, T. Nowak,
and Q. Soubeyran.
Distributed Computation with Continual Population Growth.
In Proceedings of the 34th International Symposium on
Distributed Computing (DISC'20), Leibniz International Proceedings in
Informatics, pages 7:1--7:17, Freiburg, Germany, October 2020.
Leibniz-Zentrum für Informatik.
doi:
https://doi.org/10.4230/LIPIcs.DISC.2020.7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKM+20]
-
P. Bouyer, O. Kupferman, N. Markey, B. Maubert, A. Murano,
and G. Perelli.
Reasoning About Quality and Fuzziness of Strategic
Behaviours.
In Proceedings of the 24th European Conference on Artificial
Intelligence (ECAI'20), pages 2887--2888, Santiago de Compostela, Spain,
September 2020. IOS Press.
doi:
10.3233/FAIA200437.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SBvdA20]
-
M. F. Sani, M. Boltenhagen, and W. M. van der Aalst.
Prototype Selection using Clustering and Conformance Metrics for
Process Discovery.
In Business Process Management Workshops (BPM'20), Revised
Selected Papers, volume 397 of Lecture Notes in Business Information
Processing, pages 281--294, Sevilla, Spain, September 2020. Springer.
doi:
https://doi.org/10.1007/978-3-030-66498-5_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KNR+20]
-
I. Khmelnitsky, D. Neider, R. Roy, B. Barbot, B. Bollig,
A. Finkel, S. Haddad, M. Leucker, and L. Ye.
Property-Directed Verification of Recurrent Neural Networks.
Research Report 2009.10610, Computing Research Repository, September
2020.
[ BibTex |
Web page |
PDF ]
-
[HPS20]
-
S. Haar, L. Paulevé, and S. Schwoon.
Drawing the Line: Basin Boundaries in Safe Petri Nets.
In Proceedings of the 18th Conference on Computational
Methods in System Biology (CMSB'20), volume 12314 of Lecture Notes in
Bioinformatics, pages 321--336, held online, September 2020. Springer-Verlag.
doi:
10.1007/978-3-030-60327-4_17.
[ BibTex |
DOI ]
-
[BBR+20]
-
P. Bouyer, T. Brihaye, M. Randour, C. Rivière, and
P. Vandenhove.
Decisiveness of Stochastic Systems and its Application to Hybrid
Models.
In Proceedings of the 11th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'20), volume 326
of Electronic Proceedings in Theoretical Computer Science, page 149?165,
Brussels, Belgium, September 2020.
doi:
10.4204/EPTCS.326.10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBB+20]
-
B. Bérard, B. Bollig, P. Bouyer, M. Függer, and
N. Sznajder.
Synthesis in Presence of Dynamic Links.
In Proceedings of the 11th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'20), volume 326
of Electronic Proceedings in Theoretical Computer Science, page 33?49,
Brussels, Belgium, September 2020.
doi:
10.4204/EPTCS.326.3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DH20b]
-
S. Donatelli and S. Haddad.
Guarded Autonomous Transitions Increase Conciseness and
Expressiveness of Timed Automata.
In Proceedings of the 18th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'20), Lecture Notes
in Computer Science, pages 215--230, Vienna, Austria, September 2020.
Springer.
[ BibTex |
Web page ]
-
[BLRO+20]
-
P. Bouyer, S. Le Roux, Y. Oualhadj, M. Randour, and
P. Vandenhove.
Games Where You Can Play Optimally with Arena-Independent Finite
Memory.
In Proceedings of the 31st International Conference on
Concurrency Theory (CONCUR'20), volume 171 of Leibniz International
Proceedings in Informatics, pages 24:1--24:22, Vienna, Austria, September
2020. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2020.24.
[ BibTex |
DOI |
Web page ]
-
[AGSW20]
-
B. Adsul, P. Gastin, S. Sarkar, and P. Weil.
Wreath/cascade products and related decomposition results for
the concurrent setting of Mazurkiewicz traces.
In Proceedings of the 31st International Conference on
Concurrency Theory (CONCUR'20), volume 171 of Leibniz International
Proceedings in Informatics, pages 19:1--19:17, Vienna, Austria, September
2020. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2020.19.
[ BibTex |
DOI |
Web page ]
-
[BFS20]
-
B. Bollig, A. Finkel, and A. Suresh.
Bounded Reachability Problems are Decidable in FIFO Machines.
In Proceedings of the 31st International Conference on
Concurrency Theory (CONCUR'20), volume 171 of Leibniz International
Proceedings in Informatics, pages 49:1--49:17, Vienna, Austria, September
2020. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page ]
-
[BD20a]
-
F. Belardinelli and S. Demri.
Reasoning with a Bounded Number of Resources in ATL+.
In Proceedings of the 24th European Conference on Artificial
Intelligence (ECAI'20), pages 624--631, Santiago de Compostela, Spain,
September 2020. IOS Press.
doi:
10.3233/FAIA200147.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PKCH20]
-
L. Paulevé, J. Kolcák, T. Chatain, and S. Haar.
Reconciling qualitative, abstract, and scalable modeling of
biological networks.
Nature Communications, 11(4256), August 2020.
doi:
10.1038/s41467-020-18112-5.
[ BibTex |
DOI |
Web page ]
-
[DTFG20]
-
G. Douéneau-Tabot, E. Filiot, and P. Gastin.
Register transducers are marble transducers.
In Proceedings of the 43rd International Symposium on
Mathematical Foundations of Computer Science (MFCS'20), volume 170
of Leibniz International Proceedings in Informatics, pages 29:1--29:14,
Prague, Czech Republic, August 2020. Leibniz-Zentrum für Informatik.
doi:
https://doi.org/10.4230/LIPIcs.MFCS.2020.29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD20]
-
A. Díaz-Caro and G. Dowek.
Extensional proofs in a propositional logic modulo
isomorphisms.
Research Report 2002.03762v3, Computing Research Repository, July
2020.
[ BibTex |
Web page |
PDF ]
-
[BDM20a]
-
D. Baelde, S. Delaune, and S. Moreau.
A Method for Proving Unlinkability of Stateful Protocols.
In Proceedings of the 33rd IEEE Computer Security
Foundations Symposium (CSF'20), pages 169--183, Boston, MA, USA, July
2020. IEEE Computer Society Press.
[ BibTex |
Web page ]
-
[BDFM20]
-
B. Bednarczyk, S. Demri, R. Fervari, and A. Mansutti.
Modal Logics with Composition on Finite Forests: Expressivity
and Complexity.
In Proceedings of the 35th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'20), pages 167--180, Saarbrucken,
Germany, July 2020. IEEE Press.
doi:
https://dl.acm.org/doi/10.1145/3373718.3394787.
[ BibTex |
DOI |
PDF ]
-
[HM20]
-
H. Herbelin and É. Miquey.
A calculus of expandable stores.
Continuation-and-environment-passing style translations.
In Proceedings of the 35th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'20), pages 564--577, Saarbrucken,
Germany, July 2020. IEEE Press.
[ BibTex |
Web page ]
-
[JKB20]
-
C. Jacomme, S. Kremer, and G. Barthe.
Universal equivalence and majority on probabilistic programs
over finite fields.
In Proceedings of the 35th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'20), pages 155--166, Saarbrucken,
Germany, July 2020. IEEE Press.
[ BibTex |
Web page ]
-
[BDM20b]
-
B. Bednarczyk, S. Demri, and A. Mansutti.
A Framework for Reasoning about Dynamic Axioms in Description
Logics.
In Proceedings of the 29th International Joint Conference on
Artificial Intelligence (IJCAI'20). IJCAI organization, July 2020.
[ BibTex |
Web page ]
-
[HK20]
-
S. Haddad and I. Khmelnitsky.
Dynamic Recursive Petri Nets.
In Proceedings of the 41st International Conference on
Applications and Theory of Petri Nets (PETRI NETS'20), volume 12152
of Lecture Notes in Computer Science, pages 345--366, Paris, France, June
2020. Springer.
doi:
10.1007/978-3-030-51831-8_17.
[ BibTex |
DOI |
Web page ]
-
[Bla20]
-
F. Blanqui.
Type safety of rewriting rules in dependent types.
In Proceedings of the 5th International Conference on Formal
Structures for Computation and Deduction (FSCD'20), Leibniz International
Proceedings in Informatics, Paris, France, June 2020. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSCD.2020.13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gen20b]
-
G. Genestier.
Encoding Agda Programs using Rewriting.
In Proceedings of the 5th International Conference on Formal
Structures for Computation and Deduction (FSCD'20), Leibniz International
Proceedings in Informatics, Paris, France, June 2020. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSCD.2020.31.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HB20]
-
G. Hondet and F. Blanqui.
The new rewriting engine of Dedukti (System Description).
In Proceedings of the 5th International Conference on Formal
Structures for Computation and Deduction (FSCD'20), Leibniz International
Proceedings in Informatics, pages 35:1--35:16, Paris, France, June 2020.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSCD.2020.35.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFLS20]
-
S. Carpov, C. Fontaine, D. Ligier, and R. Sirdey.
Illuminating the Dark or how to recover what should not be seen
in FE-based classifiers.
2020:1--35, May 2020.
doi:
10.2478/popets-2020-0015.
[ BibTex |
DOI |
Web page ]
-
[BFL+20]
-
J. Bund, M. Függer, C. Lenzen, M. Medina, and
W. Rosenbaum.
PALS: Plesiochronous and Locally Synchronous Systems.
In Proceedings of the 26th IEEE International Symposium on
Asynchronous Circuits and Systems (ASYNC'20), Publication only, May
2020. IEEE Computer Society.
[ BibTex |
PDF ]
-
[KDH+20]
-
J. Kolcák, J. Dubut, I. Hasuo, S.-Y. Katsumata,
D. Sprunger, and A. Yamada.
Relational Differential Dynamic Logic.
In Proceedings of the 26th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'20),
volume 12078 of Lecture Notes in Computer Science, pages 191--208, Dublin,
Ireland, April 2020. Springer.
doi:
10.1007/978-3-030-45190-5_11.
[ BibTex |
DOI |
Web page ]
-
[AGKR20]
-
S. Akshay, P. Gastin, S. N. Krishna, and S. Roychoudhary.
Revisiting Underapproximate Reachability for Multipushdown
Systems.
In Proceedings of the 26th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'20),
volume 12078 of Lecture Notes in Computer Science, pages 387--404, Dublin,
Ireland, April 2020. Springer.
doi:
10.1007/978-3-030-45190-5_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Man20a]
-
A. Mansutti.
An auxiliary logic on trees: on the Tower-hardness of logics
featuring reachability and submodel reasoning.
In Proceedings of the 23rd International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'20), Lecture Notes in Computer Science, pages 462--481, Dublin,
Ireland, April 2020. Springer.
doi:
10.1007/978-3-030-45231-5_24.
[ BibTex |
DOI ]
-
[FHK20b]
-
A. Finkel, S. Haddad, and I. Khmelnitsky.
Minimal coverability tree construction made complete and
efficient.
In Proceedings of the 23rd International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'20), Lecture Notes in Computer Science, pages 237--256, Dublin,
Ireland, April 2020. Springer.
doi:
10.1007/978-3-030-45231-5_13.
[ BibTex |
DOI ]
-
[BBLS20]
-
B. Bérard, B. Bollig, M. Lehaut, and N. Sznajder.
Parameterized Synthesis for Fragments of First-Order Logic over
Data Words.
In Proceedings of the 23rd International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'20), Lecture Notes in Computer Science, pages 97--118, Dublin,
Ireland, April 2020. Springer.
doi:
10.1007/978-3-030-45231-5_6.
[ BibTex |
DOI ]
-
[AVL+20]
-
N. Alexopoulos, E. Vasilomanolakis, S. Le Roux, S. Rowe,
and M. Mühlhäuser.
TRIDEnT: Towards a Decentralized Threat Indicator
Marketplace.
In Proceedings of the 35th ACM/SIGAPP Symposium on Applied
Computing (SAC'20), pages 332--341, Brno, Czech Republic, March 2020. ACM
Press.
doi:
10.1145/3341105.3374020.
[ BibTex |
DOI |
Web page ]
-
[DH20a]
-
S. Donatelli and S. Haddad.
Expressiveness and Conciseness of Timed Automata for the
Verification of Stochastic Models.
In Proceedings of the 14th International Conference on
Language and Automata Theory and Applications (LATA'20), volume
12038 of Lecture Notes in Computer Science, pages 170--183, Milan, Italy,
March 2020. Springer.
[ BibTex ]
-
[BD20b]
-
D. Berwanger and L. Doyen.
Observation and Distinction. Representing Information in
Infinite Games.
In Proceedings of the 37th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'20), Leibniz International
Proceedings in Informatics, pages 48:1--48:17, Montpellier, France, March
2020. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2020.48.
[ BibTex |
DOI ]
-
[ADL20]
-
N. Alechina, S. Demri, and B. Logan.
Parameterised Resource-Bounded ATL.
In Proceedings of the 34th AAAI Conference on Artificial
Intelligence (AAAI'20), pages 7040--7046. AAAI Press, February 2020.
doi:
https://doi.org/10.1609/aaai.v34i05.6189.
[ BibTex |
DOI |
Web page ]
-
[GM20]
-
J. Goubault-Larrecq and F. Mynard.
Convergence without Points.
Houston Journal of Mathematics, 46(1):227--282, 2020.
[ BibTex |
PDF ]
-
[DLM20]
-
S. Demri, É. Lozes, and A. Mansutti.
Internal Calculi for Separation Logics.
In Proceedings of the 28th Annual EACSL Conference on
Computer Science Logic (CSL'20), Leibniz International Proceedings in
Informatics, Barcelona, Spain, January 2020. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.CSL.2020.19.
[ BibTex |
DOI |
Web page ]
-
[CHK+20]
-
Th. Chatain, S. Haar, J. Kolcák, L. Paulevé,
and A. Thakkar.
Concurrency in Boolean networks.
Natural Computing, 19:91--109, 2020.
[ BibTex |
Web page |
PDF ]
-
[GBM20]
-
P. Gardy, P. Bouyer, and N. Markey.
Dependences in Strategy Logic.
Theory of Computing Systems, 64(3), 2020.
[ BibTex |
Web page |
PDF ]
-
[CJS20a]
-
T. Chatain, R. Janicki, and N. Sidorova, editors.
Proceedings of the 41st Conference on Petri Nets
(PN'20), Paris, France, 2020. Springer.
[ BibTex |
Web page ]
-
[JMS20]
-
L. Jezequel, A. Madalinski, and S. Schwoon.
Distributed computation of vector clocks in Petri net
unfoldings for test selection.
Discrete Event Dynamic Systems: Theory and Applications,
30(3):441--464, 2020.
[ BibTex ]
-
[AMP20]
-
P. Arrighi, S. Martiel, and S. Perdrix.
Reversible causal graph dynamics: invertibility, block
representation, vertex-preservation.
Natural Computing, 19(1):157--178, 2020.
doi:
10.1007/s11047-019-09768-0.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JFA20a]
-
J. Jerray, L. Fribourg, and É. André.
Guaranteed phase synchronization of hybrid oscillators using
symbolic Euler's method: The Brusselator and biped examples.
Research Report 2006.09993, Computing Research Repository, 2020.
[ BibTex |
Web page |
PDF ]
-
[JFA20b]
-
J. Jerray, L. Fribourg, and É. André.
Robust optimal control using dynamic programming and guaranteed
Euler's method.
Research Report 2007.13644, Computing Research Repository, 2020.
[ BibTex |
Web page |
PDF ]
-
[JF20]
-
J. Jerray and L. Fribourg.
Generation of bounded invariants via stroboscopic set-valued
maps: Application to the stability analysis of parametric time-periodic
systems.
Research Report 2012.09310, Computing Research Repository, 2020.
[ BibTex |
Web page |
PDF ]
-
[Lop20]
-
A. Lopez.
Preservation Theorems Through the Lens of Topology.
Research Report 2007.07879, Computing Research Repository, 2020.
[ BibTex |
Web page |
PDF ]
-
[BCC20]
-
M. Boltenhagen, T. Chatain, and J. Carmona.
Model-based trace variant analysis of event logs.
Information Systems, 2020.
To appear.
doi:
https://doi.org/10.1016/j.is.2020.101675.
[ BibTex |
DOI |
Web page ]
-
[BM20]
-
B. Barras and V. Maestracci.
Implementation of Two Layers Type Theory in Dedukti and
Application to Cubical Type Theory.
In Proceedings of the 15th International Workshop on Logical
Frameworks and Meta-Languages: Theory and Practice (LFMTP'20),
pages 54--67, Paris, France, 2020. ACM Press.
doi:
10.4204/EPTCS.332.4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fin20]
-
A. Finkel.
From Well Structured Transition Systems to Program
Verification.
In Proceedings of 8th International Workshop on Verification
and Program Transformation and 7th Workshop on Horn Clauses for
Verification and Synthesis (VPT/HCVS@ETAPS 2020), pages 44--49, Dublin,
Ireland, 2020. Electronic Proceedings in Theoretical Computer Science.
doi:
10.4204/EPTCS.320.3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LR20]
-
S. Le Roux.
Time-Aware Uniformization of Winning Strategies.
In Proceedings of the 16th Conference on Computability in
Europe (CiE 2020), volume 12098 of Lecture Notes in Computer Science,
pages 193--204, Fisciano, Italy, 2020. Springer-Verlag.
doi:
https://doi.org/10.1007/978-3-030-51466-2_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GMG20]
-
P. Gastin, A. Manuel, and R. Govind.
Reversible Regular Languages: Logical and Algebraic
Characterisations.
Fundamenta Informaticae, 2020.
To appear.
[ BibTex ]
-
[FHK20a]
-
A. Finkel, S. Haddad, and I. Khmelnitsky.
Commodification of accelerations for the Karp and Miller
Construction.
Discrete Event Dynamic Systems: Theory and Applications, 2020.
doi:
10.1007/s10626-020-00331-z.
[ BibTex |
DOI |
Web page ]
-
[BHL20]
-
N. Bertrand, S. Haddad, and E. Lefaucheux.
Diagnosis and Degradation Control for Probabilistic Systems.
Discrete Event Dynamic Systems: Theory and Applications,
30:695–723, 2020.
doi:
10.1007/s10626-020-00320-2.
[ BibTex |
DOI |
Web page ]
-
[FG20]
-
A. Finkel and J. Goubault-Larrecq.
Forward analysis for WSTS, part I: completions.
Mathematical Structures in Computer Science, 30(7):752--832, 2020.
doi:
10.1017/S0960129520000195.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GK20]
-
J. Goubault-Larrecq and B. König, editors.
Proceedings of the 23rd Conference on Foundations of
Software Science and Computation Structures (FoSSaCS'20), Dublin,
Ireland, 2020. Springer.
[ BibTex |
Web page ]
-
[BJO20]
-
F. Blanqui, J. Jouannaud, and M. Okada.
Corrigendum to Inductive-data-type systems [Theoret.
Comput. Sci. 272 (1-2) (2002) 41-68].
Theoretical Computer Science, 817:81--82, 2020.
doi:
10.1016/j.tcs.2018.01.010.
[ BibTex |
DOI |
Web page ]
-
[BFG20a]
-
M. Blondin, A. Finkel, and J. Goubault-Larrecq.
Forward Analysis for WSTS, Part III: Karp-Miller Trees.
Logical Methods in Computer Science, 16(2), 2020.
doi:
10.23638/LMCS-16(2:13)2020.
[ BibTex |
DOI |
Web page ]
-
[DGK20]
-
V. Dave, P. Gastin, and S. N. Krishna.
Regular Transducer Expressions for Regular Transformations.
Information and Computation, 2020.
[ BibTex |
Web page |
PDF ]
-
[BFG20b]
-
B. Bollig, M. Fortin, and P. Gastin.
Communicating Finite-State Machines, First-Order Logic, and
Star-Free Propositional Dynamic Logic.
Journal of Computer and System Sciences, pages 22--53, 2020.
doi:
10.1016/j.jcss.2020.06.006.
[ BibTex |
DOI |
PDF ]
-
[Gou20b]
-
J. Goubault-Larrecq.
Some Topological Properties of Spaces of Lipschitz Continuous
Maps on Quasi-Metric Spaces.
Topology and its Applications, 282, 2020.
doi:
10.1016/j.topol.2020.107281.
[ BibTex |
DOI |
Web page ]
-
[LRP20]
-
S. Le Roux and A. Pauly.
A Semi-Potential for Finite and Infinite Games in Extensive
Form.
Dynamic Games and Applications, 10(1):120--144, 2020.
doi:
10.1007/s13235-019-00301-7.
[ BibTex |
DOI |
Web page ]
-
[BFLM20]
-
J. Bund, M. Függer, C. Lenzen, and M. Medina.
Synchronizer-free Digital Link Controller.
IEEE Transactions on Circuits and Systems I, 67(10):3562--3573, 2020.
doi:
10.1109/TCSI.2020.2989552.
[ BibTex |
DOI |
Web page ]
-
[FKN20]
-
M. Függer, M. Kushwaha, and T. Nowak.
Digital Circuit Design for Biological and Silicon Computers.
In Advances in Synthetic Biology. Springer, 2020.
To appear.
[ BibTex ]
-
[FNW20]
-
M. Függer, T. Nowak, and K. Winkler.
On the radius of nonsplit graphs and information dissemination
in dynamic networks.
Discrete Applied Mathematics, 282:257--264, 2020.
doi:
10.1016/j.dam.2020.02.013.
[ BibTex |
DOI |
Web page ]
-
[ABF20]
-
P. Arrighi, C. Bény, and T. Farrelly.
A quantum cellular automaton for one-dimensional QED.
Quantum Information Processing, 19(88), 2020.
doi:
10.1007/s11128-019-2555-4.
[ BibTex |
DOI |
Web page ]
-
[MA20]
-
G. D. Molfetta and P. Arrighi.
A quantum walk with both a continuous-time limit and a
continuous-spacetime limit.
Quantum Information Processing, 19(47), 2020.
doi:
10.1007/s11128-019-2549-2.
[ BibTex |
DOI |
Web page ]
-
[BFNS20]
-
D. Baelde, A. P. Felty, G. Nadathur, and A. Saurin.
A special issue on structural proof theory, automated reasoning
and computation in celebration of Dale Miller's 60th birthday.
Mathematical Structures in Computer Science, 29(8):1007--1008, 2020.
doi:
10.1017/S0960129519000136.
[ BibTex |
DOI ]
-
[BGHLR20]
-
T. Brihaye, G. Geeraerts, M. Hallet, and S. Le Roux.
On the termination of dynamics in sequential games.
Information and Computation, 272, 2020.
doi:
10.1016/j.ic.2019.104505.
[ BibTex |
DOI ]
-
[JLDJ20]
-
Y. Jiang, J. Liu, G. Dowek, and K. Ji.
Towards Combining Model Checking and Proof Checking.
The Computer Journal, 62(9):1365--1402, 2020.
doi:
10.1093/comjnl/bxy112.
[ BibTex |
DOI |
PDF ]
-
[BBC+20]
-
G. Burel, G. Bury, R. Cauderlier, D. Delahaye, P. Halmagrand,
and O. Hermant.
First-Order Automated Reasoning with Theories: When Deduction
Modulo Theory Meets Practice.
Journal of Automated Reasoning, 64:1001--1050, 2020.
doi:
10.1007/s10817-019-09533-z.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GHK+20]
-
J. Goubault-Larrecq, S. Halfon, P. Karandikar, K. Narayan
Kumar, and Ph. Schnoebelen.
The Ideal Approach to Computing Closed Subsets in
Well-Quasi-Orderings.
In Well-Quasi Orders in Computation, Logic, Language and Reasoning,
volume 53 of Trends In Logic, pages 55--105. Springer, 2020.
doi:
10.1007/978-3-030-30229-0_3.
[ BibTex |
DOI ]
-
[DSS20]
-
M. Džamonja, S. Schmitz, and
Ph. Schnoebelen.
On Ordinal Invariants in Well Quasi Orders and Finite Antichain
Orders.
In Well-Quasi Orders in Computation, Logic, Language and Reasoning,
volume 53 of Trends In Logic, pages 2--54. Springer, 2020.
doi:
10.1007/978-3-030-30229-0_2.
[ BibTex |
DOI ]
-
[Gou20a]
-
J. Goubault-Larrecq.
Π02 Subsets of Domain-Complete Spaces and Countably
Correlated Spaces.
Topology Proceedings, 58:13--22, 2020.
E-published on March 24, 2020.
[ BibTex |
PDF ]
-
[BHL19]
-
N. Bertrand, S. Haddad, and E. Lefaucheux.
A Tale of Two Diagnoses in Probabilistic Systems.
Information and Computation, 269, December 2019.
doi:
10.1016/j.ic.2019.104441.
[ BibTex |
DOI |
PDF ]
-
[GF19]
-
E. Gupta and A. Finkel.
The well structured problem for Presburger counter machines.
In Proceedings of the 39th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'19),
Leibniz International Proceedings in Informatics, pages 41:1--41:15, Bombay,
India, December 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2019.41.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBM19a]
-
N. Bertrand, P. Bouyer, and A. Majumdar.
Concurrent parameterized games.
In Proceedings of the 39th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'19),
Leibniz International Proceedings in Informatics, pages 31:1--31:15, Bombay,
India, December 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2019.31.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Man19]
-
H. Mandon.
Algorithms for Cell Reprogramming Strategies in Boolean
Networks.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, December 2019.
[ BibTex |
Web page |
PDF ]
-
[LF19a]
-
A. Le Coënt and L. Fribourg.
Guaranteed Control of Sampled Switched Systems using
Semi-Lagrangian Schemes and One-Sided Lipschitz Constants.
In Proceedings of the 58th IEEE Conference on Decision and
Control (CDC'19), pages 599--604, Nice, France, December 2019. IEEE
Control System Society.
doi:
10.1109/CDC40024.2019.9029376.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CG19]
-
A. Chattopadhyay and P. Gastin, editors.
Proceedings of the 39th Conference on Foundations of
Software Technology and Theoretical Computer Science
(FSTTCS'19), Leibniz International Proceedings in Informatics, Bombay,
India, December 2019. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page ]
-
[Gon19]
-
M. González.
Stochastic Games on Graphs with Applications to Smart-Grids
Optimization.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, November 2019.
[ BibTex |
Web page |
PDF ]
-
[FHK19b]
-
A. Finkel, S. Haddad, and I. Khmelnitsky.
Réification des accélérations pour la construction
de Karp et Miller.
In Actes du 12ème Colloque sur la Modélisation des
Systèmes Réactifs (MSR'19), Angers, France, November 2019. HAL.
[ BibTex |
Web page |
PDF ]
-
[DH19b]
-
S. Donatelli and S. Haddad.
Autonomous Transitions Enhance CSLTA Expressiveness and
Conciseness.
Research Report hal-02306021, HAL, October 2019.
23 pages.
[ BibTex |
Web page |
PDF ]
-
[Sao19]
-
A. Saoud.
Compositional and Efficient Controller Synthesis for
Cyber-Physical Systems.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, October 2019.
[ BibTex |
Web page |
PDF ]
-
[LF19b]
-
A. Le Coënt and L. Fribourg.
Guaranteed Optimal Reachability Control of Reaction-Diffusion
Equations Using One-Sided Lipschitz Constants and Model Reduction.
In 9th International Workshop on Cyber Physical Systems (CyPhy'19)
and 15th International Workshop on Model-Based Design (WESE'19), Revised
Selected Papers, volume 11971 of Lecture Notes in Computer Science, pages
181--202, New York City, NY, USA, October 2019. Springer.
doi:
10.1007/978-3-030-41131-2_9.
[ BibTex |
DOI |
Web page ]
-
[Bou19a]
-
P. Bouyer.
A Note on Game Theory and Verification (Invited Talk).
In Proceedings of the 17th International Symposium on
Automated Technology for Verification and Analysis (ATVA'19),
volume 11781 of Lecture Notes in Computer Science, pages 3--22, Taipei,
Taiwan, October 2019. Springer.
doi:
10.1007/978-3-030-31784-3_1.
[ BibTex |
DOI ]
-
[Bou19b]
-
P. Bouyer.
On the Computation of Nash Equilibria in Games on Graphs
(Invited Talk).
In Proceedings of the 26th International Symposium on
Temporal Representation and Reasoning (TIME'19), Leibniz
International Proceedings in Informatics, pages 3:1--3:3, Málaga,
Spain, October 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.TIME.2019.3.
[ BibTex |
DOI ]
-
[MSH+19]
-
H. Mandon, C. Su, S. Haar, J. Pang, and L. Paulevé.
Sequential Reprogramming of Boolean Networks Made Practical.
In Proceedings of the 17th Conference on Computational
Methods in System Biology (CMSB'19), volume 11773 of Lecture Notes in
Bioinformatics, pages 3--19, Trieste, Italy, September 2019. Springer-Verlag.
doi:
10.1007/978-3-030-31304-3_1.
[ BibTex |
DOI ]
-
[SZ19]
-
S. Schmitz and G. Zetzsche.
Coverability Is Undecidable in One-Dimensional Pushdown Vector
Addition Systems with Resets.
In Proceedings of the 13th Workshop on Reachability Problems
in Computational Models (RP'19), volume 11674 of Lecture Notes in
Computer Science, pages 193--201, Brussels, Belgium, September 2019.
Springer.
doi:
10.1007/978-3-030-30806-3_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DT19]
-
G. Douéneau-Tabot.
Register Models for Pebble Transducers and Applications to
Optimization.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2019.
[ BibTex ]
-
[Gri19]
-
E. Grienenberger.
Concept alignment in Logipedia - Alignement of logical
connectives between HOL Light and Dedukti.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2019.
[ BibTex ]
-
[Lop19]
-
A. Lopez.
Théorèmes de préservation.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2019.
[ BibTex ]
-
[Sur19]
-
A. Suresh.
Termination, boundedness and reachability for input-bounded
FIFO Machines.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2019.
[ BibTex ]
-
[Jaz19]
-
S. Jaziri.
Automata on Timed Structures.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, September 2019.
[ BibTex |
Web page |
PDF ]
-
[Kou19c]
-
A. Koutsos.
Preuves symboliques de propriétés
d'indistinguabilité calculatoire.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, September 2019.
[ BibTex |
Web page |
PDF ]
-
[BCC19a]
-
M. Boltenhagen, T. Chatain, and J. Carmona.
Encoding Conformance Checking Artefacts in SAT.
In Business Process Management Workshops (BPM'19), Revised
Selected Papers, volume 362 of Lecture Notes in Business Information
Processing, pages 160--171, Vienna, Austria, September 2019. Springer.
doi:
10.1007/978-3-030-37453-2_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EHBB19]
-
M. El Haddad, G. Burel, and F. Blanqui.
Ekstrakto: A tool to reconstruct Dedukti proofs from
TSTP files (extended abstract).
In Proceedings of the 6th Workshop on Proof eXchange for
Theorem Proving (PxTP'19), volume 301 of Electronic Proceedings in
Theoretical Computer Science, pages 27--35, Natal, Brazil, August 2019.
[ BibTex |
Web page |
PDF ]
-
[GMG19]
-
P. Gastin, A. Manuel, and R. Govind.
Logics for Reversible Regular Languages and Semigroups with
Involution.
In Proceedings of the 23th International Conference on
Developments in Language Theory (DLT'19), volume 11647 of Lecture
Notes in Computer Science, pages 182--191, Warsaw, Poland, August 2019.
Springer.
doi:
10.1007/978-3-030-24886-4_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DG19]
-
M. Droste and P. Gastin.
Aperiodic Weighted Automata and Weighted First-Order Logic.
In Proceedings of the 42nd International Symposium on
Mathematical Foundations of Computer Science (MFCS'19), volume 138
of Leibniz International Proceedings in Informatics, pages 76:1--76:15,
Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2019.76.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BT19]
-
P. Bouyer and N. Thomasset.
Nash equilibria in games over graphs equipped with a
communication mechanism.
In Proceedings of the 42nd International Symposium on
Mathematical Foundations of Computer Science (MFCS'19), volume 138
of Leibniz International Proceedings in Informatics, pages 9:1--9:14, Aachen,
Germany, August 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2019.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBM19b]
-
N. Bertrand, P. Bouyer, and A. Majumdar.
Reconfiguration and message losses in parameterized broadcast
networks.
In Proceedings of the 30th International Conference on
Concurrency Theory (CONCUR'19), volume 140 of Leibniz International
Proceedings in Informatics, pages 32:1--32:15, Amsterdam, The Netherlands,
August 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2019.32.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FP19]
-
A. Finkel and M. Praveen.
Verification of Flat FIFO Systems.
In Proceedings of the 30th International Conference on
Concurrency Theory (CONCUR'19), volume 140 of Leibniz International
Proceedings in Informatics, pages 12:1--12:17, Amsterdam, The Netherlands,
August 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2019.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DFKN19]
-
J. Danger, L. Fribourg, U. Kühne, and M. Naceur.
LAOCOÖN: A Run-Time Monitoring and Verification Approach
for Hardware Trojan Detection.
In Proceedings of the 22nd Euromicro Conference on Digital
System Design (DSD'19), pages 269--276, Kallithea, Greece, August 2019.
IEEE Press.
doi:
10.1109/DSD.2019.00047.
[ BibTex |
DOI |
Web page ]
-
[Kou19b]
-
A. Koutsos.
Decidability of a Sound Set of Inference Rules for Computational
Indistinguishability.
In Proceedings of the 32nd IEEE Computer Security
Foundations Symposium (CSF'19), pages 48--61, Hoboken, NJ, USA, July
2019. IEEE Computer Society Press.
doi:
10.1109/CSF.2019.00011.
[ BibTex |
DOI |
PDF ]
-
[GMS19]
-
P. Gastin, S. Mukherjee, and B. Srivathsan.
Fast algorithms for handling diagonal constraints in timed
automata.
In Proceedings of the 31st International Conference on
Computer Aided Verification (CAV'19), volume 11561 of Lecture Notes
in Computer Science, pages 41--59, New York, USA, July 2019. Springer.
doi:
10.1007/978-3-030-25540-4_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKM+19]
-
P. Bouyer, O. Kupferman, N. Markey, B. Maubert, A. Murano,
and G. Perelli.
Reasoning about Quality and Fuzziness of Strategic Behaviours.
In Proceedings of the 28th International Joint Conference on
Artificial Intelligence (IJCAI'19), pages 1588--1594. IJCAI
organization, July 2019.
doi:
10.24963/ijcai.2019/220.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sch19]
-
S. Schmitz.
The Parametric Complexity of Lossy Counter Machines.
In Proceedings of the 46th International Colloquium on
Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz
International Proceedings in Informatics, pages 129:1--129:15, Patras,
Greece, July 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2019.129.
[ BibTex |
DOI |
Web page |
PDF ]
-
[For19]
-
M. Fortin.
FO = FO3 for linear orders with monotone binary relations.
In Proceedings of the 46th International Colloquium on
Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz
International Proceedings in Informatics, pages 116:1--116:13, Patras,
Greece, July 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2019.116.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGJ+19]
-
G. Barthe, B. Grégoire, C. Jacomme, S. Kremer, and P.-Y.
Strub.
Symbolic methods in computational cryptography proofs.
In Proceedings of the 32nd IEEE Computer Security
Foundations Symposium (CSF'19), pages 136--151, Hoboken, NJ, USA, July
2019. IEEE Computer Society Press.
doi:
10.1109/CSF.2019.00017.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Lic19]
-
A. Lick.
XPath-like Query Logics: Proof Systems and Real-World
Applicability.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, July 2019.
[ BibTex |
Web page |
PDF ]
-
[ÖMFS19]
-
D. Öhlinger, J. Maier, M. Függer, and U. Schmid.
The Involution Tool for Accurate Digital Timingand Power
Analysis.
In Proceedings of the 29th International Symposium on Power
and Timing Modeling, Optimization and Simulation (PATMOS'19), pages
1--8, Rhodes, Greece, July 2019. IEEE Press.
doi:
10.1109/PATMOS.2019.8862165.
[ BibTex |
DOI |
Web page ]
-
[BLS19]
-
D. Baelde, A. Lick, and S. Schmitz.
Decidable XPath Fragments in the Real World.
In Proceedings of the 38th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'19), pages 285--302, Amsterdam, Netherlands, June-July
2019. ACM Press.
doi:
10.1145/3294052.3319685.
[ BibTex |
DOI |
Web page ]
-
[Gen19]
-
G. Genestier.
SizeChangeTool: A Termination Checker for
Rewriting Dependent Types.
In Proceedings of the 10th International Workshop on
Higher-Order Rewriting (HOR'19), pages 14--19, Dortmund, Germany,
June 2019.
[ BibTex |
PDF ]
-
[dBGJL19]
-
M. de Brecht, J. Goubault-Larrecq, X. Jia, and Z. Lyu.
Domain-complete and LCS-complete Spaces.
In Proceedings of the International Symposium on Domain
Theory (ISDT'19), volume 345 of Electronic Notes in Theoretical Computer
Science, pages 3--35, Yangzhou, China, June 2019. Elsevier Science
Publishers.
doi:
10.1016/j.entcs.2019.07.014.
[ BibTex |
DOI ]
-
[GJ19]
-
J. Goubault-Larrecq and X. Jia.
Algebras of the Extended Probabilistic Powerdomain Monad.
In Proceedings of the International Symposium on Domain
Theory (ISDT'19), volume 345 of Electronic Notes in Theoretical Computer
Science, pages 37--61, Yangzhou, China, June 2019. Elsevier Science
Publishers.
doi:
10.1016/j.entcs.2019.07.015.
[ BibTex |
DOI ]
-
[BGH19]
-
F. Blanqui, G. Genestier, and O. Hermant.
Dependency Pairs Termination in Dependent Type Theory Modulo
Rewriting.
In Proceedings of the 4th International Conference on Formal
Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz
International Proceedings in Informatics, pages 9:1--9:21, Dortmund, Germany,
June 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSCD.2019.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD19]
-
A. Díaz-Caro and G. Dowek.
Proof Normalisation in a Logic Identifying Isomorphic
Propositions.
In Proceedings of the 4th International Conference on Formal
Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz
International Proceedings in Informatics, pages 14:1--14:23, Dortmund,
Germany, June 2019. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSCD.2019.14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gas19]
-
P. Gastin.
Modular Descriptions of Regular Functions.
In Proceedings of the 8th International Conference on
Algebraic Informatics (CAI'19), volume 11545 of Lecture Notes in
Computer Science, pages 3--9, Nis, Serbia, June 2019. Springer.
Invited talk.
doi:
10.1007/978-3-030-21363-3_1.
[ BibTex |
DOI |
PDF ]
-
[Kou19a]
-
A. Koutsos.
The 5G-AKA Authentication Protocol Privacy.
In Proceedings of the 4th IEEE European Symposium on Security and
Privacy (EuroS&P'19), pages 464--479, Stockholm, Sweden, June 2019. IEEE
Press.
doi:
10.1109/EuroSP.2019.00041.
[ BibTex |
DOI |
PDF ]
-
[BCC19b]
-
M. Boltenhagen, T. Chatain, and J. Carmona.
Generalized Alignment-Based Trace Clustering of Process
Behavior.
In Proceedings of the 40th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522
of Lecture Notes in Computer Science, pages 237--257, Aachen, Germany, June
2019. Springer.
doi:
10.1007/978-3-030-21571-2_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BD19b]
-
F. Belardinelli and S. Demri.
Resource-bounded ATL: the Quest for Tractable Fragments.
In Proceedings of the 18th International Joint Conference on
Autonomous Agents and Multi-Agent Systems (AAMAS'19), pages
206--214, Montreal, Canada, June 2019. ACM Press.
[ BibTex |
Web page |
PDF ]
-
[DFM19]
-
S. Demri, R. Fervari, and A. Mansutti.
Axiomatising logics with separating conjunctions and
modalities.
In Proceedings of the 16th European Conference on Logics in
Artificial Intelligence (JELIA'19), volume 11468 of Lecture Notes in
Artificial Intelligence, pages 692--708, Rende, Italy, June 2019. Springer.
doi:
10.1007/978-3-030-19570-0_45.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FHK19a]
-
A. Finkel, S. Haddad, and I. Khmelnitsky.
Coverability and Termination in Recursive Petri Nets.
In Proceedings of the 40th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522
of Lecture Notes in Computer Science, pages 429--448, Aachen, Germany, June
2019. Springer.
doi:
10.1007/978-3-030-21571-2_23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou19c]
-
J. Goubault-Larrecq.
A Probabilistic and Non-Deterministic Call-by-Push-Value
Language.
In Proceedings of the 34th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'19), pages 1--13, Vancouver,
Canada, June 2019. IEEE Press.
doi:
10.1109/LICS.2019.8785809.
[ BibTex |
DOI ]
-
[AGJK19]
-
S. Akshay, P. Gastin, V. Jugé, and S. N. Krishna.
Timed systems through the lens of logic.
In Proceedings of the 34th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'19), pages 1--13, Vancouver,
Canada, June 2019. IEEE Press.
doi:
10.1109/LICS.2019.8785684.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BD19a]
-
B. Bednarczyk and S. Demri.
Why propositional quantification makes modal logics on trees
robustly hard ?
In Proceedings of the 34th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'19), pages 1--13, Vancouver,
Canada, June 2019. IEEE Press.
doi:
10.1109/LICS.2019.8785656.
[ BibTex |
DOI |
PDF ]
-
[CD19]
-
K. Chatterjee and L. Doyen.
Graph Planning with Expected Finite Horizon.
In Proceedings of the 34th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'19), pages 1--13, Vancouver,
Canada, June 2019. IEEE Press.
doi:
10.1109/LICS.2019.8785706.
[ BibTex |
DOI ]
-
[LS19b]
-
J. Leroux and S. Schmitz.
Reachability in Vector Addition Systems is Primitive-Recursive
in Fixed Dimension.
In Proceedings of the 34th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'19), pages 1--13, Vancouver,
Canada, June 2019. IEEE Press.
doi:
10.1109/LICS.2019.8785796.
[ BibTex |
DOI |
Web page ]
-
[JS19]
-
P. Jančar and S. Schmitz.
Bisimulation Equivalence of First-Order Grammars is
ACKERMANN-Complete.
In Proceedings of the 34th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'19), pages 1--12, Vancouver,
Canada, June 2019. IEEE Press.
doi:
10.1109/LICS.2019.8785848.
[ BibTex |
DOI |
Web page ]
-
[ZSGF19]
-
D. Zonetti, A. Saoud, A. Girard, and L. Fribourg.
A symbolic approach to voltage stability and power sharing in
time-varyingDC microgrids.
In Proceedings of the 18th European Control Conference
(ECC'19), pages 903--909, Naples, Italy, June 2019. IEEE Press.
doi:
10.23919/ECC.2019.8796095.
[ BibTex |
DOI |
Web page ]
-
[ACF+19]
-
É. André, E. Coquard, L. Fribourg, J. Jerray, and
D. Lesens.
Parametric Schedulability Analysis of a Launcher Flight Control
System Under Reactivity Constraints.
In Proceedings of the 19th International Conference on
Application of Concurrency to System Design (ACSD'19), pages
13--22, Aachen, Germany, June 2019. IEEE Computer Society Press.
doi:
10.1109/ACSD.2019.00006.
[ BibTex |
DOI |
Web page ]
-
[DH19a]
-
S. Donatelli and S. Haar, editors.
Proceedings of the 40th International Conference on Application
and Theory of Petri Nets and Concurrency (PETRI NETS'19), volume 11522 of
Lecture Notes in Computer Science, Aachen, Germany, June 2019. Springer.
doi:
10.1007/978-3-030-21571-2.
[ BibTex |
DOI |
Web page ]
-
[MFNS19]
-
J. Maier, M. Függer, T. Nowak, and U. Schmid.
Transistor-Level Analysis of Dynamic Delay Models.
In Proceedings of the 25th IEEE International Symposium on
Asynchronous Circuits and Systems (ASYNC'19), pages 76--85, Hirosaki,
Japan, May 2019. IEEE Computer Society.
doi:
10.1109/ASYNC.2019.00019.
[ BibTex |
DOI ]
-
[Bur19]
-
G. Bury.
Integrating rewriting, tableau and superposition into SMT.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, May 2019.
[ BibTex |
Web page |
PDF ]
-
[KS19]
-
P. Karandikar and Ph. Schnoebelen.
The height of piecewise-testable languages and the complexity of
the logic of subwords.
Logical Methods in Computer Science, 15(2):6:1--6:27, April 2019.
[ BibTex |
Web page |
PDF ]
-
[BBR19]
-
B. Bollig, P. Bouyer, and F. Reiter.
Identifiers in Registers - Describing Network Algorithms with
Logic.
In Proceedings of the 22nd International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'19), volume 11425 of Lecture Notes in Computer Science, pages
115--132, Prague, Czech Republic, April 2019. Springer.
doi:
10.1007/978-3-030-17127-8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CLS19]
-
S. Colin, R. Lepigre, and G. Scherer.
Unboxing Mutually Recursive Type Definitions.
In Actes des 30èmes Journées Francophones sur les
Langages Applicatifs (JFLA'19), Lamoura, France, January 2019.
To appear.
[ BibTex |
PDF ]
-
[AFMS19]
-
É. André, L. Fribourg, J.-M. Mota, and R. Soulat.
Verification of an industrial asynchronous leader election
algorithm using abstractions and parametric model checking.
In Proceedings of the 20th International Conference on
Verification, Model Checking and Abstract Interpretation
(VMCAI'19), Lecture Notes in Computer Science, pages 409--424,
Cascais/Lisbon, Portugal, January 2019. Springer.
[ BibTex |
PDF ]
-
[HKP19]
-
S. Haar, J. Kolcák, and L. Paulevé.
Combining Refinement of Parametric Models with Goal-Oriented
Reduction of Dynamics.
In Proceedings of the 20th International Conference on
Verification, Model Checking and Abstract Interpretation
(VMCAI'19), Lecture Notes in Computer Science, pages 555--576,
Cascais/Lisbon, Portugal, January 2019. Springer.
[ BibTex |
Web page |
PDF ]
-
[Gou19d]
-
J. Goubault-Larrecq.
A semantics for nabla.
Mathematical Structures in Computer Science, 29:1250--1274, 2019.
doi:
10.1017/S0960129518000063.
[ BibTex |
DOI |
Web page ]
-
[KŠHP19]
-
J. Kolcák, D. Šafránek, S. Haar, and
L. Paulevé.
Parameter Space Abstraction and Unfolding Semantics of Discrete
Regulatory Networks.
Theoretical Computer Science, 765:120--144, 2019.
doi:
10.1016/j.tcs.2018.03.009.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou19a]
-
J. Goubault-Larrecq.
Fooling the Parallel or Tester with Probability 8/27.
In The Art of Modelling Computational Systems: A Journey from Logic
and Concurrency to Security and Privacy---Essays Dedicated to Catuscia
Palamidessi on the Occasion of Her 60th Birthday, volume 11760 of Lecture
Notes in Computer Science, pages 313--328. Springer, 2019.
Updated version on arXiv:1903.12653.
[ BibTex |
Web page ]
-
[BQS19]
-
B. Bollig, K. Quaas, and A. Sangnier.
The Complexity of Flat Freeze LTL.
Logical Methods in Computer Science, 15(3):32:1--32:26, 2019.
doi:
10.23638/LMCS-15(3:32)2019.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DF19]
-
S. Demri and R. Fervari.
The power of modal separation logics.
Journal of Logic and Computation, 29(8):1139--1184, 2019.
[ BibTex |
PDF ]
-
[Gou19b]
-
J. Goubault-Larrecq.
Formal Ball Monads.
Topology and its Applications, 263:372--391, 2019.
doi:
10.1016/j.topol.2019.06.044.
[ BibTex |
DOI |
Web page ]
-
[HBD19]
-
L. Hirschi, D. Baelde, and S. Delaune.
A method for unbounded verification of privacy-type properties.
Journal of Computer Security, 27(3):277--342, 2019.
doi:
10.3233/JCS-171070.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MSP+19]
-
H. Mandon, C. Su, J. Pang, S. Paul, S. Haar, and
L. Paulevé.
Algorithms for the Sequential Reprogramming of Boolean
Networks.
IEEE/ACM Transaction on Computational Biology and Bioinformatics,
16(5):1610--1619, 2019.
[ BibTex |
Web page |
PDF ]
-
[HS19]
-
S. Halfon and Ph. Schnoebelen.
On shuffle products, acyclic automata and piecewise-testable
languages.
Information Processing Letters, 145:68--73, 2019.
doi:
10.1016/j.ipl.2019.01.012.
[ BibTex |
DOI ]
-
[LS19a]
-
R. Lazić and S. Schmitz.
The Ideal View on Rackoff's Coverability Technique.
Information and Computation, 2019.
To appear.
[ BibTex |
Web page ]
-
[DDR19]
-
A. Díaz-Caro, G. Dowek, and J. P. Rinaldi.
Two linearities for quantum computing in the lambda calculus.
Biosystems, 186, 2019.
doi:
10.1016/j.biosystems.2019.104012.
[ BibTex |
DOI |
Web page ]
-
[vdACCvD19]
-
W. M. P. van der Aalst, J. Carmona, T. Chatain, and B. F. van
Dongen.
A Tour in Process Mining: From Practice to Algorithmic
Challenges.
Transactions on Petri Nets and Other Models of Concurrency, 14:1--35,
2019.
doi:
10.1007/978-3-662-60651-3_1.
[ BibTex |
DOI |
Web page ]
-
[FNNS19]
-
M. Függer, R. Najvirt, T. Nowak, and U. Schmid.
A faithful binary circuit model.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and
Systems, 2019.
doi:
10.1109/TCAD.2019.2937748.
[ BibTex |
DOI |
Web page ]
-
[LPSS19]
-
J. Leroux, M. Praveen, G. Sutre, and
Ph. Schnoebelen.
On Functions Weakly Computable by Pushdown Petri Nets and
Related Systems.
Logical Methods in Computer Science, 15(4), 2019.
doi:
10.23638/LMCS-15(4:15)2019.
[ BibTex |
DOI |
PDF ]
-
[LPR18]
-
S. Le Roux, A. Pauly, and M. Randour.
Extending finite-memory determinacy to Boolean combinations of
winning conditions.
In Proceedings of the 38th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'18),
volume 122 of Leibniz International Proceedings in Informatics, pages
38:1--38:20, Ahmedabad, India, December 2018. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2018.38.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Man18]
-
A. Mansutti.
Extending propositional separation logic for robustness
properties.
In Proceedings of the 38th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'18),
volume 122 of Leibniz International Proceedings in Informatics, pages
42:1--42:23, Ahmedabad, India, December 2018. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2018.42.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHH18]
-
B. Bérard, S. Haar, and L. Hélouët.
Hyper Partial Order Logic.
In Proceedings of the 38th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'18),
volume 122 of Leibniz International Proceedings in Informatics, pages
20:1--20:21, Ahmedabad, India, December 2018. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2018.20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FLS18]
-
A. Finkel, J. Leroux, and G. Sutre.
Reachability for Two-Counter Machines with One Test and One
Reset.
In Proceedings of the 38th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'18),
volume 122 of Leibniz International Proceedings in Informatics, pages
31:1--31:14, Ahmedabad, India, December 2018. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2018.31.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLS18b]
-
D. Baelde, A. Lick, and S. Schmitz.
A Hypersequent Calculus with Clusters for Tense Logic over
Ordinals.
In Proceedings of the 38th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'18),
volume 122 of Leibniz International Proceedings in Informatics, pages
15:1--15:19, Ahmedabad, India, December 2018. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2018.15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dal18]
-
A. Dallon.
Verification of indistinguishability properties in
cryptographic protocols -- Small attacks and efficient decision with
SAT-Equiv.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, November 2018.
[ BibTex |
Web page |
PDF ]
-
[Dup18]
-
Y. Duplouy.
Applying Formal Methods to Autonomous Vehicle Control.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, November 2018.
[ BibTex |
Web page ]
-
[BJM18]
-
P. Bouyer, S. Jaziri, and N. Markey.
Efficient Timed Diagnosis Using Automata with Timed Domains.
In Proceedings of the 18th Workshop on Runtime Verification
(RV'18), volume 11237 of Lecture Notes in Computer Science, pages 205--221,
Limassol, Cyprus, November 2018. Springer.
doi:
10.1007/978-3-030-03769-7_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dem18a]
-
S. Demri.
On temporal and separation logics.
In Proceedings of the 25th International Symposium on
Temporal Representation and Reasoning (TIME'18), Leibniz
International Proceedings in Informatics, pages 1:1--1:4, Warsaw, Poland,
October 2018. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page ]
-
[CHK+18]
-
Th. Chatain, S. Haar, J. Kolcák, A. Thakkar, and
L. Paulevé.
Concurrency in Boolean networks.
Research Report hal-01893106, HAL, October 2018.
33 pages.
[ BibTex |
Web page |
PDF ]
-
[BFG+18a]
-
G. Barthe, X. Fan, J. Gancher, B. Grégoire, C. Jacomme,
and E. Shi.
Symbolic Proofs for Lattice-Based Cryptography.
In Proceedings of the 25th ACM Conference on Computer and
Communications Security (CCS'18), pages 538--555, Toronto, Canada,
October 2018. ACM Press.
[ BibTex |
Web page |
PDF ]
-
[FN18]
-
M. Függer and Th. Nowak.
Fast Multidimensional Asymptotic and Approximate Consensus.
In Proceedings of the 32nd International Symposium on
Distributed Computing (DISC'18), volume 121 of Leibniz International
Proceedings in Informatics, pages 27:1--27:15, New Orleans, USA, October
2018. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page ]
-
[BLS18c]
-
B. Bollig, M. Lehaut, and N. Sznajder.
Round-Bounded Control of Parameterized Systems.
In Proceedings of the 16th International Symposium on
Automated Technology for Verification and Analysis (ATVA'18),
volume 11138 of Lecture Notes in Computer Science, pages 370--386, Los
Angeles, California, USA, October 2018. Springer.
doi:
10.1007/978-3-030-01090-4_22.
[ BibTex |
DOI |
Web page ]
-
[BBBC18]
-
N. Bertrand, P. Bouyer, T. Brihaye, and P. Carlier.
When are Stochastic Transition Systems Tameable?
Journal of Logic and Algebraic Methods in Programming, 99:41--96,
October 2018.
doi:
10.1016/j.jlamp.2018.03.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGMR18]
-
P. Bouyer, M. González, N. Markey, and M. Randour.
Multi-weighted Markov Decision Processes with Reachability
Objectives.
In Proceedings of the 9th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'18), volume 277
of Electronic Proceedings in Theoretical Computer Science, pages 250--264,
Saarbrücken, Germany, September 2018.
doi:
10.4204/EPTCS.277.18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDH18]
-
D. Baelde, S. Delaune, and L. Hirschi.
POR for Security Protocol Equivalences - Beyond
Action-Determinism.
In Proceedings of the 23rd European Symposium on Research in
Computer Security (ESORICS'18), volume 11098 of Lecture Notes in
Computer Science, pages 385--405, Barcelona, Spain, September 2018. Springer.
doi:
10.1007/978-3-319-99073-6_19.
[ BibTex |
DOI |
Web page ]
-
[CDD18]
-
V. Cortier, A. Dallon, and S. Delaune.
Efficiently Deciding Equivalence for Standard Primitives and
Phases.
In Proceedings of the 23rd European Symposium on Research in
Computer Security (ESORICS'18), volume 11098 of Lecture Notes in
Computer Science, pages 491--511, Barcelona, Spain, September 2018. Springer.
doi:
10.1007/978-3-319-99073-6_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Hil18]
-
M. Hilaire.
Complexity of the reachability problem for parametric timed
automata.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2018.
[ BibTex |
PDF ]
-
[Lef18]
-
E. Lefaucheux.
Controlling Information in Probabilistic Systems.
Thèse de doctorat, Université Rennes 1, Rennes, France,
September 2018.
[ BibTex |
Web page |
PDF ]
-
[Gro18]
-
N. Grosshans.
The limits of Nečiporuk's method and the power of programs
over monoids taken from small varieties of finite monoids.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, September 2018.
[ BibTex |
Web page |
PDF ]
-
[BBJ18]
-
B. Bérard, P. Bouyer, and V. Jugé.
Finite bisimulations for dynamical systems with overlapping
trajectories.
In Proceedings of the 27th Annual EACSL Conference on
Computer Science Logic (CSL'18), Leibniz International Proceedings in
Informatics, Birmingham, UK, September 2018. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.CSL.2018.26.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GMS18]
-
P. Gastin, S. Mukherjee, and B. Srivathsan.
Reachability in timed automata with diagonal constraints.
In Proceedings of the 29th International Conference on
Concurrency Theory (CONCUR'18), volume 118 of Leibniz International
Proceedings in Informatics, pages 28:1--28:17, Beijing, China, September
2018. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2018.28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFG18c]
-
B. Bollig, M. Fortin, and P. Gastin.
It Is Easy to Be Wise After the Event: Communicating
Finite-State Machines Capture First-Order Logic with ”Happened Before”.
In Proceedings of the 29th International Conference on
Concurrency Theory (CONCUR'18), volume 118 of Leibniz International
Proceedings in Informatics, pages 7:1--7:17, Beijing, China, September 2018.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2018.7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GL18]
-
J. Goubault-Larrecq and J.-P. Lachance.
On the Complexity of Monitoring Orchids Signatures, and
Recurrence Equations.
Formal Methods in System Design, 53(1):6--32, August 2018.
Special issue of RV'16.
doi:
10.1007/s10703-017-0303-x.
[ BibTex |
DOI |
Web page ]
-
[Bur18a]
-
G. Burel.
Linking Focusing and Resolution with Selection.
In Proceedings of the 42nd International Symposium on
Mathematical Foundations of Computer Science (MFCS'18), volume 117
of Leibniz International Proceedings in Informatics, pages 9:1--9:14,
Liverpool, UK, August 2018. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2018.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CHP18b]
-
Th. Chatain, S. Haar, and L. Paulevé.
Most Permissive Semantics of Boolean Networks.
Research Report 1808.10240, Computing Research Repository, August
2018.
15 pages.
[ BibTex |
Web page |
PDF ]
-
[BLS18a]
-
D. Baelde, A. Lick, and S. Schmitz.
A Hypersequent Calculus with Clusters for Linear Frames.
In Proceedings of the 10th Conference on Advances in Modal
Logics (AiML'18), pages 36--55, Bern, Switzerland, August 2018. College
Publications.
[ BibTex |
Web page ]
-
[DF18]
-
S. Demri and R. Fervari.
On the complexity of modal separation logics.
In Proceedings of the 10th Conference on Advances in Modal
Logics (AiML'18), pages 179--198, Bern, Switzerland, August 2018. College
Publications.
[ BibTex |
Web page |
PDF ]
-
[FFL18]
-
S. Friedrichs, M. Függer, and C. Lenzen.
Metastability-Containing Circuits.
IEEE Transactions on Computers, 67(8):1167--1183, August 2018.
doi:
10.1109/TC.2018.2808185.
[ BibTex |
DOI |
Web page ]
-
[BMR+18]
-
P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and
S. Laursen.
Average-energy games.
Acta Informatica, 55(2):91--127, July 2018.
doi:
10.1007/s00236-016-0274-1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HM18]
-
S. Haddad and B. Monmege.
Interval iteration algorithm for MDPs and IMDPs.
Theoretical Computer Science, 735:111--131, July 2018.
doi:
10.1016/j.tcs.2016.12.003.
[ BibTex |
DOI |
Web page ]
-
[BG18]
-
F. Blanqui and G. Genestier.
Termination of λΠ modulo rewriting using the
size-change principle.
In Proceedings of the 16th International Workshop on
Termination (WST'18), pages 10--14, Oxford, UK, July 2018.
[ BibTex |
PDF ]
-
[Thi18]
-
F. Thiré.
Sharing a Library between Proof Assistants: Reaching
out to the HOL Family *.
In Proceedings of the 13th International Workshop on Logical
Frameworks and Meta-Languages: Theory and Practice (LFMTP'18),
pages 57--71, Oxford, UK, July 2018. ACM Press.
doi:
10.4204/EPTCS.274.4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LR18a]
-
R. Lepigre and C. Raffalli.
Abstract Representation of Binders in OCaml using the Bindlib
Library.
In Proceedings of the 13th International Workshop on Logical
Frameworks and Meta-Languages: Theory and Practice (LFMTP'18),
pages 42--56, Oxford, UK, July 2018. ACM Press.
doi:
10.4204/EPTCS.274.4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FNS18]
-
M. Függer, Th. Nowak, and M. Schwarz.
Tight Bounds for Asymptotic and Approximate Consensus.
In Proceedings of the ACM Symposium on Principles of Distributed
Computing (PODC'18), pages 325--334, Egham, UK, July 2018. ACM Press.
doi:
10.1145/3212734.3212762.
[ BibTex |
DOI |
Web page ]
-
[BBF+18a]
-
G. Bacci, P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey,
and P.-A. Reynier.
Optimal and Robust Controller Synthesis Using Energy Timed
Automata with Uncertainty.
In Proceedings of the 22nd International Symposium on Formal
Methods (FM'18), Lecture Notes in Computer Science, pages 203--221,
Oxford, UK, July 2018. Springer.
Best paper award.
doi:
10.1007/978-3-319-95582-7_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JK18]
-
C. Jacomme and S. Kremer.
An extensive formal analysis of multi-factor authentication
protocols.
In Proceedings of the 31st IEEE Computer Security
Foundations Symposium (CSF'18), pages 1--15, Oxford, UK, July 2018.
IEEE Computer Society Press.
doi:
10.1109/CSF.2018.00008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DGK18]
-
V. Dave, P. Gastin, and S. N. Krishna.
Regular Transducer Expressions for Regular Transformations.
In Proceedings of the 33rd Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'18), pages 315--324, Oxford, UK,
July 2018. ACM Press.
doi:
10.1145/3209108.3209182.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LFV18]
-
A. Le Coënt, L. Fribourg, and J. Vacher.
Control Synthesis for Stochastic Switched Systems using the
Tamed Euler Method.
In Proceedings of the 6th IFAC Conference on Analysis and
Design of Hybrid Systems (ADHS'18), volume 51 of IFAC-PapersOnLine,
pages 259--264, Oxford, UK, July 2018. Elsevier Science Publishers.
doi:
10.1016/j.ifacol.2018.08.044.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FHLM18]
-
É. Fabre, L. Hélouët, E. Lefaucheux, and
H. Marchand.
Diagnosability of Repairable Faults.
Discrete Event Dynamic Systems: Theory and Applications,
28(2):183--213, June 2018.
doi:
10.1007/s10626-017-0255-8.
[ BibTex |
DOI |
PDF ]
-
[Hal18]
-
S. Halfon.
On Effective Representations of Well Quasi-Orderings.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, June 2018.
[ BibTex |
Web page |
PDF ]
-
[CGR18]
-
O. Carton, B. Guillon, and F. Reiter.
Counter Machines and Distributed Automata.
In Proceedings of the 24th Annual International Workshop on
Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875
of Lecture Notes in Computer Science, pages 13--28, Ghent, Belgium, June
2018. Springer.
doi:
10.1007/978-3-319-92675-9_2.
[ BibTex |
DOI |
PDF ]
-
[CHP18a]
-
Th. Chatain, S. Haar, and L. Paulevé.
Boolean Networks: Beyond Generalized Asynchronicity.
In Proceedings of the 24th Annual International Workshop on
Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875
of Lecture Notes in Computer Science, pages 29--42, Ghent, Belgium, June
2018. Springer.
doi:
10.1007/978-3-319-92675-9_3.
[ BibTex |
DOI |
Web page ]
-
[LGS18]
-
E. Lefaucheux, A. Giua, and C. Seatzu.
Basis Coverability Graph for Partially Observable Petri Nets
with Application to Diagnosability Analysis.
In Proceedings of the 39th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877
of Lecture Notes in Computer Science, pages 164--183, Bratislava, Slovakia,
June 2018. Springer.
[ BibTex |
PDF ]
-
[BBDH18]
-
B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad.
Integrating Simulink Models into the Model Checker Cosmos.
In Proceedings of the 39th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877
of Lecture Notes in Computer Science, pages 363--373, Bratislava, Slovakia,
June 2018. Springer.
doi:
10.1007/978-3-319-91268-4_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SGF18b]
-
A. Saoud, A. Girard, and L. Fribourg.
On the Composition of Discrete and Continuous-time
Assume-Guarantee Contracts for Invariance.
In Proceedings of the European Control Conference (ECC'18), pages
435--440, Limassol, Cyprus, June 2018. IEEE Press.
doi:
10.23919/ECC.2018.8550622.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGK18]
-
S. Akshay, P. Gastin, and S. N. Krishna.
Analyzing Timed Systems Using Tree Automata.
Logical Methods in Computer Science, 14(2):1--35, May 2018.
doi:
10.23638/LMCS-14(2:8)2018.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FKLW18]
-
M. Függer, A. Kinali, C. Lenzen, and B. Wiederhake.
Fast All-Digital Clock Frequency Adaptation Circuit for Voltage
Droop Tolerance.
In Proceedings of the 24th IEEE International Symposium on
Asynchronous Circuits and Systems (ASYNC'18), pages 68--77, Vienna,
Austria, May 2018. IEEE Computer Society.
doi:
10.1109/ASYNC.2018.00025.
[ BibTex |
DOI |
Web page ]
-
[JMS18]
-
L. Jezequel, A. Madalinski, and S. Schwoon.
Distributed computation of vector clocks in Petri nets
unfolding for test selection.
In Proceedings of the 14th Workshop on Discrete Event
Systems (WODES'18), volume 51(7) of IFAC-PapersOnLine, pages 106--111,
Sorrento Coast, Italy, May-June 2018. Elsevier Science Publishers.
[ BibTex |
PDF ]
-
[ABG18]
-
C. Aiswarya, B. Bollig, and P. Gastin.
An Automata-Theoretic Approach to the Verification of
Distributed Algorithms.
Information and Computation, 259:305--327, April 2018.
doi:
10.1016/j.ic.2017.05.006.
[ BibTex |
DOI |
PDF ]
-
[Gil18]
-
F. Gilbert.
Extending higher-order logic with predicate subtyping.
Thèse de doctorat, Université Paris 7, Paris, France, April
2018.
[ BibTex |
PDF ]
-
[Bur18b]
-
G. Burel.
Linking Focusing and Resolution with Selection.
Research Report hal-01670476, HAL Research Report, April 2018.
[ BibTex |
Web page |
PDF ]
-
[SGF18a]
-
A. Saoud, A. Girard, and L. Fribourg.
Contract based Design of Symbolic Controllers for Vehicle
Platooning.
In Proceedings of the 21st ACM International Conference on
Hybrid Systems: Computation and Control (HSCC'18), pages 277--278,
Porto, Portugal, April 2018. ACM Press.
Poster.
doi:
10.1145/3178126.3187001.
[ BibTex |
DOI |
PDF ]
-
[Bla18]
-
F. Blanqui.
Size-based termination of higher-order rewriting.
Journal of Functional Programming, 28, April 2018.
doi:
10.1017/S0956796818000072.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JKS18]
-
C. Jacomme, S. Kremer, and G. Scerri.
Symbolic Models for Isolated Execution Environments.
In Proceedings of the 2nd IEEE European Symposium on Security and
Privacy (EuroS&P'17), pages 530--545, Paris, France, April 2018. IEEE
Press.
doi:
10.1109/EuroSP.2017.16.
[ BibTex |
DOI |
Web page ]
-
[Had18]
-
S. Haddad.
Memoryless determinacy of finite parity games: Another simple
proof.
Information Processing Letters, 132:19--21, April 2018.
doi:
10.1016/j.ipl.2017.11.012.
[ BibTex |
DOI |
PDF ]
-
[CCD+18]
-
Th. Chatain, M. Comlan, D. Delfieu, L. Jezequel, and
O. H. Roux.
Pomsets and Unfolding of Reset Petri Nets.
In Proceedings of the 12th International Conference on
Language and Automata Theory and Applications (LATA'18), volume
10792 of Lecture Notes in Computer Science, pages 258--270, Bar-Ilan, Israel,
April 2018. Springer.
doi:
10.1007/978-3-319-77313-1_20.
[ BibTex |
DOI |
Web page ]
-
[DLM18]
-
S. Demri, É. Lozes, and A. Mansutti.
The Effects of Adding Reachability Predicates in Propositional
Separation Logic.
In Proceedings of the 21st International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages
476--493, Thessaloniki, Greece, April 2018. Springer.
[ BibTex |
PDF ]
-
[Bou18]
-
P. Bouyer.
Games on graphs with a public signal monitoring.
In Proceedings of the 21st International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages
530--547, Thessaloniki, Greece, April 2018. Springer.
doi:
10.1007/978-3-319-89366-2_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FMN+18]
-
M. Függer, J. Maier, R. Najvirt, Th. Nowak, and
U. Schmid.
A Faithful Binary Circuit Model with Adversarial Noise.
In Proceedings of the Conference on Design, Automation and
Test in Europe (DATE'18), pages 1327--1332, Dresden, Germany, March 2018.
IEEE Computer Society Press.
doi:
10.23919/DATE.2018.8342219.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBF+18b]
-
B. Barbot, M. Beccuti, G. Franceschinis, S. Haddad, and
C. Picaronny.
Bounds Computation for Symmetric Nets.
Research Report hal-01726011, HAL-Inria, March 2018.
[ BibTex |
Web page |
PDF ]
-
[GBM18]
-
P. Gardy, P. Bouyer, and N. Markey.
Dependences in Strategy Logic.
In Proceedings of the 35th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'18), volume 96 of Leibniz
International Proceedings in Informatics, pages 34:1--34:15, Caen, France,
February 2018. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2018.34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFG18b]
-
B. Bollig, M. Fortin, and P. Gastin.
Communicating Finite-State Machines and Two-Variable Logic.
In Proceedings of the 35th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'18), volume 96 of Leibniz
International Proceedings in Informatics, pages 17:1--17:14, Caen, France,
February 2018. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2018.17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GKLZ18]
-
M. Ganardi, D. König, M. Lohrey, and G. Zetzsche.
Knapsack problems for wreath products.
In Proceedings of the 35th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'18), volume 96 of Leibniz
International Proceedings in Informatics, pages 32:1--32:13, Caen, France,
February 2018. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2018.32.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bv18]
-
D. Berwanger and M. van den Bogaard.
Consensus Game Acceptors and Iterated Transductions.
International Journal of Foundations of Computer Science,
29(02):165--185, February 2018.
doi:
10.1142/S0129054118400026.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GM18]
-
P. Gastin and B. Monmege.
A unifying survey on weighted logics and weighted automata.
Soft Computing, 22(4):1047--1065, February 2018.
doi:
10.1007/s00500-015-1952-6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFL+18]
-
P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey,
J. Ouaknine, and J. Worrell.
Model Checking Real-Time Systems.
In Handbook of Model Checking, pages 1001--1046. Springer, 2018.
doi:
10.1007/978-3-319-10575-8_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFM18]
-
M. Blondin, A. Finkel, and P. McKenzie.
Handling Infinitely Branching Well-structured Transition
Systems.
Information and Computation, 258:28--49, 2018.
doi:
10.1016/j.ic.2017.11.001.
[ BibTex |
DOI ]
-
[BGH18]
-
B. Bollig, M.-L. Grindei, and P. Habermehl.
Realizability of Concurrent Recursive Programs.
Formal Methods in System Design, 53(3):339--362, 2018.
doi:
10.1007/s10703-017-0282-y.
[ BibTex |
DOI ]
-
[LR18b]
-
R. Lepigre and C. Raffalli.
Practical Subtyping for Curry-Style Languages.
ACM Transactions on Programming Languages and Systems,
41(1):5:1--5:58, 2018.
doi:
10.1145/3285955.
[ BibTex |
DOI |
PDF ]
-
[Lep18]
-
R. Lepigre.
PML_2: Integrated Program Verification in ML.
In Proceedings of the 23rd International Conference on Types
for Proofs and Programs (TYPES'17, volume 104 of Leibniz International
Proceedings in Informatics, pages 4:1--4:27, Budapest, Hungary, 2018.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.TYPES.2017.4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dem18b]
-
S. Demri.
Reasoning about reversal-bounded counter machines.
In Ewa Orlowska on Relational Methods in Logic and Computer Science,
volume 17 of Outstanding Contributions to Logic, pages 441--479. Springer,
2018.
[ BibTex |
Web page |
PDF ]
-
[BLMP18]
-
V. Brattka, S. Le Roux, J. S. Miller, and A. Pauly.
Connected Choice and Brouwer's Fixed Point Theorem.
Journal of Mathematical Logic, 2018.
To appear.
[ BibTex ]
-
[CYFFMF18]
-
R. Chane-Yack-Fa, M. Frappier, A. Mammar, and A. Finkel.
Parameterized Verification of Monotone Information Systems.
Formal Aspects of Computing, 30(3-4):463--489, 2018.
doi:
10.1007/s00165-018-0460-8.
[ BibTex |
DOI |
Web page ]
-
[Zet18]
-
G. Zetzsche.
The Emptiness Problem for Valence Automata over Graph Monoids.
Information and Computation, 2018.
To appear.
[ BibTex ]
-
[LZ18]
-
M. Lohrey and G. Zetzsche.
Knapsack in Graph Groups.
Theory of Computing Systems, 62(1):192--246, January 2018.
doi:
10.1007/s00224-017-9808-3.
[ BibTex |
DOI ]
-
[BHSS18]
-
B. Bérard, S. Haar, S. Schmitz, and S. Schwoon.
The Complexity of Diagnosability and Opacity Verification for
Petri Nets.
Fundamenta Informaticae, 161(4):317--349, 2018.
doi:
10.3233/FI-2018-1706.
[ BibTex |
DOI |
Web page ]
-
[LFM+18]
-
A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and
L. Chamoin.
Compositional synthesis of state-dependent switching control.
Theoretical Computer Science, 750:53--68, 2018.
doi:
10.1016/j.tcs.2018.01.021.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LACF18]
-
A. Le Coënt, J. Alexandre dit Sandretto,
A. Chapoutot, and L. Fribourg.
An improved algorithm for the control synthesis of nonlinear
sampled switched systems.
Formal Methods in System Design, 53(3):363--383, 2018.
doi:
10.1007/s10703-017-0305-8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABDL18]
-
N. Alechina, N. Bulling, S. Demri, and B. Logan.
On the Complexity of Resource-Bounded Logics.
Theoretical Computer Science, 750:69--100, 2018.
doi:
10.1016/j.tcs.2018.01.019.
[ BibTex |
DOI |
PDF ]
-
[HGLJX18]
-
W. K. Ho, J. Goubault-Larrecq, A. Jung, and X. Xi.
The Ho-Zhao Problem.
Logical Methods in Computer Science, 14(1):1--19, January 2018.
doi:
10.23638/LMCS-14(1:7)2018.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CMvR+17]
-
W. Czerwiński, W. Martens, L. van Rooijen, M. Zeitoun,
and G. Zetzsche.
A Characterization for Decidable Separability by Piecewise
Testable Languages.
Discrete Mathematics & Theoretical Computer Science, 19(4), December
2017.
doi:
10.23638/DMTCS-19-4-1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HKZ17]
-
M. Huschenbett, D. Kuske, and G. Zetzsche.
The Monoid of Queue Actions.
Semigroup Forum, 95(3):475--508, December 2017.
doi:
10.1007/s00233-016-9835-4.
[ BibTex |
DOI ]
-
[BHL17a]
-
B. Bérard, S. Haddad, and E. Lefaucheux.
Probabilistic Disclosure: Maximisation vs. Minimisation.
In Proceedings of the 37th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'17),
volume 93 of Leibniz International Proceedings in Informatics, pages
13:1--13:14, Kanpur, India, December 2017. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2017.13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFG17]
-
M. Blondin, A. Finkel, and J. Goubault-Larrecq.
Forward Analysis for WSTS, Part III: Karp-Miller Trees.
In Proceedings of the 37th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'17),
volume 93 of Leibniz International Proceedings in Informatics, pages
16:1--16:15, Kanpur, India, December 2017. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2017.16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLL17]
-
S. Demri, É. Lozes, and D. Lugiez.
On Symbolic Heaps Modulo Permission Theories.
In Proceedings of the 37th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'17),
volume 93 of Leibniz International Proceedings in Informatics, pages
25:1--25:14, Kanpur, India, December 2017. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2017.25.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CHKP17]
-
K. Chatzikokolakis, S. Haddad, A. Kassem, and
C. Palamidessi.
Trading Optimality for Performance in Location Privacy.
In Proceedings of the 11th International Conference on
Performance Evaluation Methodologies and Tools (VALUETOOLS'17),
pages 221--222, Venice, Italy, December 2017.
doi:
10.1145/3150928.3150962.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Thi17]
-
F. Thiré.
Exporting an Arithmetic Library from Dedukti to HOL.
Research Report hal-01668250, HAL Research Report, December 2017.
[ BibTex |
Web page |
PDF ]
-
[Car17]
-
P. Carlier.
Verification of Stochastic Timed Automata.
Thèse de doctorat, Ecole Normale Supérieure de Cachan (ENS
Paris-Saclay) and Université de Mons, December 2017.
[ BibTex |
Web page |
PDF ]
-
[FS17]
-
D. Figueira and L. Segoufin.
Bottom-up automata on data trees and vertical XPath.
Logical Methods in Computer Science, 13(4:5), November 2017.
doi:
10.23638/LMCS-13(4:5)2017.
[ BibTex |
DOI ]
-
[Sch17a]
-
S. Schmitz.
Algorithmic Complexity of Well-Quasi-Orders.
Mémoire d'habilitation, École Normale Supérieure
Paris-Saclay, France, November 2017.
[ BibTex |
Web page ]
-
[GN17]
-
J. Goubault-Larrecq and K. M. Ng.
A Few Notes on Formal Balls.
Logical Methods in Computer Science, 13(4):1--34, November 2017.
Special Issue of the Domains XII Workshop.
doi:
10.23638/LMCS-13(4:18)2017.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCvD17]
-
Th. Chatain, J. Carmona, and B. van Dongen.
Alignment-Based Trace Clustering.
In Proceedings of the 36th International Conference on
Conceptual Modeling (ER'17), volume 10650 of Lecture Notes in Computer
Science, pages 295--308, Valencia, Spain, November 2017. Springer.
To appear.
doi:
10.1007/978-3-319-69904-2_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHL17b]
-
N. Bertrand, S. Haddad, and E. Lefaucheux.
Diagnostic et contrôle de la dégradation des
systèmes probabilistes.
In Actes du 11ème Colloque sur la Modélisation des
Systèmes Réactifs (MSR'17), Marseille, France, November 2017.
HAL.
[ BibTex |
PDF ]
-
[DGG17]
-
J. Dubut, É. Goubault, and J. Goubault-Larrecq.
Directed homology theories and Eilenberg-Steenrod axioms.
Applied Categorical Structures, 25(5):775--807, October 2017.
doi:
doi:10.1007/s10485-016-9438-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDD17b]
-
V. Cortier, A. Dallon, and S. Delaune.
A typing result for trace inclusion (for pair and symmetric
encryption only).
Research Report hal-01615265, HAL, October 2017.
[ BibTex |
Web page |
PDF ]
-
[FNS17]
-
M. Függer, Th. Nowak, and M. Schwarz.
Brief Announcement: Lower Bounds for Asymptotic Consensus in
Dynamic Networks.
In Proceedings of the 31st International Symposium on
Distributed Computing (DISC'17), volume 91 of Leibniz International
Proceedings in Informatics, pages 51:1--51:3, Vienna, Austria, October 2017.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.DISC.2017.51.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou17a]
-
J. Goubault-Larrecq.
Isomorphism theorems between models of mixed choice.
Mathematical Structures in Computer Science, 27(6):1032--1067,
September 2017.
doi:
10.1017/S0960129515000547.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gil17b]
-
F. Gilbert.
Proof Certificates in PVS.
In Proceedings of the 8th International Conference on
Interactive Theorem Proving (ITP'17), volume 10499 of Lecture Notes
in Computer Science, pages 262--268, Brasília, Brazil, September 2017.
Springer.
doi:
10.1007/978-3-319-66107-0_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bur17]
-
G. Bury.
mSAT: An OCaml SAT Solver.
In OCaml Users and Developers Workshop, Oxford, UK, September 2017.
Poster.
[ BibTex |
Web page |
PDF ]
-
[BFM17]
-
M. Blondin, A. Finkel, and P. McKenzie.
Well Behaved Transition Systems.
Logical Methods in Computer Science, 13(3):1--19, September 2017.
doi:
10.23638/LMCS-13(3:24)2017.
[ BibTex |
DOI |
Web page ]
-
[MHP17]
-
H. Mandon, S. Haar, and L. Paulevé.
Temporal Reprogramming of Boolean Networks.
In Proceedings of the 15th Conference on Computational
Methods in System Biology (CMSB'17), volume 10545 of Lecture Notes in
Bioinformatics, pages 179--195, Darmstadt, Germany, September 2017.
Springer-Verlag.
doi:
10.1007/978-3-319-67471-1_11.
[ BibTex |
DOI |
PDF ]
-
[Doy17]
-
L. Doyen.
The Multiple Dimensions of Mean-Payoff Games.
In Proceedings of the 11th Workshop on Reachability Problems
in Computational Models (RP'17), volume 10506 of Lecture Notes in
Computer Science, pages 1--8, London, UK, September 2017. Springer.
doi:
10.1007/978-3-319-67089-8_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fri17]
-
L. Fribourg.
Euler's Method Applied to the Control of Switched Systems.
In Proceedings of the 15th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419
of Lecture Notes in Computer Science, pages 3--21, Berlin, Germany, September
2017. Springer.
doi:
10.1007/978-3-319-65765-3_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLL17]
-
F. Bruse, M. Lange, and É. Lozes.
Space-Efficient Fragments of Higher-Order Fixpoint Logic.
In Proceedings of the 11th Workshop on Reachability Problems
in Computational Models (RP'17), volume 10506 of Lecture Notes in
Computer Science, pages 26--41, London, UK, September 2017. Springer.
doi:
10.1007/978-3-319-67089-8_3.
[ BibTex |
DOI |
Web page ]
-
[LAC+17]
-
A. Le Coënt, J. Alexandre dit Sandretto,
A. Chapoutot, L. Fribourg, F. De Vuyst, and L. Chamoin.
Distributed Control Synthesis Using Euler's Method.
In Proceedings of the 11th Workshop on Reachability Problems
in Computational Models (RP'17), volume 10506 of Lecture Notes in
Computer Science, pages 118--131, London, UK, September 2017. Springer.
doi:
10.1007/978-3-319-67089-8_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dub17]
-
J. Dubut.
Directed homotopic and homologic theories for geometric models
of true concurrency.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2017.
[ BibTex |
Web page |
PDF ]
-
[GBB+17]
-
M. González, O. Beaude, P. Bouyer, S. Lasaulce, and
N. Markey.
Stratégies d'ordonnancement de consommation d'énergie en
présence d'information imparfaite de prévision.
In Actes du XXVIème colloque GRETSI, Juan-les-Pins,
France, September 2017.
[ BibTex |
Web page |
PDF ]
-
[CP17]
-
Th. Chatain and L. Paulevé.
Goal-Driven Unfolding of Petri Nets.
In Proceedings of the 28th International Conference on
Concurrency Theory (CONCUR'17), volume 85 of Leibniz International
Proceedings in Informatics, pages 18:1--18:16, Berlin, Germany, September
2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2017.18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHJ17]
-
P. Bouyer, S. Haddad, and V. Jugé.
Unbounded product-form Petri nets.
In Proceedings of the 28th International Conference on
Concurrency Theory (CONCUR'17), volume 85 of Leibniz International
Proceedings in Informatics, pages 31:1--31:16, Berlin, Germany, September
2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2017.31.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGKS17]
-
S. Akshay, P. Gastin, S. N. Krishna, and I. Sarkar.
Towards an Efficient Tree Automata based technique for Timed
Systems.
In Proceedings of the 28th International Conference on
Concurrency Theory (CONCUR'17), volume 85 of Leibniz International
Proceedings in Informatics, pages 39:1--39:15, Berlin, Germany, September
2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2017.39.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BQS17]
-
B. Bollig, K. Quaas, and A. Sangnier.
The Complexity of Flat Freeze LTL.
In Proceedings of the 28th International Conference on
Concurrency Theory (CONCUR'17), volume 85 of Leibniz International
Proceedings in Informatics, pages 33:1--33:16, Berlin, Germany, September
2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2017.33.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BJM17]
-
P. Bouyer, S. Jaziri, and N. Markey.
On the Determinization of Timed Systems.
In Proceedings of the 15th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419
of Lecture Notes in Computer Science, pages 25--41, Berlin, Germany,
September 2017. Springer.
doi:
10.1007/978-3-319-65765-3_2.
[ BibTex |
DOI |
Web page ]
-
[Sub17]
-
C. L. Subramaniam.
Cubical Type Theory in Dedukti.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2017.
[ BibTex ]
-
[Gen17]
-
G. Genestier.
Termination checking in the λΠ-calculus modulo
theory.
Rapport de Master, Université Paris 7, Paris, France, September
2017.
[ BibTex |
Web page |
PDF ]
-
[Def17]
-
A. Defourné.
Proof Tactics in Dedukti.
Rapport de Master, Inria Saclay, September 2017.
[ BibTex |
Web page |
PDF ]
-
[Dow17a]
-
G. Dowek.
Analyzing Individual Proofs as the Basis of Interoperability
between Proof Systems.
In Proceedings of the 5th Workshop on Proof eXchange for Theorem
Proving (PxTP'17), volume 262 of Electronic Proceedings in Theoretical
Computer Science, pages 3--12, Brasília, Brazil, September 2017.
doi:
10.4204/EPTCS.262.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Rie17]
-
M. Riesner.
Regularity of deterministic pushdown automata.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, August 2017.
[ BibTex ]
-
[Sch17b]
-
Ph. Schnoebelen.
Ideal-Based Algorithms for the Symbolic Verification of
Well-Structured Systems (Invited Talk).
In Proceedings of the 42nd International Symposium on
Mathematical Foundations of Computer Science (MFCS'17), volume 83
of Leibniz International Proceedings in Informatics, pages 85:1--85:4,
Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2017.85.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDH17]
-
K. Chatterjee, L. Doyen, and Th. A. Henzinger.
The Cost of Exactness in Quantitative Reachability.
In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim
Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of
Lecture Notes in Computer Science, pages 367--381. Springer, August 2017.
doi:
10.1007/978-3-319-63121-9_18.
[ BibTex |
DOI |
PDF ]
-
[BDGK17]
-
D. Baelde, S. Delaune, I. Gazeau, and S. Kremer.
Symbolic Verification of Privacy-Type Properties for Security
Protocols with XOR.
In Proceedings of the 30th IEEE Computer Security
Foundations Symposium (CSF'17), pages 234--248, Santa Barbara,
California, USA, August 2017. IEEE Computer Society Press.
doi:
10.1109/CSF.2017.22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDD17a]
-
V. Cortier, A. Dallon, and S. Delaune.
SAT-Equiv: An Efficient Tool for Equivalence Properties.
In Proceedings of the 30th IEEE Computer Security
Foundations Symposium (CSF'17), pages 481--494, Santa Barbara,
California, USA, August 2017. IEEE Computer Society Press.
doi:
10.1109/CSF.2017.15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GMS17]
-
N. Grosshans, P. McKenzie, and L. Segoufin.
The power of programs over monoids in DA.
In Proceedings of the 42nd International Symposium on
Mathematical Foundations of Computer Science (MFCS'17), volume 83
of Leibniz International Proceedings in Informatics, pages 2:1--2:20,
Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2017.2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CK17]
-
H. Comon and A. Koutsos.
Formal Computational Unlinkability Proofs of RFID Protocols.
In Proceedings of the 30th IEEE Computer Security
Foundations Symposium (CSF'17), pages 100--114, Santa Barbara,
California, USA, August 2017. IEEE Computer Society Press.
doi:
10.1109/CSF.2017.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CGKM17]
-
S. Calzavara, I. Grishchenko, A. Koutsos, and M. Maffei.
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis
of Android Applications.
In Proceedings of the 30th IEEE Computer Security
Foundations Symposium (CSF'17), pages 22--36, Santa Barbara,
California, USA, August 2017. IEEE Computer Society Press.
doi:
10.1109/CSF.2017.19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLM+17]
-
P. Bouyer, F. Laroussinie, N. Markey, J. Ouaknine, and
J. Worrell.
Timed temporal logics.
In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim
Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of
Lecture Notes in Computer Science, pages 211--230. Springer, August 2017.
doi:
10.1007/978-3-319-65764-6_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Seg17]
-
L. Segoufin.
A survey on guarded negation.
SIGLOG News, 4(3):12--26, July 2017.
doi:
10.1145/3129173.3129178.
[ BibTex |
DOI ]
-
[FL17]
-
A. Finkel and É. Lozes.
Synchronizability of Communicating Finite State Machines is not
Decidable.
In Proceedings of the 44th International Colloquium on
Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz
International Proceedings in Informatics, pages 122:1--122:14, Warsaw,
Poland, July 2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2017.122.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dow17c]
-
G. Dowek.
Models and termination of proof reduction in the
λΠ-calculus modulo theory.
In Proceedings of the 44th International Colloquium on
Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz
International Proceedings in Informatics, pages 109:1--109:14, Warsaw,
Poland, July 2017. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2017.109.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FMW17]
-
M. Fortin, A. Muscholl, and I. Walukiewicz.
Model-checking linear-time properties of parametrized
asynchronous shared-memory pushdown systems.
In Proceedings of the 29th International Conference on
Computer Aided Verification (CAV'17), volume 10427 of Lecture Notes
in Computer Science, pages 155--175, Heidelberg, Germany, July 2017.
Springer.
doi:
10.1007/978-3-319-63390-9_9.
[ BibTex |
DOI |
Web page ]
-
[BR17]
-
D. Berwanger and R. Ramanujam.
Deviator Detection under Imperfect Monitoring.
In Proceedings of the 5th International Workshop on Strategic
Reasoning (SR'17), Liverpool, UK, July 2017.
[ BibTex |
Web page |
PDF ]
-
[BFRR17]
-
V. Bruyère, E. Filiot, M. Randour, and J.-F. Raskin.
Meet Your Expectations With Guarantees: Beyond Worst-Case
Synthesis in Quantitative Games.
Information and Computation, 254(2):259--295, June 2017.
To appear.
doi:
10.1016/j.ic.2016.10.011.
[ BibTex |
DOI ]
-
[BMV17b]
-
P. Bouyer, N. Markey, and S. Vester.
Nash Equilibria in Symmetric Graph Games with Partial
Observation.
Information and Computation, 254(2):238--258, June 2017.
doi:
10.1016/j.ic.2016.10.010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KGH+17]
-
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard,
B. Berthomieu, G. Ciardo, M. Colange, S. Dal Zilio, E. Amparore,
M. Beccuti, T. Liebke, J. Meijer, A. Miner, C. Rohr, J. Srba,
Y. Thierry-Mieg, J. van de Pol, and K. Wolf.
Complete Results for the 2017 Edition of the Model Checking
Contest, June 2017.
[ BibTex |
Web page ]
-
[Dou17a]
-
A. Doumane.
Constructive completeness for the linear-time
μ-calculus.
In Proceedings of the 32nd Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'17), pages 1--12, Reykjavik,
Iceland, June 2017. IEEE Press.
doi:
10.1109/LICS.2017.8005075.
[ BibTex |
DOI ]
-
[Dou17b]
-
A. Doumane.
On the infinitary proof theory of logics with fixed points.
Thèse de doctorat, Université Paris-Diderot, Paris, France,
June 2017.
[ BibTex |
Web page |
PDF ]
-
[Gar17]
-
P. Gardy.
Semantics of Strategy Logic.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2017.
[ BibTex |
Web page |
PDF ]
-
[Had17]
-
S. Haddad.
Memoryless Determinacy of Finite Parity Games: Another Simple
Proof.
Research Report hal-01541508, HAL-inria, June 2017.
7 pages.
[ BibTex |
Web page |
PDF ]
-
[KV17]
-
A. Koutsos and V. Vianu.
Process-centric views of data-driven business artifacts.
Journal of Computer and System Sciences, 86(1):82--107, June 2017.
doi:
10.1016/j.jcss.2016.11.012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HSZ17]
-
S. Halfon, Ph. Schnoebelen, and G. Zetzsche.
Decidability, complexity, and expressiveness of first-order
logic over the subword ordering.
In Proceedings of the 32nd Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'17), pages 1--12, Reykjavik,
Iceland, June 2017. IEEE Press.
doi:
10.1109/LICS.2017.8005141.
[ BibTex |
DOI |
Web page ]
-
[CJLS17]
-
Th. Colcombet, M. Jurdziński, R. Lazić, and
S. Schmitz.
Perfect Half Space Games.
In Proceedings of the 32nd Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'17), pages 1--11, Reykjavik,
Iceland, June 2017. IEEE Press.
doi:
10.1109/LICS.2017.8005105.
[ BibTex |
DOI |
Web page ]
-
[vCCT17]
-
B. van Dongen, J. Carmona, Th. Chatain, and
F. Taymouri.
Aligning Modeled and Observed Behavior: A Compromise Between
Complexity and Quality.
In Proceedings of the 29th International Conference on
Advanced Information Systems Engineering (CAiSE'17), volume 10253
of Lecture Notes in Computer Science, pages 94--109, Essen, Germany, June
2017. Springer.
doi:
10.1007/978-3-319-59536-8_7.
[ BibTex |
DOI |
PDF ]
-
[BHSS17]
-
B. Bérard, S. Haar, S. Schmitz, and S. Schwoon.
The Complexity of Diagnosability and Opacity Verification for
Petri Nets.
In Proceedings of the 38th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'17), volume 10258
of Lecture Notes in Computer Science, pages 200--220, Zaragoza, Spain, June
2017. Springer.
doi:
10.1007/978-3-319-57861-3_13.
[ BibTex |
DOI |
Web page ]
-
[BM17]
-
D. Berwanger and A. B. Mathew.
Infinite games with finite knowledge gaps.
Information and Computation, 254:217--237, June 2017.
doi:
10.1016/j.ic.2016.10.009.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMv17a]
-
D. Berwanger, A. B. Mathew, and M. van den Bogaard.
Hierarchical information and the synthesis of distributed
strategies.
Acta Informatica, June 2017.
doi:
10.1007/s00236-017-0306-5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JS17]
-
J.-P. Jouannaud and P.-Y. Strub.
Coq without Type Casts: A Complete Proof of Coq Modulo
Theory.
In Proceedings of the 21st International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'17),
volume 46 of EPiC Series in Computing, pages 474--489, Maun, Botswana, May
2017. EasyChair.
[ BibTex |
Web page |
PDF ]
-
[TFL17]
-
G. Tarawneh, M. Függer, and C. Lenzen.
Metastability Tolerant Computing.
In Proceedings of the 23rd IEEE International Symposium on
Asynchronous Circuits and Systems (ASYNC'17), pages 25--32, San
Diego, California, USA, May 2017. IEEE Computer Society.
doi:
10.1109/ASYNC.2017.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FKLP17]
-
M. Függer, A. Kinali, C. Lenzen, and T. Polzer.
Metastability-Aware Memory-Efficient Time-to-Digital Converter.
In Proceedings of the 23rd IEEE International Symposium on
Asynchronous Circuits and Systems (ASYNC'17), pages 49--56, San
Diego, California, USA, May 2017. IEEE Computer Society.
doi:
10.1109/ASYNC.2017.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[OBH17]
-
P. O'Hanlon, R. Borgaonkar, and L. Hirschi.
Mobile subscriber WiFi privacy.
In Proceedings of Mobile Security Technologies (MoST'17), held as
part of the IEEE Computer Society Security and Privacy Workshops, San Jose,
CA, USA, May 2017.
[ BibTex |
PDF ]
-
[BJ17]
-
P. Bouyer and V. Jugé.
Dynamic Complexity of the Dyck Reachability.
In Proceedings of the 20th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'17), Lecture Notes in Computer Science, pages 265--280, Uppsala,
Sweden, April 2017. Springer.
doi:
10.1007/978-3-662-54458-7_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHM+17]
-
P. Bouyer, P. Hofman, N. Markey, M. Randour, and
M. Zimmermann.
Bounding Average-energy Games.
In Proceedings of the 20th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'17), Lecture Notes in Computer Science, pages 179--195, Uppsala,
Sweden, April 2017. Springer.
doi:
10.1007/978-3-662-54458-7_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ZKL17]
-
G. Zetzsche, D. Kuske, and M. Lohrey.
On Boolean closed full trios and rational Kripke frames.
Theory of Computing Systems, 60(3):438--472, April 2017.
doi:
10.1007/s00224-016-9694-0.
[ BibTex |
DOI ]
-
[Gil17a]
-
F. Gilbert.
Automated Constructivization of Proofs.
In Proceedings of the 20th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'17), Lecture Notes in Computer Science, pages 480--495, Uppsala,
Sweden, April 2017. Springer.
doi:
10.1007/978-3-662-54458-7_28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LDCF17]
-
A. Le Coënt, F. De Vuyst, L. Chamoin, and
L. Fribourg.
Control Synthesis of Nonlinear Sampled Switched Systems using
Euler's Method.
In Proceedings of the 3rd International Workshop on Symbolic
and Numerical Methods for Reachability Analysis (SNR'17), volume
247 of Electronic Proceedings in Theoretical Computer Science, pages 18--33,
Uppsala, Sweden, April 2017.
doi:
10.4204/EPTCS.247.2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Hir17]
-
L. Hirschi.
Automated Verification of Privacy in Security Protocols: Back
and Forth Between Theory & Practice.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, April 2017.
[ BibTex |
Web page |
PDF ]
-
[BGHH17]
-
S. Böhm, S. Göller, S. Halfon, and P. Hofman.
On Büchi one-counter automata.
In Proceedings of the 34th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'17), Leibniz International
Proceedings in Informatics, pages 14:1--14:13, Hannover, Germany, March 2017.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2017.14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CG17]
-
A. Carayol and S. Göller.
On long words avoiding Zimin patterns.
In Proceedings of the 34th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'17), Leibniz International
Proceedings in Informatics, pages 19:1--19:13, Hannover, Germany, March 2017.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2017.19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LZ17]
-
M. Lohrey and G. Zetzsche.
The Complexity of Knapsack in Graph Groups.
In Proceedings of the 34th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'17), Leibniz International
Proceedings in Informatics, pages 52:1--52:14, Hannover, Germany, March 2017.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2017.52.
[ BibTex |
DOI ]
-
[Mon17]
-
D. Montoya.
Une base de connaissance personnelle intégrant les données
d'un utilisateur et une chronologie de ses activités.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, March 2017.
[ BibTex |
Web page |
PDF ]
-
[SV17]
-
L. Segoufin and A. Vigny.
Constant Delay Enumeration for FO Queries over Databases with
Local Bounded Expansion.
In Proceedings of the 18th International Conference on
Database Theory (ICDT'17), volume 68 of Leibniz International
Proceedings in Informatics, pages 20:1--20:16, Venice, Italy, March 2017.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICDT.2017.20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sta17]
-
D. Stan.
Randomized Strategies in Concurrent Games.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, March 2017.
[ BibTex |
Web page |
PDF ]
-
[BBDH17]
-
B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad.
Statistical Model-Checking for Autonomous Vehicle Safety
Validation.
In SIA Simulation Numérique, Montigny-le-Bretonneux, France,
March 2017.
[ BibTex |
Web page |
PDF ]
-
[CFNS17]
-
B. Charron-Bost, M. Függer, Th. Nowak, and
M. Schwarz.
New transience bounds for max-plus linear systems.
Discrete Applied Mathematics, 219:83--99, March 2017.
doi:
10.1016/j.dam.2016.11.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dow17b]
-
G. Dowek.
Lineal: A linear-algebraic Lambda-calculus.
Logical Methods in Computer Science, 13(1):1--33, March 2017.
doi:
10.23638/LMCS-13(1:8)2017.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Jug17]
-
V. Jugé.
The Relaxation Normal Form of Braids is Regular.
International Journal of Algebra and Computation, 27(1):61--106,
February 2017.
doi:
10.1142/S0218196717500059.
[ BibTex |
DOI |
Web page ]
-
[BMJ17]
-
P. Bouyer, N. Markey, and V. Jugé.
Courcelle's Theorem Made Dynamic.
Research Report 1702.05183, Computing Research Repository, February
2017.
14 pages.
[ BibTex |
Web page |
PDF ]
-
[HHMS17]
-
S. Haar, S. Haddad, T. Melliti, and S. Schwoon.
Optimal constructions for active diagnosis.
Journal of Computer and System Sciences, 83(1):101--120, 2017.
doi:
10.1016/j.jcss.2016.04.007.
[ BibTex |
DOI |
PDF ]
-
[BKM17]
-
B. Bollig, D. Kuske, and R. Mennicke.
The Complexity of Model Checking Multi-Stack Systems.
Theory of Computing Systems, 60(4):695--736, 2017.
doi:
10.1007/s00224-016-9700-6.
[ BibTex |
DOI |
Web page ]
-
[BMPS17]
-
P. Bouyer, N. Markey, N. Perrin, and
P. Schlehuber-Caissier.
Timed automata abstraction of switched dynamical systems using
control funnels.
Real-Time Systems, 53(3):327--353, 2017.
doi:
10.1007/s11241-016-9262-3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DGLWM17]
-
S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Mery.
Separation Logic with One Quantified Variable.
Theory of Computing Systems, 61(2):371--461, 2017.
doi:
10.1007/s00224-016-9713-1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou17b]
-
J. Goubault-Larrecq.
A Non-Hausdorff Minimax Theorem.
Minimax Theory and its Applications, 3(1):73--80, 2017.
[ BibTex ]
-
[DDS17]
-
S. Demri, A. Dhar, and A. Sangnier.
Equivalence Between Model-Checking Flat Counter Systems and
Presburger Arithmetic.
Theoretical Computer Science, 735:2--23, 2017.
[ BibTex |
PDF ]
-
[CDFR17]
-
K. Chatterjee, L. Doyen, E. Filiot, and J. Raskin.
Doomsday equilibria for omega-regular games.
Information and Computation, 254:296--315, 2017.
doi:
10.1016/j.ic.2016.10.012.
[ BibTex |
DOI |
PDF ]
-
[BCMW17]
-
D. Baelde, A. Carayol, R. Matthes, and I. Walukiewicz.
Preface: Special Issue of Fixed Points in Computer Science
(FICS'13).
Fundamenta Informaticae, 150(3-4):i--ii, 2017.
doi:
10.3233/FI-2017-1468.
[ BibTex |
DOI |
Web page ]
-
[BDH17]
-
D. Baelde, S. Delaune, and L. Hirschi.
A Reduced Semantics for Deciding Trace Equivalence.
Logical Methods in Computer Science, 13(2:8):1--48, 2017.
doi:
10.23638/LMCS-13(2:8)2017.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFHH17]
-
M. Blondin, A. Finkel, C. Haase, and S. Haddad.
The Logical View on Continuous Petri Nets.
ACM Transactions on Computational Logic, 18(3):24:1--24:28, 2017.
doi:
10.1145/3105908.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HPV17]
-
S. Haar, S. Perchy, and F. Valencia.
D-SPACES: Implementing Declarative Semantics for Spatially
Structured Information.
In Proceedings of the 11th International Conference on Semantic
Computing (ICSC'17), volume 11 of IEEE ICSC, pages 227--233, San Diego, CA,
USA, January 2017. IEEE Press.
doi:
10.1109/ICSC.2017.34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GHP+17]
-
M. Guzmán, S. Haar, S. Perchy, C. Rueda, and
F. Valencia.
Belief, Knowledge, Lies and Other Utterances in an Algebra for
Space and Extrusion.
Journal of Logic and Algebraic Methods in Programming,
86(1):107--133, January 2017.
doi:
10.1016/j.jlamp.2016.09.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABH17]
-
M. F. Atig, B. Bollig, and P. Habermehl.
Emptiness of ordered multi-pushdown automata is
2ETIME-complete.
International Journal of Foundations of Computer Science,
28(8):945--975, 2017.
doi:
10.1142/S0129054117500332.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKW17]
-
S. Demri, D. Kapur, and C. Weidenbach.
Special Issue of Selected Extended Papers of IJCAR 2014.
Journal of Automated Reasoning, 58(1), 2017.
[ BibTex |
Web page ]
-
[ACR17]
-
É. André, Th. Chatain, and
C. Rodríguez.
Preserving Partial-Order Runs in Parametric Time Petri Nets.
ACM Transactions in Embedded Computing Systems, 16(2):43:1--43:26,
2017.
doi:
10.1145/3012283.
[ BibTex |
DOI |
PDF ]
-
[AM17]
-
P. Arrighi and S. Martiel.
Quantum causal graph dynamics.
Physical Review D, 96(2), 2017.
[ BibTex |
PDF ]
-
[AD17]
-
S. Abiteboul and G. Dowek.
Le temps des algorithmes.
Editions Le Pommier, 2017.
[ BibTex |
Web page ]
-
[CCD17]
-
V. Cheval, H. Comon-Lundh, and S. Delaune.
A procedure for deciding symbolic equivalence between sets of
constraint systems.
Information and Computation, 255:94--125, 2017.
doi:
10.1016/j.ic.2017.05.004.
[ BibTex |
DOI |
Web page ]
-
[DD17]
-
A. Díaz-Caro and G. Dowek.
Typing Quantum Superpositions and Measurement.
In Proceedings of the 6th International Conference on Theory and
Practice of Natural Computing (TPNC'17), volume 10687 of Lecture Notes in
Computer Science, pages 281--293, Prague, Czech Republic, 2017. Springer.
doi:
10.1007/978-3-319-71069-3_22.
[ BibTex |
DOI |
Web page ]
-
[Dow17d]
-
G. Dowek.
Rules and derivations in an elementary logic course.
IfCoLoG Journal of Logics and their Applications, 4(1):21--32, 2017.
Special Issue: Tools for Teaching Logic.
[ BibTex |
PDF ]
-
[BKM16]
-
M. Blondin, A. Krebs, and P. McKenzie.
The Complexity of Intersecting Finite Automata Having Few Final
States.
Computational Complexity, 25(4):775--814, December 2016.
To appear.
doi:
10.1007/s00037-014-0089-9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[The16]
-
S. Theissing.
Supervision in Multi-Modal Transportation System.
Thèse de doctorat, École Normale Supérieure Paris-Saclay,
France, December 2016.
[ BibTex |
Web page |
PDF ]
-
[Bol16]
-
B. Bollig.
One-Counter Automata with Counter Observability.
In Proceedings of the 36th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'16),
volume 65 of Leibniz International Proceedings in Informatics, pages
20:1--20:14, Chennai, India, December 2016. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2016.20.
[ BibTex |
DOI |
Web page ]
-
[Gou16d]
-
J. Goubault-Larrecq.
A semantics for .
Invited talk, Dale Miller Festschrift, Paris Diderot University,
Paris, December 2016.
[ BibTex ]
-
[AD16b]
-
P. Arrighi and G. Dowek.
What is the Planck constant the magnitude of?
preprint, December 2016.
[ BibTex |
Web page |
PDF ]
-
[Hal16a]
-
P. Halmagrand.
Automated Deduction and Proof Certification for the B Method.
Thèse de doctorat, Conservatoire National Des Arts et
Métiers, Paris, December 2016.
[ BibTex |
Web page ]
-
[BGMS16b]
-
P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin.
Nondeterminism and An Abstract Formulation of Nečiporuk's
Lower Bound Method.
ACM Transactions on Computation Theory, 9(1):5:1--5:34, December
2016.
doi:
10.1145/3013516.
[ BibTex |
DOI ]
-
[Van16]
-
M. Van den Bogaard.
Motifs de Flot d'Information dans les Jeux à Information
Imparfaite.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2016.
[ BibTex |
Web page |
PDF ]
-
[MPTAS16]
-
D. Montoya, T. Pellissier Tanon, S. Abiteboul, and
F. Suchanek.
Thymeflow, A Personal Knowledge Base with
Spatio-temporal Data.
In Proceedings of the 25th ACM International Conference on
Information and Knowledge Management (CIKM'16), pages 2477--2480,
Indianapolis, Indiana, USA, October 2016. ACM.
doi:
10.1145/2983323.2983337.
[ BibTex |
DOI |
PDF ]
-
[Moh16]
-
S. Mohamed.
Une méthode topologique pour la recherche d'ensembles
invariants de systèmes continus et à commutation.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2016.
[ BibTex |
Web page |
PDF ]
-
[Cau16b]
-
R. Cauderlier.
Object-Oriented Mechanisms for Interoperability between Proof
Systems.
Thèse de doctorat, Conservatoire National Des Arts et
Métiers, Paris, October 2016.
[ BibTex |
Web page |
PDF ]
-
[DGL16]
-
S. Demri, V. Goranko, and M. Lange.
Temporal Logics in Computer Science, volume 58 of
Cambridge Tracts in Theoretical Computer Science.
Cambridge University Press, October 2016.
[ BibTex |
Web page ]
-
[Hal16b]
-
P. Halmagrand.
Soundly Proving B Method Formulae Using Typed Sequent
Calculus.
In Proceedings of the 13th International Colloquium on
Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture
Notes in Computer Science, pages 196--213, Taipei, Taiwan, October 2016.
Springer.
doi:
10.1007/978-3-319-46750-4_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[vDCC16a]
-
B. van Dongen, J. Carmona, and Th. Chatain.
Alignment-based Quality Metrics in Conformance Checking.
In Proceedings of the 7th Int. Workshop on Enterprise
Modelling and Information Systems Architectures (EMISA'16), volume
1701 of CEUR Workshop Proceedings, pages 87--90, Vienna, Austria, October
2016. CEUR-WS.org.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MHP16]
-
H. Mandon, S. Haar, and L. Paulevé.
Relationship between the Reprogramming Determinants of Boolean
Networks and their Interaction Graph.
In Proceedings of the 5th International Workshop on Hybrid
Systems Biology, Lecture Notes in Computer Science, pages 113--127,
Grenoble France, October 2016. Springer.
doi:
10.1007/978-3-319-47151-8_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMJ16]
-
P. Bouyer, N. Markey, and V. Jugé.
Dynamic Complexity of Parity Games with Bounded Tree-Width.
Research Report 1610.00571, Computing Research Repository, October
2016.
33 pages.
[ BibTex |
Web page |
PDF ]
-
[CD16a]
-
R. Cauderlier and C. Dubois.
ML Pattern-Matching, Recursion, and Rewriting: From FoCaLiZe
to Dedukti.
In Proceedings of the 13th International Colloquium on
Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture
Notes in Computer Science, pages 459--468, Taipei, Taiwan, October 2016.
Springer.
[ BibTex |
Web page |
PDF ]
-
[Haa16]
-
S. Haar.
Cyclic Ordering through Partial Orders.
Journal of Multiple-Valued Logic and Soft Computing,
27(2-3):209--228, September 2016.
[ BibTex |
Web page |
PDF ]
-
[Jac16]
-
C. Jacomme.
Automated applications of Cryptographic Assumptions.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2016.
[ BibTex |
PDF ]
-
[HHK+16a]
-
M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and
É. Lozes.
Multi-Buffer Simulations for Trace Language Inclusion.
In Proceedings of the 7th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'16), volume 226
of Electronic Proceedings in Theoretical Computer Science, pages 213--227,
Catania, Italy, September 2016.
doi:
10.4204/EPTCS.226.15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GL16]
-
J. Goubault-Larrecq and J. Lachance.
On the Complexity of Monitoring Orchids Signatures.
In Proceedings of the 16th Conference on Runtime Verification
(RV'16), volume 10012 of Lecture Notes in Computer Science, pages 169--164,
Madrid, Spain, September 2016. Springer.
doi:
10.1007/978-3-319-46982-9_11.
[ BibTex |
DOI ]
-
[KŠHP16]
-
J. Kolcák, D. Šafránek, S. Haar, and
L. Paulevé.
Unfolding of Parametric Logical Regulatory Networks.
In Proceedings of The Seventh International Workshop on
Static Analysis and Systems Biology (SASB 2016), Electronic Notes in
Theoretical Computer Science, Edinburgh, UK, September 2016. Elsevier Science
Publishers.
To appear.
[ BibTex |
Web page |
PDF ]
-
[BDM16]
-
L. Beklemishev, S. Demri, and A. Maté, editors.
Proceedings of the 11th Conference on Advances in Modal
Logic (AiML'16), Budapest, Hungary, September 2016. College
Publications.
[ BibTex |
Web page ]
-
[BMS16]
-
P. Bouyer, N. Markey, and D. Stan.
Stochastic Equilibria under Imprecise Deviations in
Terminal-Reward Concurrent Games.
In Proceedings of the 7th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'16), volume 226
of Electronic Proceedings in Theoretical Computer Science, pages 61--75,
Catania, Italy, September 2016.
doi:
10.4204/EPTCS.226.5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fin16]
-
A. Finkel.
The Ideal Theory for WSTS.
In Proceedings of the 10th Workshop on Reachability Problems
in Computational Models (RP'16), volume 9899 of Lecture Notes in
Computer Science, pages 1--22, Aalborg, Denmark, September 2016. Springer.
doi:
10.1007/978-3-319-45994-3_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABDL16]
-
N. Alechina, N. Bulling, S. Demri, and B. Logan.
On the Complexity of Resource-Bounded Logics.
In Proceedings of the 10th Workshop on Reachability Problems
in Computational Models (RP'16), volume 9899 of Lecture Notes in
Computer Science, pages 36--50, Aalborg, Denmark, September 2016. Springer.
doi:
10.1007/978-3-319-45994-3_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LFS16]
-
A. Le Coënt, L. Fribourg, and R. Soulat.
Compositional analysis of Boolean networks using local
fixed-point iterations.
In Proceedings of the 10th Workshop on Reachability Problems
in Computational Models (RP'16), volume 9899 of Lecture Notes in
Computer Science, pages 134--147, Aalborg, Denmark, September 2016. Springer.
doi:
10.1007/978-3-319-45994-3_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LFM+16]
-
A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and
L. Chamoin.
Distributed Synthesis of State-Dependent Switching Control.
In Proceedings of the 10th Workshop on Reachability Problems
in Computational Models (RP'16), volume 9899 of Lecture Notes in
Computer Science, pages 119--133, Aalborg, Denmark, September 2016. Springer.
doi:
10.1007/978-3-319-45994-3_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[vDCC16b]
-
B. F. van Dongen, J. Carmona, and Th. Chatain.
A Unified Approach for Measuring Precision and Generalization
Based on Anti-Alignments.
In Proceedings of the 14th International Conference on
Business Process Management (BPM'16), volume 9850 of Lecture Notes in
Computer Science, pages 39--56, Rio de Janeiro, Brazil, September 2016.
Springer.
doi:
10.1007/978-3-319-45348-4_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS16]
-
P. Karandikar and Ph. Schnoebelen.
The height of piecewise-testable languages with applications in
logical complexity.
In Proceedings of the 25th Annual EACSL Conference on
Computer Science Logic (CSL'16), volume 62 of Leibniz International
Proceedings in Informatics, pages 37:1--37:22, Marseille, France, September
2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2016.37.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GGL16]
-
M. Ganardi, S. Göller, and M. Lohrey.
On the Parallel Complexity of Bisimulation over Finite Systems.
In Proceedings of the 25th Annual EACSL Conference on
Computer Science Logic (CSL'16), volume 62 of Leibniz International
Proceedings in Informatics, pages 12:1--12:17, Marseille, France, September
2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2016.12.
[ BibTex |
DOI ]
-
[DGG16b]
-
J. Dubut, É. Goubault, and J. Goubault-Larrecq.
The Directed Homotopy Hypothesis.
In Proceedings of the 25th Annual EACSL Conference on
Computer Science Logic (CSL'16), volume 62 of Leibniz International
Proceedings in Informatics, pages 9:1--9:16, Marseille, France, September
2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2016.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DBS16]
-
A. Doumane, D. Baelde, and A. Saurin.
Infinitary proof theory: the multiplicative additive case.
In Proceedings of the 25th Annual EACSL Conference on
Computer Science Logic (CSL'16), volume 62 of Leibniz International
Proceedings in Informatics, pages 42:1--42:17, Marseille, France, September
2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2016.42.
[ BibTex |
DOI ]
-
[BLS16]
-
D. Baelde, S. Lunel, and S. Schmitz.
A Sequent Calculus for a Modal Logic on Finite Data Trees.
In Proceedings of the 25th Annual EACSL Conference on
Computer Science Logic (CSL'16), volume 62 of Leibniz International
Proceedings in Informatics, pages 32:1--32:16, Marseille, France, September
2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2016.32.
[ BibTex |
DOI |
Web page ]
-
[Leh16]
-
M. Lehaut.
PDL on infinite alphabet.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, August 2016.
19 pages.
[ BibTex |
Web page |
PDF ]
-
[BGMS16a]
-
P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin.
Nondeterminism and an abstract formulation of Neciporuk's
lower bound method.
Research Report 1608.01932, Computing Research Repository, August
2016.
34 pages.
[ BibTex |
Web page |
PDF ]
-
[Lic16]
-
A. Lick.
Systèmes de preuves pour logiques modales.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, August 2016.
20 pages.
[ BibTex |
Web page |
PDF ]
-
[BFM16]
-
M. Blondin, A. Finkel, and P. McKenzie.
Well Behaved Transition Systems.
Research Report 1608.02636, Computing Research Repository, August
2016.
18 pages.
[ BibTex |
Web page |
PDF ]
-
[FM16]
-
M. Fränzle and N. Markey, editors.
Proceedings of the 14th International Conference on
Formal Modelling and Analysis of Timed Systems (FORMATS'16),
volume 9884 of Lecture Notes in Computer Science, Québec City, Canada,
August 2016. Springer.
doi:
10.1007/978-3-319-44878-7.
[ BibTex |
DOI |
Web page ]
-
[HT16b]
-
S. Haar and S. Theissing.
Decoupling Passenger Flows for Improved Load Prediction.
In Proceedings of the 13th International Conference on
Quantitative Evaluation of Systems (QEST'16), volume 9826 of Lecture
Notes in Computer Science, pages 364--379, Québec City, Canada, August
2016. Springer.
doi:
10.1007/978-3-319-43425-4_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bou16]
-
P. Bouyer.
Optimal Reachability in Weighted Timed Automata and Games.
In Proceedings of the 41st International Symposium on
Mathematical Foundations of Computer Science (MFCS'16), volume 58
of Leibniz International Proceedings in Informatics, pages 3:1--3:3, Krakow,
Poland, August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2016.3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABK+16]
-
S. Akshay, P. Bouyer, S. N. Krishna, L. Manasa, and
A. Trivedi.
Stochastic Timed Games Revisited.
In Proceedings of the 41st International Symposium on
Mathematical Foundations of Computer Science (MFCS'16), volume 58
of Leibniz International Proceedings in Informatics, pages 8:1--8:14, Krakow,
Poland, August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2016.8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[NPR16]
-
R. Niskanen, I. Potapov, and J. Reichert.
Undecidability of Two-dimensional Robot Games.
In Proceedings of the 41st International Symposium on
Mathematical Foundations of Computer Science (MFCS'16), volume 58
of Leibniz International Proceedings in Informatics, pages 73:1--73:13,
Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.MFCS.2016.73.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DGG16a]
-
J. Dubut, É. Goubault, and J. Goubault-Larrecq.
Bisimulations and unfolding in P-accessible
categorical models.
In Proceedings of the 27th International Conference on
Concurrency Theory (CONCUR'16), volume 59 of Leibniz International
Proceedings in Informatics, pages 25:1--25:14, Québec City, Canada,
August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2016.25.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGK16]
-
S. Akshay, P. Gastin, and S. N. Krishna.
Analyzing Timed Systems Using Tree Automata.
In Proceedings of the 27th International Conference on
Concurrency Theory (CONCUR'16), volume 59 of Leibniz International
Proceedings in Informatics, pages 27:1--27:14, Québec City, Canada,
August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2016.27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHL16b]
-
N. Bertrand, S. Haddad, and E. Lefaucheux.
Diagnosis in Infinite-State Probabilistic Systems.
In Proceedings of the 27th International Conference on
Concurrency Theory (CONCUR'16), volume 59 of Leibniz International
Proceedings in Informatics, pages 37:1--37:15, Québec City, Canada,
August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2016.37.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLM16]
-
A. David, F. Laroussinie, and N. Markey.
On the expressiveness of QCTL.
In Proceedings of the 27th International Conference on
Concurrency Theory (CONCUR'16), volume 59 of Leibniz International
Proceedings in Informatics, pages 28:1--28:15, Québec City, Canada,
August 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2016.28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DFP16]
-
S. Demri, D. Figueira, and M. Praveen.
Reasoning about Data Repetitions with Counter Systems.
Logical Methods in Computer Science, 12(3):1:1--1:55, August 2016.
doi:
10.2168/LMCS-12(3:1)2016.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou16a]
-
J. Goubault-Larrecq.
A few things on Noetherian spaces.
Invited talk (plenary speaker), Summer Topology Conference,
Leicester, UK, August 2016.
[ BibTex ]
-
[Gou16b]
-
J. Goubault-Larrecq.
An introduction to asymmetric topology and domain theory: why,
what, and how.
Invited talk, Galway Symposium, Leicester, UK, August 2016.
[ BibTex ]
-
[Thi16]
-
F. Thiré.
Reverse engineering on arithmetic proofs.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, August 2016.
26 pages.
[ BibTex |
Web page |
PDF ]
-
[BDJ+16]
-
Th. Brihaye, B. Delahaye, L. Jezequel, N. Markey, and J. Srba,
editors.
Proceedings of the Cassting Workshop on Games for the
Synthesis of Complex Systems (Cassting'16) and of the 3rd
International Workshop on Synthesis of Complex Parameters
(SynCoP'16), volume 220 of Electronic Proceedings in Theoretical
Computer Science, Eindhoven, The Netherlands, July 2016.
doi:
10.4204/EPTCS.220.
[ BibTex |
DOI |
Web page ]
-
[HT16d]
-
S. Haar and S. Theissing.
Predicting Traffic Load in Public Transportation Networks.
In Proceedings of the 35th American Control Conference
(ACC'16), pages 821--826, Boston, Massachusetts, USA, July 2016. IEEE
Control System Society.
doi:
10.1109/ACC.2016.7525015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBBC16]
-
N. Bertrand, P. Bouyer, Th. Brihaye, and
P. Carlier.
Analysing Decisive Stochastic Processes.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 101:1--101:14, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.101.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CH16]
-
D. Chistikov and C. Haase.
The Taming of the Semi-Linear Set.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 128:1--128:14, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.128.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Zet16]
-
G. Zetzsche.
The complexity of downward closure comparisons.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 123:1--123:14, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.123.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD16b]
-
K. Chatterjee and L. Doyen.
Computation Tree Logic for Synchronization Properties.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 98:1--98:14, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.98.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GS16]
-
J. Goubault-Larrecq and S. Schmitz.
Deciding Piecewise Testable Separability for Regular Tree
Languages.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 97:1--97:15, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.97.
[ BibTex |
DOI |
Web page ]
-
[GHLT16]
-
S. Göller, C. Haase, R. Lazić, and P. Totzke.
A Polynomial-Time Algorithm for Reachability in Branching VASS
in Dimension One.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 105:1--105:13, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.105.
[ BibTex |
DOI |
Web page ]
-
[BCM16]
-
P. Bouyer, M. Colange, and N. Markey.
Symbolic Optimal Reachability in Weighted Timed Automata.
In Proceedings of the 28th International Conference on
Computer Aided Verification (CAV'16) -- Part I, volume 9779 of
Lecture Notes in Computer Science, pages 513--530, Toronto, Canada, July
2016. Springer.
doi:
10.1007/978-3-319-41528-4_28.
[ BibTex |
DOI |
Web page ]
-
[BMR+16]
-
P. Bouyer, N. Markey, M. Randour, A. Sangnier, and D. Stan.
Reachability in Networks of Register Protocols under Stochastic
Schedulers.
In Proceedings of the 43rd International Colloquium on
Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz
International Proceedings in Informatics, pages 106:1--106:14, Rome, Italy,
July 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICALP.2016.106.
[ BibTex |
DOI |
Web page ]
-
[LS16a]
-
R. Lazić and S. Schmitz.
The Complexity of Coverability in ν-Petri Nets.
In Proceedings of the 31st Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'16), pages 467--476, New York City,
USA, July 2016. ACM Press.
doi:
10.1145/2933575.2933593.
[ BibTex |
DOI |
Web page ]
-
[DBHS16]
-
A. Doumane, D. Baelde, L. Hirschi, and A. Saurin.
Towards Completeness via Proof Search in the Linear Time
μ-calculus.
In Proceedings of the 31st Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'16), pages 377--386, New York City,
USA, July 2016. ACM Press.
doi:
10.1145/2933575.2933598.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CG16]
-
Th. Colcombet and S. Göller.
Games with bound guess actions.
In Proceedings of the 31st Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'16), pages 257--266, New York City,
USA, July 2016. ACM Press.
doi:
10.1145/2933575.2934502.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD16c]
-
K. Chatterjee and L. Doyen.
Perfect-information Stochastic Games with Generalized
Mean-Payoff Objectives.
In Proceedings of the 31st Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'16), pages 247--256, New York City,
USA, July 2016. ACM Press.
doi:
10.1145/2933575.2934513.
[ BibTex |
DOI |
Web page ]
-
[DMZ16]
-
E. D'Osualdo, R. Meyer, and G. Zetzsche.
First-order logic with reachability for infinite-state systems.
In Proceedings of the 31st Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'16), pages 457--466, New York City,
USA, July 2016. ACM Press.
doi:
10.1145/2933575.2934552.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACH+16]
-
M. F. Atig, D. Chistikov, P. Hofman, K. N. Kumar,
P. Saivasan, and G. Zetzsche.
Complexity of regular abstractions of one-counter languages.
In Proceedings of the 31st Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'16), pages 207--216, New York City,
USA, July 2016. ACM Press.
doi:
10.1145/2933575.2934561.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFS16]
-
P. Chambart, A. Finkel, and S. Schmitz.
Forward Analysis and Model Checking for Trace Bounded WSTS.
Theoretical Computer Science, 637:1--29, July 2016.
doi:
10.1016/j.tcs.2016.04.020.
[ BibTex |
DOI |
Web page ]
-
[AMP16]
-
P. Arrighi, S. Martiel, and S. Perdrix.
Reversible Causal Graph Dynamics.
In 8th Conference on Reversible Computation (RC'16), volume 9720 of
Lecture Notes in Computer Science, pages 73--88, Bologna, Italy, July 2016.
Springer.
doi:
10.1007/978-3-319-40578-0_5.
[ BibTex |
DOI |
Web page ]
-
[PHL16]
-
H. Ponce de León, S. Haar, and D. Longuet.
Model-based Testing for Concurrent Systems: Unfolding-based Test
Selection.
International Journal on Software Tools for Technology Transfer,
18(3):305--318, June 2016.
doi:
10.1007/s10009-014-0353-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sch16c]
-
S. Schmitz.
Implicational Relevance Logic is 2-ExpTime-Complete.
Journal of Symbolic Logic, 81(2):641--661, June 2016.
doi:
10.1017/jsl.2015.7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLV16]
-
A. Deutsch, Y. Li, and V. Vianu.
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI
Symposium on Principles of Database Systems (PODS'16).
In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium
on Principles of Database Systems (PODS'16), pages 179--194, San
Francisco, California, USA, June 2016. ACM Press.
doi:
10.1145/2902251.2902275.
[ BibTex |
DOI ]
-
[Blo16]
-
M. Blondin.
Algorithmique et complexité des systèmes à
compteurs.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France and Université de Montréal, June
2016.
[ BibTex |
Web page ]
-
[PS16]
-
T. Place and L. Segoufin.
Decidable Characterization of FO2(<, +1) and locality of DA.
Research Report 1606.03217, Computing Research Repository, June 2016.
8 pages.
[ BibTex |
Web page |
PDF ]
-
[DG16a]
-
S. Delaune and I. Gazeau.
Combination issues.
Deliverable VIP 4.2 (ANR-11-JS02-0006), June 2016.
5 pages.
[ BibTex |
Web page |
PDF ]
-
[DG16b]
-
S. Delaune and I. Gazeau.
Results on the case studies.
Deliverable VIP 2.2 (ANR-11-JS02-0006), June 2016.
8 pages.
[ BibTex |
Web page |
PDF ]
-
[BBCM16]
-
P. Bouyer, Th. Brihaye, P. Carlier, and Q. Menet.
Compositional Design of Stochastic Timed Automata.
In Proceedings of the 11th International Computer Science
Symposium in Russia (CSR'16), volume 9691 of Lecture Notes in Computer
Science, pages 117--130, St Petersburg, Russia, June 2016. Springer.
doi:
10.1007/978-3-319-34171-2_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CC16]
-
J. Carmona and Th. Chatain.
Anti-Alignments in Conformance Checking -- The Dark Side of
Process Models.
In Proceedings of the 37th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'16), volume 9698
of Lecture Notes in Computer Science, pages 240--258, Torún, Poland, June
2016. Springer.
doi:
10.1007/978-3-319-39086-4_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KGH+16a]
-
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard,
G. Chiardo, A. Hamez, L. Jezequel, A. Miner, J. Meijer, E. Paviot-Adet,
D. Racordon, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, G. Trinh,
and K. Wolf.
Complete Results for the 2016 Edition of the Model Checking
Contest, June 2016.
[ BibTex |
Web page ]
-
[Cau16a]
-
R. Cauderlier.
A Rewrite System for Proof Constructivization.
In Proceedings of the 11th International Workshop on Logical
Frameworks and Meta-Languages: Theory and Practice (LFMTP'16),
pages 2:1--2:7, Porto, Portugal, June 2016. ACM Press.
doi:
10.1007/978-3-319-40578-0_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LBB+16]
-
A. Linard, B. Barbot, D. Buchs, M. Colange,
C. Démoulins, L. Hillah, and A. Martin.
Layered Data: A Modular Formal Definition without Formalisms.
In Proceedings of the 10th International Workshop on Petri
Nets and Software Engineering (PNSE'16), volume 1591 of CEUR Workshop
Proceedings, pages 287--306, Torun, Poland, June 2016. CEUR-WS.org.
[ BibTex |
Web page |
PDF ]
-
[BCEZ16]
-
T. Brough, L. Ciobanu, M. Elder, and G. Zetzsche.
Permutations of context-free, ET0L and indexed languages.
Discrete Mathematics & Theoretical Computer Science, 17(3):167--178,
May 2016.
[ BibTex |
Web page |
PDF ]
-
[HT16a]
-
S. Haar and S. Theissing.
A Passenger-centric Multi-agent System Model for Multimodal
Public Transportation.
Research Report hal-01322956, HAL-inria, May 2016.
12 pages.
[ BibTex |
Web page |
PDF ]
-
[FHLM16]
-
É. Fabre, L. Hélouët, E. Lefaucheux, and
H. Marchand.
Diagnosability of Repairable Faults.
In Proceedings of the 13th Workshop on Discrete Event
Systems (WODES'16), pages 230--236, Xi'an, China, May-June 2016. IEEE
Control System Society.
doi:
10.1109/WODES.2016.7497853.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GR16]
-
G. Grefenstette and K. Rafes.
Transforming Wikipedia into an Ontology-based Information
Retrieval Search Engine for Local Experts using a Third-Party Taxonomy.
In Proceedings of the Joint 2nd Workshop on Language and
Ontology & Terminology and Knowledge Structures
(LangOnto+TermiKS'16), Portorož, Slovenia, May 2016.
To appear.
[ BibTex |
Web page |
PDF ]
-
[HBD16]
-
L. Hirschi, D. Baelde, and S. Delaune.
A method for verifying privacy-type properties: the unbounded
case.
In Proceedings of the 37th IEEE Symposium on Security and
Privacy (S&P'16), pages 564--581, San Jose, California, USA, May 2016.
IEEECSP.
doi:
10.1109/SP.2016.40.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GLSHHM16]
-
J. Goubault-Larrecq, P.-A. Sentucq, F. Hulin-Hubard, and
F. Majorczyk.
Etat final des travaux engagés sur Orchids.
Rapport final et fourniture 4 du contrat DGA-INRIA Orchids, May 2016.
[ BibTex ]
-
[GLM16]
-
J. Goubault-Larrecq and F. Majorczyk.
Génération de signatures pour le suivi de flux
d'informations.
Fourniture 3 du contrat DGA-INRIA Orchids, May 2016.
[ BibTex ]
-
[HHK+16b]
-
M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and
É. Lozes.
Two-Buffer Simulation Games.
In Proceedings of the Cassting Workshop on Games for the
Synthesis of Complex Systems and 3rd International Workshop on
Synthesis of Complex Parameters (Cassting/SYNCOP'16), volume 220 of
Electronic Proceedings in Theoretical Computer Science, pages 213--227,
Eindhoven, The Netherlands, April 2016.
doi:
10.4204/EPTCS.220.3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HT16c]
-
S. Haar and S. Theissing.
Forecasting Passenger Loads in Transportation Networks.
In Proceedings of the 8th International Workshop on Practical
Applications of Stochastic Modelling (PASM'16), volume 327 of
Electronic Notes in Theoretical Computer Science, pages 49--69, Münster,
Germany, April 2016. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2016.09.023.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LACF16]
-
A. Le Coënt, J. Alexandre dit Sandretto,
A. Chapoutot, and L. Fribourg.
Control of Nonlinear Switched Systems Based on Validated
Simulation.
In Proceedings of the 2nd International Workshop on Symbolic
and Numerical Methods for Reachability Analysis (SNR'16), pages
1--6, Vienna, Austria, April 2016. IEEE Computer Society Press.
[ BibTex |
Web page |
PDF ]
-
[FGMP16]
-
L. Fribourg, É. Goubault, S. Mohamed, and S. Putot.
A Topological Method for Finding Invariant Sets of Switched
Systems.
In Proceedings of the 19th ACM International Conference on
Hybrid Systems: Computation and Control (HSCC'16), pages 61--70,
Vienna, Austria, April 2016. ACM Press.
doi:
10.1145/2883817.2883822.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCH+16]
-
D. Chistikov, W. Czerwiński, P. Hofman, M. Pilipczuk, and
M. Wehar.
Shortest paths in one-counter systems.
In Proceedings of the 19th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages
462--478, Eindhoven, The Netherlands, April 2016. Springer.
doi:
10.1007/978-3-662-49630-5_27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HLL+16]
-
P. Hofman, S. Lasota, R. Lazić, J. Leroux, S. Schmitz,
and P. Totzke.
Coverability Trees for Petri Nets with Unordered Data.
In Proceedings of the 19th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages
445--461, Eindhoven, The Netherlands, April 2016. Springer.
doi:
10.1007/978-3-662-49630-5_26.
[ BibTex |
DOI |
Web page ]
-
[FG16]
-
M. Fortin and P. Gastin.
Verification of parameterized communicating automata via
split-width.
In Proceedings of the 19th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages
197--213, Eindhoven, The Netherlands, April 2016. Springer.
doi:
10.1007/978-3-662-49630-5_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDD16]
-
V. Cortier, A. Dallon, and S. Delaune.
Bounding the number of agents, for equivalence too.
In Proceedings of the 5th International Conference on
Principles of Security and Trust (POST'16), volume 9635 of Lecture
Notes in Computer Science, pages 211--232, Eindhoven, The Netherlands, April
2016. Springer.
doi:
10.1007/978-3-662-49635-0_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFHH16a]
-
M. Blondin, A. Finkel, C. Haase, and S. Haddad.
Approaching the Coverability Problem Continuously.
In Proceedings of the 22th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'16),
volume 9636 of Lecture Notes in Computer Science, pages 480--496, Eindhoven,
The Netherlands, April 2016. Springer.
doi:
10.1007/978-3-662-49674-9_28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHJL16]
-
B. Bérard, S. Haddad, A. Jovanović, and D. Lime.
Interrupt Timed Automata with Auxiliary Clocks and Parameters.
Fundamenta Informaticae, 143(3-4):235--259, March 2016.
doi:
10.3233/FI-2016-1313.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHL16a]
-
N. Bertrand, S. Haddad, and E. Lefaucheux.
Accurate Approximate Diagnosability of Stochastic Systems.
In Proceedings of the 10th International Conference on
Language and Automata Theory and Applications (LATA'16), volume
9618 of Lecture Notes in Computer Science, pages 549--561, Prague, Czech
Republic, March 2016. Springer.
doi:
10.1007/978-3-319-30000-9_42.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD16a]
-
S. Demri and M. Deters.
Expressive Completeness of Separation Logic With Two Variables
and No Separating Conjunction.
ACM Transactions on Computational Logic, 17(2):12:1--12:44, March
2016.
doi:
10.1145/2835490.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AD16a]
-
P. Arrighi and G. Dowek.
Free fall and cellular automata.
In Proceedings of the 11th International Workshop on
Developments in Computational Models (DCM'15), volume 204 of
Electronic Proceedings in Theoretical Computer Science, pages 1--10, Cali,
Colombia, March 2016.
doi:
10.4204/EPTCS.204.1.
[ BibTex |
DOI |
Web page ]
-
[BGM16]
-
P. Bouyer, P. Gardy, and N. Markey.
On the semantics of Strategy Logic.
Information Processing Letters, 116(2):75--79, February 2016.
doi:
10.1016/j.ipl.2015.10.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HK16]
-
C. Haase and S. Kiefer.
The Complexity of the Kth Largest Subset Problem and Related
Problems.
Information Processing Letters, 116(2):111--115, February 2016.
doi:
10.1016/j.ipl.2015.09.015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS16b]
-
J. Leroux and S. Schmitz.
Ideal Decompositions for Vector Addition Systems.
In Proceedings of the 33rd Annual Symposium on Theoretical
Aspects of Computer Science (STACS'16), volume 47 of Leibniz
International Proceedings in Informatics, pages 1:1--1:13, Orléans,
France, February 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2016.1.
[ BibTex |
DOI |
Web page ]
-
[Sch16b]
-
S. Schmitz.
Complexity Hierarchies Beyond Elementary.
ACM Transactions on Computation Theory, 8(1:3), February 2016.
doi:
10.1145/2858784.
[ BibTex |
DOI |
Web page ]
-
[HH16]
-
C. Haase and P. Hofman.
Tightening the Complexity of Equivalence Problems for
Commutative Grammars.
In Proceedings of the 33rd Annual Symposium on Theoretical
Aspects of Computer Science (STACS'16), volume 47 of Leibniz
International Proceedings in Informatics, pages 41:1--14, Orléans,
France, February 2016. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2016.41.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KNS16]
-
P. Karandikar, M. Niewerth, and Ph. Schnoebelen.
On the state complexity of closures and interiors of regular
languages with subwords and superwords.
Theoretical Computer Science, 610(A):91--107, January 2016.
doi:
10.1016/j.tcs.2015.09.028.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD16b]
-
S. Demri and M. Deters.
Temporal Logics on Strings with Prefix Relation.
Journal of Logic and Computation, 26(3):989--1017, 2016.
doi:
10.1093/logcom/exv028.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFHH16b]
-
M. Blondin, A. Finkel, C. Haase, and S. Haddad.
QCover: an efficient coverability verifier for discrete and
continuous Petri nets, 2016.
[ BibTex |
Web page ]
-
[DH16]
-
S. Delaune and L. Hirschi.
A survey of symbolic methods for establishing equivalence-based
properties in cryptographic protocols.
Journal of Logic and Algebraic Methods in Programming, 87:127--144,
2016.
To appear.
doi:
10.1016/j.jlamp.2016.10.005.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JSD16]
-
F. Jacquemard, L. Segoufin, and J. Dimino.
FO2(<, +1,) on data trees, data tree automata
and branching vector addition systems.
Logical Methods in Computer Science, 12(2):1--28, 2016.
doi:
10.2168/LMCS-12(2:3)2016.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GSSW16]
-
J. Goubault-Larrecq, M. Seisenberger, V. Selivanov, and
A. Weiermann.
Well Quasi-Orders in Computer Science (Dagstuhl
Seminar 16031).
Dagstuhl Reports, 6(1):69--98, January 2016.
doi:
10.4230/DagRep.6.1.69.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KGH+16b]
-
F. Kordon, H. Garavel, L. Hillah, E. Paviot-Adet,
L. Jezequel, C. Rodríguez, and F. Hulin-Hubard.
MCC'2015 - The Fifth Model Checking Contest.
Transactions on Petri Nets and Other Models of Concurrency,
11:262--273, 2016.
doi:
10.1007/978-3-662-53401-4_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ADF+16]
-
P. A. Abdulla, S. Demri, A. Finkel, J. Leroux, and
I. Potapov.
Selected papers of Reachability Problems Workshop 2012
(Bordeaux) and 2013 (Uppsala).
Fundamenta Informaticae, 143(3--4), 2016.
[ BibTex |
Web page ]
-
[LDR+16]
-
A. Le Coënt, F. De Vuyst, C. Rey, L. Chamoin, and
L. Fribourg.
Control of mechanical systems using set-based methods.
International Journal of Dynamics and Control, pages 1--17, 2016.
doi:
10.1007/s40435-016-0245-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD16c]
-
A. Díaz-Caro and G. Dowek.
Quantum superpositions and projective measurement in the lambda
calculus.
Research Report 1601.04294, Computing Research Repository, January
2016.
22 pages.
[ BibTex |
Web page |
PDF ]
-
[Chr16]
-
R. Chrétien.
Analyse automatique de propriétés d'équivalence pour
les protocoles cryptographiques.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2016.
[ BibTex |
Web page |
PDF ]
-
[Sch16a]
-
S. Schmitz.
Automata column: The complexity of reachability in vector
addition systems.
SIGLOG News, 3(1):3--21, January 2016.
doi:
10.1145/2893582.2893585.
[ BibTex |
DOI |
Web page ]
-
[HOW16]
-
C. Haase, J. Ouaknine, and J. Worrell.
Relating Reachability Problems in Timed and Counter Automata.
Fundamenta Informaticae, 143(3-4):317--338, January 2016.
doi:
10.3233/FI-2016-1316.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou16c]
-
J. Goubault-Larrecq.
Les méthodes formelles: l'autre arme de la
cybersécurité.
Encart dans l'article ”S'adapter à la cyberguerre”, de Karen
Elazari, Pour La Science 459, January 2016.
[ BibTex ]
-
[ADJL16a]
-
A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu.
Encoding Proofs in Dedukti: the case of Coq proofs.
In Preliminary Proceedings of the 1st International Workshop on
Hammers for Type Theories (HaTT'16), Coimbra, Portugal, 2016.
[ BibTex |
Web page |
PDF ]
-
[ADJL16b]
-
A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu.
Untyped Confluence in Dependent Type Theories.
In Proceedings of the 8th International Workshop on Higher-Order
Rewriting (HOR'16), Porto, Portugal, 2016.
[ BibTex |
Web page |
PDF ]
-
[ABC+16]
-
A. Assaf, G. Burel, R. Cauderlier, D. Delahaye, G. Dowek,
C. Dubois, F. Gilbert, P. Halmagrand, O. Hermant, and R. Saillard.
Expressing theories in the λΠ-calculus modulo
theory and in the Dedukti system.
In Proceedings of the 22nd International Conference on Types
for Proofs and Programs (TYPES'16), volume 97 of Leibniz International
Proceedings in Informatics, Novi Sad, Serbia, 2016. Leibniz-Zentrum für
Informatik.
To appear.
[ BibTex ]
-
[Dow16]
-
G. Dowek.
Rules and derivations in an elementary logic course.
preprint, January 2016.
[ BibTex |
Web page |
PDF ]
-
[CDGH15]
-
K. Chatterjee, L. Doyen, H. Gimbert, and T. A. Henzinger.
Randomness for free.
Information and Computation, 245:3--16, December 2015.
doi:
10.1016/j.ic.2015.06.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LM15]
-
F. Laroussinie and N. Markey.
Augmenting ATL with strategy contexts.
Information and Computation, 245:98--123, December 2015.
doi:
10.1016/j.ic.2014.12.020.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GHKS15]
-
V. Germanos, S. Haar, V. Khomenko, and S. Schwoon.
Diagnosability under Weak Fairness.
ACM Transactions in Embedded Computing Systems, 14(4:69), December
2015.
doi:
10.1145/2832910.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGH+15]
-
Th. Brihaye, G. Geeraerts, A. Haddad, E. Lefaucheux,
and B. Monmege.
Simple Priced Timed Games Are Not That Simple.
In Proceedings of the 35th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'15),
volume 45 of Leibniz International Proceedings in Informatics, pages
278--292, Bangalore, India, December 2015. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2015.278.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHH+15]
-
S. Böhm, S. Haar, S. Haddad, P. Hofman, and S. Schwoon.
Active Diagnosis with Observable Quiescence.
In Proceedings of the 54th IEEE Conference on Decision and
Control (CDC'15), pages 1663--1668, Osaka, Japan, December 2015. IEEE
Control System Society.
doi:
10.1109/CDC.2015.7402449.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BV15b]
-
D. Berwanger and M. Van den Bogaard.
Games with Delays. A Frankenstein Approach.
In Proceedings of the 35th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'15),
volume 45 of Leibniz International Proceedings in Informatics, pages
307--319, Bangalore, India, December 2015. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2015.307.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS15a]
-
P. Karandikar and Ph. Schnoebelen.
Decidability in the logic of subsequences and supersequences.
In Proceedings of the 35th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'15),
volume 45 of Leibniz International Proceedings in Informatics, pages 84--97,
Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2015.84.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGM15]
-
P. Bouyer, P. Gardy, and N. Markey.
Weighted strategy logic with boolean goals over one-counter
games.
In Proceedings of the 35th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'15),
volume 45 of Leibniz International Proceedings in Informatics, pages 69--83,
Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2015.69.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fra15b]
-
N. Francis.
View-based Query Determinacy and Rewritings over Graph
Databases.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2015.
[ BibTex |
Web page ]
-
[FSS15]
-
N. Francis, L. Segoufin, and C. Sirangelo.
Datalog Rewritings of Regular Path Queries using Views.
Logical Methods in Computer Science, 11(4:14), December 2015.
doi:
10.2168/LMCS-11(4:14)2015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gon15]
-
M. González.
Constructions d'Information Parfaite pour certains Jeux à
Information Imparfaite. Quelques Algorithmes.
Rapport de Master, Université Pierre et Marie Curie, Paris,
France, December 2015.
[ BibTex ]
-
[ABV15]
-
S. Abiteboul, P. Bourhis, and V. Vianu.
Highly Expressive Query Languages for Unordered Data Trees.
Theory of Computing Systems, 57(4):927--966, November 2015.
doi:
10.1007/s00224-015-9617-5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AAD+15]
-
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and
P. Senellart.
Optimal Probabilistic Generation of XML Documents.
Theory of Computing Systems, 57(4):806--842, November 2015.
doi:
10.1007/s00224-014-9581-5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MAS15]
-
D. Montoya, S. Abiteboul, and P. Senellart.
Hup-Me: Inferring and Reconciling a Timeline of User Activity
with Smartphone and Personal Data.
In Proceedings of the 23rd ACM SIGSPATIAL International
Conference on Advances in Geographic Information Systems
(GIS'15), pages 62:1--4, Seattle, Washington, USA, November 2015.
doi:
10.1145/2820783.2820852.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CHH15]
-
D. Chistikov, C. Haase, and S. Halfon.
Context-Free Commutative Grammars with Integer Counters and
Resets.
Research Report 1511-04893, Computing Research Repository, November
2015.
31 pages.
[ BibTex |
Web page |
PDF ]
-
[HT15]
-
S. Haar and S. Theissing.
A Hybrid-Dynamical Model for Passenger-flow in Transportation
Systems.
In Proceedings of the 5th IFAC Conference on Analysis and
Design of Hybrid Systems (ADHS'15), volume 48 of IFAC-PapersOnLine,
pages 236--241, Atlanta, Georgia, USA, October 2015. Elsevier Science
Publishers.
doi:
10.1016/j.ifacol.2015.11.181.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMV15]
-
D. Berwanger, A. B. Mathew, and M. Van den Bogaard.
Hierarchical Information Patterns and Distributed Strategy
Synthesis.
In Proceedings of the 13th International Symposium on
Automated Technology for Verification and Analysis (ATVA'15),
volume 9364 of Lecture Notes in Computer Science, pages 378--393, Shanghai,
China, October 2015. Springer.
doi:
10.1007/978-3-319-24953-7_28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PRC+15]
-
H. Ponce de León, C. Rodríguez, J. Carmona,
K. Heljanko, and S. Haar.
Unfolding-Based Process Discovery.
In Proceedings of the 13th International Symposium on
Automated Technology for Verification and Analysis (ATVA'15),
volume 9364 of Lecture Notes in Computer Science, Shanghai, China, October
2015. Springer.
doi:
10.1007/978-3-319-24953-7_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Loz15]
-
É. Lozes.
A Type-Directed Negation Elimination.
In Proceedings of the 10th Workshop on Fixed Points in
Computer Science (FICS'15), volume 191 of Electronic Proceedings in
Theoretical Computer Science, pages 132--142, Berlin, Germany, September
2015.
doi:
10.4204/EPTCS.191.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dal15]
-
A. Dallon.
Verification of Cryptographic Protocols : a bound on the number
of agents.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2015.
38 pages.
[ BibTex |
Web page |
PDF ]
-
[MDB15]
-
N. Markey, L. Doyen, and D. Berwanger.
Models for large-scale systems.
Cassting deliverable D1.3 (FP7-ICT-601148), September 2015.
17 pages.
[ BibTex |
Web page |
PDF ]
-
[MLB+15b]
-
A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and
K. Barkaoui.
State Space Reduction Strategie for Model Checking Concurrent
C Programs.
In Proceedings of the 9th Workshop on Verification and
Evaluation of Computer and Communication Systems(VECoS'15), volume
1431 of CEUR Workshop Proceedings, pages 65--76, Bucharest, Romania,
September 2015. RWTH Aachen, Germany.
[ BibTex |
Web page |
PDF ]
-
[CCD15c]
-
R. Chrétien, V. Cortier, and S. Delaune.
From security protocols to pushdown automata.
ACM Transactions on Computational Logic, 17(1:3), September 2015.
doi:
10.1145/2811262.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCD15a]
-
R. Chrétien, V. Cortier, and S. Delaune.
Checking trace equivalence: How to get rid of nonces?
In Proceedings of the 20th European Symposium on Research in
Computer Security (ESORICS'15), Lecture Notes in Computer Science,
pages 230--251, Vienna, Austria, September 2015. Springer.
doi:
10.1007/978-3-319-24177-7_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FGM+15]
-
L. Fribourg, É. Goubault, S. Mohamed, M. Mrozek, and
S. Putot.
A Topological Method for Finding Invariants of Continuous
Systems.
In Proceedings of the 9th Workshop on Reachability Problems
in Computational Models (RP'15), volume 9328 of Lecture Notes in
Computer Science, pages 63--75, Warsaw, Poland, September 2015. Springer.
doi:
10.1007/978-3-319-24537-9_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS15a]
-
R. Lazić and S. Schmitz.
The Ideal View on Rackoff's Coverability Technique.
In Proceedings of the 9th Workshop on Reachability Problems
in Computational Models (RP'15), volume 9328 of Lecture Notes in
Computer Science, pages 76--88, Warsaw, Poland, September 2015. Springer.
doi:
10.1007/978-3-319-24537-9_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHP+15]
-
B. Bérard, S. Haddad, C. Picaronny, M. Safey El Din,
and M. Sassolas.
Polynomial Interrupt Timed Automata.
In Proceedings of the 9th Workshop on Reachability Problems
in Computational Models (RP'15), volume 9328 of Lecture Notes in
Computer Science, pages 20--32, Warsaw, Poland, September 2015. Springer.
doi:
10.1007/978-3-319-24537-9_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFM15]
-
P. Bouyer, E. Fang, and N. Markey.
Permissive strategies in timed automata and games.
In Proceedings of the 15th International Workshop on
Automated Verification of Critical Systems (AVoCS'15), volume 72 of
Electronic Communications of the EASST, Edinburgh, UK, September 2015.
European Association of Software Science and Technology.
doi:
10.14279/tuj.eceasst.72.1015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bol15c]
-
B. Bollig.
Towards Formal Verification of Distributed Algorithms.
In Proceedings of the 22nd International Symposium on
Temporal Representation and Reasoning (TIME'15), page 3, Kassel,
Germany, September 2015. IEEE Computer Society Press.
doi:
10.1109/TIME.2015.23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RG15]
-
K. Rafes and C. Germain.
A platform for scientific data sharing.
In Actes de la 31ème Conférence sur la Gestion de
Données -- Principes, Technologies et Applications (BDA'15),
Île de Porquerolles, France, September 2015.
[ BibTex |
Web page |
PDF ]
-
[BMR+15]
-
P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and
S. Laursen.
Average-energy games.
In Proceedings of the 6th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'15), volume 193
of Electronic Proceedings in Theoretical Computer Science, pages 1--15,
Genova, Italy, September 2015.
doi:
10.4204/EPTCS.193.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LMS15]
-
F. Laroussinie, N. Markey, and A. Sangnier.
ATL_sc with partial observation.
In Proceedings of the 6th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'15), volume 193
of Electronic Proceedings in Theoretical Computer Science, pages 43--57,
Genova, Italy, September 2015.
doi:
10.4204/EPTCS.193.4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDS15]
-
D. Baelde, A. Doumane, and A. Saurin.
Least and Greatest Fixed Points in Ludics.
In Proceedings of the 24th Annual EACSL Conference on
Computer Science Logic (CSL'15), volume 41 of Leibniz International
Proceedings in Informatics, pages 549--566, Berlin, Germany, September 2015.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2015.549.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMPS15]
-
P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber.
Timed automata abstraction of switched dynamical systems using
control funnels.
In Proceedings of the 13th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268
of Lecture Notes in Computer Science, pages 60--75, Madrid, Spain, September
2015. Springer.
doi:
10.1007/978-3-319-22975-1_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AM15]
-
É. André and N. Markey.
Language Preservation Problems in Parametric Timed Automata.
In Proceedings of the 13th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268
of Lecture Notes in Computer Science, pages 27--43, Madrid, Spain, September
2015. Springer.
doi:
10.1007/978-3-319-22975-1_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABG15]
-
C. Aiswarya, B. Bollig, and P. Gastin.
An Automata-Theoretic Approach to the Verification of
Distributed Algorithms.
In Proceedings of the 26th International Conference on
Concurrency Theory (CONCUR'15), volume 42 of Leibniz International
Proceedings in Informatics, pages 340--353, Madrid, Spain, September 2015.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2015.340.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDH15]
-
D. Baelde, S. Delaune, and L. Hirschi.
Partial Order Reduction for Security Protocols.
In Proceedings of the 26th International Conference on
Concurrency Theory (CONCUR'15), volume 42 of Leibniz International
Proceedings in Informatics, pages 497--510, Madrid, Spain, September 2015.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2015.497.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BJM15]
-
P. Bouyer, S. Jaziri, and N. Markey.
On the Value Problem in Weighted Timed Games.
In Proceedings of the 26th International Conference on
Concurrency Theory (CONCUR'15), volume 42 of Leibniz International
Proceedings in Informatics, pages 311--324, Madrid, Spain, September 2015.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CONCUR.2015.311.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDK15]
-
D. Baelde, S. Delaune, and S. Kremer.
Decision procedures for equivalence based properties
(part II).
Deliverable VIP 3.2 (ANR-11-JS02-0006), September 2015.
9 pages.
[ BibTex |
Web page |
PDF ]
-
[DK15]
-
S. Delaune and S. Kremer.
Composition results for equivalence-based security properties.
Deliverable VIP 3.1 (ANR-11-JS02-0006), September 2015.
6 pages.
[ BibTex |
Web page |
PDF ]
-
[PS15]
-
Th. Place and L. Segoufin.
Deciding definability in
FO^2(<_h,<_v) on trees.
Logical Methods in Computer Science, 11(3:5), September 2015.
doi:
10.2168/LMCS-11(3:5)2015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DS15]
-
A. Dawar and L. Segoufin.
Capturing MSO with one quantifier.
In Fields of Logic and Computation II -- Essays Dedicated to Yuri
Gurevich on the Occasion of His 75th Birthday, volume 9300 of Lecture Notes
in Computer Science, pages 142--152. Springer, September 2015.
doi:
10.1007/978-3-319-23534-9_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Abi15]
-
S. Abiteboul.
The Story of Webdamlog.
In Proceedings of the 19th East-European Conference on
Advances in Databases and Information Systems (ADBIS'15), Poitiers,
France, September 2015.
[ BibTex |
Web page |
PDF ]
-
[For15]
-
M. Fortin.
Verification of distributed systems with parameterized network
topology.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2015.
[ BibTex ]
-
[LL15]
-
M. Lange and É. Lozes.
Conjunctive Visibly-Pushdown Path Queries.
In Proceedings of the 20th International Symposium on
Fundamentals of Computation Theory (FCT'15), volume 9210 of Lecture
Notes in Computer Science, pages 327--338, Gdańsk, Poland, August 2015.
Springer.
doi:
10.1007/978-3-319-22177-9_25.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGMK15]
-
S. Akshay, P. Gastin, M. Mukund, and K. N. Kumar.
Checking conformance for time-constrained scenario-based
specifications.
Theoretical Computer Science, 594:24--43, August 2015.
doi:
10.1016/j.tcs.2015.03.030.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bou15]
-
P. Bouyer.
On the optimal reachability problem in weighted timed automata
and games.
In Proceedings of the 7th Workshop on Non-Classical Models
of Automata and Applications (NCMA'15), volume 318 of books@ocg.at,
pages 11--36, Porto, Portugal, August 2015. Austrian Computer Society.
[ BibTex |
Web page |
PDF ]
-
[Bol15a]
-
B. Bollig.
Automata and Logics for Concurrent Systems: Five Models in Five
Pages.
In Proceedings of the 20th International Conference on
Implementation and Application of Automata (CIAA'15), volume 9223 of
Lecture Notes in Computer Science, pages 3--12, Umeå, Sweden, August
2015. Springer-Verlag.
doi:
10.1007/978-3-319-22360-5_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBD+15]
-
P. Ballarini, B. Barbot, M. Duflot, S. Haddad, and
N. Pekergin.
HASL: A New Approach for Performance Evaluation and Model
Checking from Concepts to Experimentation.
Performance Evaluation, 90:53--77, August 2015.
doi:
10.1016/j.peva.2015.04.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou15b]
-
J. Goubault-Larrecq.
Formal balls.
Invited talk, Domains XII workshop, Cork, Ireland, August 2015.
[ BibTex ]
-
[Rei15]
-
J. Reichert.
Décidabilité et complexité de jeux
d'accessibilité sur des systèmes à compteurs.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2015.
[ BibTex |
Web page |
PDF ]
-
[BV15a]
-
D. Berwanger and M. Van den Bogaard.
Consensus Game Acceptors.
In Proceedings of the 19th International Conference on
Developments in Language Theory (DLT'15), volume 9168 of Lecture
Notes in Computer Science, pages 108--119, Liverpool, UK, July 2015.
Springer.
doi:
10.1007/978-3-319-21500-6_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HPRV15]
-
S. Haar, S. Perchy, C. Rueda, and F. Valencia.
An Algebraic View of SpaceashBelief and
ExtrusionashUtterance for ConcurrencyashEpistemic Logic.
In Proceedings of the 17th International Conference on
Principles and Practice of Declarative Programming (PPDP'15), pages
161--172, Siena, Italy, July 2015. ACM Press.
doi:
10.1007/978-3-319-19488-2_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDV15]
-
K. Chatterjee, L. Doyen, and M. Vardi.
The Complexity of Synthesis from Probabilistic Components.
In Proceedings of the 42nd International Colloquium on
Automata, Languages and Programming (ICALP'15) -- Part II, volume
9135 of Lecture Notes in Computer Science, pages 108--120, Kyoto, Japan, July
2015. Springer.
doi:
10.1007/978-3-662-47666-6_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JLS15]
-
M. Jurdziński, R. Lazić, and S. Schmitz.
Fixed-Dimensional Energy Games are in Pseudo Polynomial Time.
In Proceedings of the 42nd International Colloquium on
Automata, Languages and Programming (ICALP'15) -- Part II, volume
9135 of Lecture Notes in Computer Science, pages 260--272, Kyoto, Japan, July
2015. Springer.
doi:
10.1007/978-3-662-47666-6_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCD15b]
-
R. Chrétien, V. Cortier, and S. Delaune.
Decidability of trace equivalence for protocols with nonces.
In Proceedings of the 28th IEEE Computer Security
Foundations Symposium (CSF'15), pages 170--184, Verona, Italy, July
2015. IEEE Computer Society Press.
doi:
10.1109/CSF.2015.19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RRS15a]
-
M. Randour, J.-F. Raskin, and O. Sankur.
Percentile Queries in Multi-Dimensional Markov Decision
Processes.
In Proceedings of the 27th International Conference on
Computer Aided Verification (CAV'15) -- Part I, volume 9206 of
Lecture Notes in Computer Science, pages 123--139, San Francisco, CA, USA,
July 2015. Springer.
doi:
10.1007/978-3-319-21690-4_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HK15]
-
C. Haase and S. Kiefer.
The Odds of Staying on Budget.
In Proceedings of the 42nd International Colloquium on
Automata, Languages and Programming (ICALP'15) -- Part II, volume
9135 of Lecture Notes in Computer Science, pages 234--246, Kyoto, Japan, July
2015. Springer.
doi:
10.1007/978-3-662-47666-6_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DGG15]
-
J. Dubut, É. Goubault, and J. Goubault-Larrecq.
Natural Homology.
In Proceedings of the 42nd International Colloquium on
Automata, Languages and Programming (ICALP'15) -- Part II, volume
9135 of Lecture Notes in Computer Science, pages 171--183, Kyoto, Japan, July
2015. Springer.
doi:
10.1007/978-3-662-47666-6_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS15c]
-
J. Leroux and S. Schmitz.
Demystifying Reachability in Vector Addition Systems.
In Proceedings of the 30th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'15), pages 56--67, Kyoto, Japan,
July 2015. IEEE Press.
doi:
10.1109/LICS.2015.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFG+15]
-
M. Blondin, A. Finkel, S. Göller, C. Haase, and
P. McKenzie.
Reachability in Two-Dimensional Vector Addition Systems with
States is PSPACE-Complete.
In Proceedings of the 30th Annual ACM/IEEE Symposium on
Logic In Computer Science (LICS'15), pages 32--43, Kyoto, Japan,
July 2015. IEEE Press.
doi:
10.1109/LICS.2015.14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS15b]
-
R. Lazić and S. Schmitz.
Non-Elementary Complexities for Branching VASS, MELL, and
Extensions.
ACM Transactions on Computational Logic, 16(3:20), July 2015.
doi:
10.1145/2733375.
[ BibTex |
DOI |
Web page |
PDF ]
-
[APS15]
-
K. Athanasiou, H. Ponce de León, and S. Schwoon.
Test Case Generation for Concurrent Systems Using Event
Structures.
In Proceedings of the 9th International Conference on Tests
and Proofs (TAP'15), volume 9154 of Lecture Notes in Computer Science,
pages 19--37, L'Aquila, Italy, July 2015. Springer.
doi:
10.1007/978-3-319-21215-9_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBMU15]
-
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels.
Pure Nash Equilibria in Concurrent Games.
Logical Methods in Computer Science, 11(2:9), June 2015.
doi:
10.2168/LMCS-11(2:9)2015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CLMT15]
-
K. Chatterjee, S. Lafortune, N. Markey, and W. Thomas.
Non-Zero-Sum-Games and Control (Dagstuhl Seminar 15061).
Dagstuhl Reports, 5(2):1--25, June 2015.
doi:
10.4230/DagRep.5.2.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bol15b]
-
B. Bollig.
Automata and Logics for Concurrent Systems: Realizability and
Verification.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, June 2015.
[ BibTex |
Web page |
PDF ]
-
[BHHP15]
-
B. Barbot, S. Haddad, M. Heiner, and C. Picaronny.
Rare Event Handling in Signalling Cascades.
International Journal on Advances in Systems and Measurements,
8(1-2):69--79, June 2015.
[ BibTex |
Web page |
PDF ]
-
[RNG15]
-
K. Rafes, J. Nauroy, and C. Germain.
Certifying the interoperability of RDF database systems.
In Proceedings of the 2nd Workshop on Linked Data Quality
(LDQ'15), volume 1376 of CEUR Workshop Proceedings, Portorož,
Slovenia, June 2015. RWTH Aachen, Germany.
[ BibTex |
Web page |
PDF ]
-
[ACR15]
-
É. André, Th. Chatain, and
C. Rodríguez.
Preserving Partial Order Runs in Parametric Time Petri Nets.
In Proceedings of the 15th International Conference on
Application of Concurrency to System Design (ACSD'15), pages
120--129, Brussels, Belgium, June 2015. IEEE Computer Society Press.
doi:
10.1109/ACSD.2015.16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CHKS15]
-
Th. Chatain, S. Haar, M. Koutny, and S. Schwoon.
Non-Atomic Transition Firing in Contextual Nets.
In Proceedings of the 36th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'15), volume 9115
of Lecture Notes in Computer Science, pages 117--136, Brussels, Belgium, June
2015. Springer.
doi:
10.1007/978-3-319-19488-2_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDS15]
-
S. Demri, A. K. Dhar, and A. Sangnier.
Taming Past LTL and Flat Counter Systems.
Information and Computation, 242:306--339, June 2015.
doi:
10.1016/j.ic.2015.03.007.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDRR15]
-
K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin.
Looking at Mean-Payoff and Total-Payoff through Windows.
Information and Computation, 242:25--52, June 2015.
doi:
10.1016/j.ic.2015.03.010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BtCS15]
-
V. Bárány, B. ten Cate, and L. Segoufin.
Guarded nagation.
Journal of the ACM, 62(3:22), June 2015.
doi:
10.1145/2701414.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HM15]
-
S. Haar and R. Meyer, editors.
Proceedings of the 15th International Conference on
Application of Concurrency to System Design (ACSD'15), Brussels,
Belgium, June 2015. IEEE Computer Society Press.
[ BibTex |
Web page ]
-
[KGH+15]
-
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard,
A. Linard, M. Beccuti, A. Hamez, E. Lopez-Bobeda, L. Jezequel, J. Meijer,
E. Paviot-Adet, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, and
K. Wolf.
Complete Results for the 2015 Edition of the Model Checking
Contest, June 2015.
[ BibTex |
Web page ]
-
[FL15]
-
A. Finkel and J. Leroux.
Recent and simple algorithms for Petri nets.
Software & System Modeling, 14(2):719--725, May 2015.
doi:
10.1007/s10270-014-0426-0.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS15b]
-
P. Karandikar and Ph. Schnoebelen.
Generalized Post Embedding Problems.
Theory of Computing Systems, 56(4):697--716, May 2015.
doi:
10.1007/s00224-014-9561-9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MD15]
-
N. Markey and A. Delaborde.
Annual report for Year 2.
Cassting deliverable D6.3 (FP7-ICT-601148), May 2015.
34 pages.
[ BibTex ]
-
[ADE+15]
-
S. Abiteboul, X. L. Dong, O. Etzioni, D. Srivastava,
G. Weikum, J. Stoyanovich, and F. M. Suchanek.
The elephant in the room: getting value from Big Data.
In Proceedings of the 18th International Workshop on the Web
and Databases (WebDB'15), pages 1--5, Melbourne, Australia, May 2015.
ACM Press.
doi:
10.1145/2767109.2770014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MSAM15]
-
V. Z. Moffitt, J. Stoyanovich, S. Abiteboul, and G. Miklau.
Collaborative Access Control in WebdamLog.
In Proceedings of the ACM SIGMOD Internaitonal Conference
on Management of Data (SIGMOD'15), pages 197--211, Melbourne,
Australia, May-June 2015. ACM Press.
doi:
10.1109/DSAA.2015.7344775.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AAK15]
-
S. Abiteboul, B. André, and D. Kaplan.
Managing your digital life.
Communications of the ACM, 58(5):32--35, May 2015.
doi:
10.1145/2670528.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GLSM15]
-
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk.
Etat d'avancement intermédiaire des travaux engagés sur
OrchIDS.
Rapport intermédiaire du contrat DGA-INRIA Orchids, May 2015.
[ BibTex ]
-
[JKS15]
-
P. Jancar, P. Karandikar, and Ph. Schnoebelen.
On Reachability for Unidirectional Channel Systems Extended with
Regular Tests.
Logical Methods in Computer Science, 11(2:2), April 2015.
doi:
10.2168/LMCS-11(2:2)2015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KKS15]
-
P. Karandikar, M. Kufleitner, and Ph. Schnoebelen.
On the index of Simon's congruence for piecewise testability.
Information Processing Letters, 15(4):515--519, April 2015.
doi:
10.1016/j.ipl.2014.11.008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FKM15]
-
L. Fribourg, U. Kühne, and N. Markey.
Game-based Synthesis of Distributed Controllers for Sampled
Switched Systems.
In Proceedings of the 2nd International Workshop on Synthesis
of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series
in Informatics, pages 47--61, London, UK, April 2015. Leibniz-Zentrum für
Informatik.
doi:
10.4230/OASIcs.SynCoP.2015.47.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LDR+15]
-
A. Le Coënt, F. De Vuyst, Ch. Rey,
L. Chamoin, and L. Fribourg.
Guaranteed control of switched control systems using model order
reduction and state-space bisection.
In Proceedings of the 2nd International Workshop on Synthesis
of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series
in Informatics, pages 32--46, London, UK, April 2015. Leibniz-Zentrum für
Informatik.
doi:
10.4230/OASIcs.SynCoP.2015.32.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD15]
-
M. Arapinis, V. Cheval, and S. Delaune.
Composing security protocols: from confidentiality to privacy.
In Proceedings of the 4th International Conference on
Principles of Security and Trust (POST'15), volume 9036 of Lecture
Notes in Computer Science, pages 324--343, London, UK, April 2015. Springer.
doi:
10.1007/978-3-662-46666-7_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[VCD+15]
-
Y. Velner, K. Chatterjee, L. Doyen, T. A. Henzinger, A. M.
Rabinovich, and J.-F. Raskin.
The complexity of multi-mean-payoff and multi-energy games.
Information and Computation, 241:177--196, April 2015.
doi:
10.1016/j.ic.2015.03.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LV15]
-
É. Lozes and J. Villard.
Shared contract-obedient channels.
Science of Computer Programming, 100:28--60, March 2015.
doi:
10.1016/j.scico.2014.09.008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GDML15]
-
G. Geeraerts, S. Dehouck, N. Markey, and K. G. Larsen.
Efficient algorithms for multi-player games with quantitative
aspects.
Cassting deliverable D2.1 (FP7-ICT-601148), March 2015.
22 pages.
[ BibTex |
Web page |
PDF ]
-
[DD15b]
-
S. Demri and M. Deters.
Two-variable separation logic and its inner circle.
ACM Transactions on Computational Logic, 16(2:15), March 2015.
doi:
10.1145/2724711.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KV15]
-
A. Koutsos and V. Vianu.
Process-Centric Views of Data-Driven Business Artifacts.
In Proceedings of the 18th International Conference on
Database Theory (ICDT'15), volume 31 of Leibniz International
Proceedings in Informatics, pages 247--264, Brussels, Belgium, March 2015.
Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.ICDT.2015.247.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fra15a]
-
N. Francis.
Asymptotic Determinacy of Path Queries using Union-of-Paths
Views.
In Proceedings of the 18th International Conference on
Database Theory (ICDT'15), volume 31 of Leibniz International
Proceedings in Informatics, pages 44--59, Brussels, Belgium, March 2015.
Leibniz-Zentrum für Informatik.
Best student paper award.
doi:
10.4230/LIPIcs.ICDT.2015.44.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GJL15]
-
S. Göller, J. C. Jung, and M. Lohrey.
The Complexity of Decomposing Modal and First-Order Theories.
ACM Transactions on Computational Logic, 16(1:9), March 2015.
doi:
10.1145/2699918.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Seg15]
-
L. Segoufin.
Constant Delay Enumeration for Conjunctive Queries.
SIGMOD Records, 44(1):10--17, March 2015.
doi:
10.1145/2783888.2783894.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Kar15]
-
P. Karandikar.
Subwords: automata, embedding problems, and verification.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France and Chennai Mathematical Institute,
India, February 2015.
[ BibTex |
Web page |
PDF ]
-
[Gou15c]
-
J. Goubault-Larrecq.
Full Abstraction for Non-Deterministic and Probabilistic
Extensions of PCF I: the Angelic Cases.
Journal of Logic and Algebraic Methods in Programming,
84(1):155--184, January 2015.
doi:
10.1016/j.jlamp.2014.09.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMS15]
-
P. Bouyer, N. Markey, and O. Sankur.
Robust Reachability in Timed Automata and Games: A Game-based
Approach.
Theoretical Computer Science, 563:43--74, January 2015.
doi:
10.1016/j.tcs.2014.08.014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou15a]
-
J. Goubault-Larrecq.
A short proof of the Schröder-Simpson theorem.
Mathematical Structures in Computer Science, 25(1):1--5, January
2015.
doi:
10.1017/S0960129513000467.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KDH15]
-
M. Koutny, J. Desel, and S. Haddad, editors.
Transactions on Petri Nets and Other Models of
Concurrency X, volume 9410 of Lecture Notes in Computer Science. Springer,
2015.
[ BibTex |
Web page ]
-
[MLB+15a]
-
A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and
K. Barkaoui.
Specifying and Verifying Concurrent C Programs with TLA+.
In Proceedings of the 3rd International Workshop on Formal
Techniques for Safety-Critical Systems, Nov. 2014 (FTSCS'14),
volume 476 of Communications in Computer and Information Science, pages
206--222, Luxembourg, 2015. Springer.
doi:
10.1007/978-3-319-17581-2_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FH15]
-
E. Fraca and S. Haddad.
Complexity Analysis of Continuous Petri Nets.
Fundamenta Informaticae, 137(1):1--28, 2015.
doi:
10.3233/FI-2015-1168.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BH15]
-
N. Bertrand and S. Haddad.
Contrôle, probabilités et observation partielle.
In Informatique Mathématique. Une photographie en 2015,
chapter 5, pages 177--227. CNRS Éditions, 2015.
[ BibTex |
Web page |
PDF ]
-
[Sce15]
-
G. Scerri.
Proofs of security protocols revisited.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2015.
[ BibTex |
Web page |
PDF ]
-
[DD15a]
-
S. Demri and M. Deters.
Separation Logics and Modalities: A Survey.
Journal of Applied Non-Classical Logics, 25(1):50--99, 2015.
doi:
10.1080/11663081.2015.1018801.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RRS15b]
-
M. Randour, J.-F. Raskin, and O. Sankur.
Variations on the Stochastic Shortest Path Problem.
In Proceedings of the 16th International Conference on
Verification, Model Checking and Abstract Interpretation
(VMCAI'15), volume 8931 of Lecture Notes in Computer Science, pages 1--18,
Mumbai, India, January 2015. Springer.
doi:
10.1007/978-3-662-46081-8_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFCH14]
-
M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and
S. Haddad.
Computing Optimal Repair Strategies by Means of NdRFT Modeling
and Analysis.
The Computer Journal, 57(12):1870--1892, December 2014.
doi:
10.1093/comjnl/bxt134.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GLS14]
-
A. Gheerbrant, L. Libkin, and C. Sirangelo.
Naïve Evaluation of Queries over Incomplete Databases.
ACM Transactions on Database Systems, 39(4:31), December 2014.
doi:
10.1145/2691190.2691194.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sir14]
-
C. Sirangelo.
Representing and querying incomplete information: a data
interoperability perspective.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, December 2014.
[ BibTex |
Web page |
PDF ]
-
[LLV14]
-
M. Lange, É. Lozes, and M. Vargas Guzmán.
Model-checking process equivalences.
Theoretical Computer Science, 560(3):326--347, December 2014.
doi:
10.1016/j.tcs.2014.08.020.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHLM14]
-
B. Bollig, P. Habermehl, M. Leucker, and B. Monmege.
A Robust Class of Data Languages and an Application to
Learning.
Logical Methods in Computer Science, 10(4:19), December 2014.
doi:
10.2168/LMCS-10(4:19)2014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HSS14]
-
C. Haase, S. Schmitz, and Ph. Schnoebelen.
The Power of Priority Channel Systems.
Logical Methods in Computer Science, 10(4:4), December 2014.
doi:
10.2168/LMCS-10(4:4)2014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AG14]
-
C. Aiswarya and P. Gastin.
Reasoning about distributed systems: WYSIWYG.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages 11--30,
New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHL14]
-
N. Bertrand, S. Haddad, and E. Lefaucheux.
Foundation of Diagnosis and Predictability in Probabilistic
Systems.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages
417--429, New Dehli, India, December 2014. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.417.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGK14]
-
B. Bollig, P. Gastin, and A. Kumar.
Parameterized Communicating Automata: Complementation and Model
Checking.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages
625--637, New Dehli, India, December 2014. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.625.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CMS14]
-
R. Chadha, U. Mathur, and S. Schwoon.
Computing Information Flow Using Symbolic Model-Checking.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages
505--516, New Dehli, India, December 2014. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.505.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DFM14]
-
C. David, N. Francis, and F. Murlak.
Consistency of injective tree patterns.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages
279--290, New Dehli, India, December 2014. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.279.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DJL+14]
-
L. Doyen, L. Juhl, K. G. Larsen, N. Markey, and
M. Shirmohammadi.
Synchronizing words for weighted and timed automata.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages
121--132, New Dehli, India, December 2014. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.121.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMS14]
-
P. Bouyer, N. Markey, and D. Stan.
Mixed Nash Equilibria in Concurrent Games.
In Proceedings of the 34th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'14),
volume 29 of Leibniz International Proceedings in Informatics, pages
351--363, New Dehli, India, December 2014. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2014.351.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBB+14]
-
N. Bertrand, P. Bouyer, Th. Brihaye, Q. Menet,
C. Baier, M. Größer, and M. Jurdziński.
Stochastic Timed Automata.
Logical Methods in Computer Science, 10(4:6), December 2014.
doi:
10.2168/LMCS-10(4:6)2014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCGZ14]
-
B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun.
Temporal logics for concurrent recursive programs:
Satisfiability and model checking.
Journal of Applied Logic, 12(4):395--416, December 2014.
doi:
10.1016/j.jal.2014.05.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDR14]
-
V. Cheval, S. Delaune, and M. D. Ryan.
Tests for establishing security properties.
In Revised Selected Papers of the 9th Symposium on
Trustworthy Global Computing (TGC'14), volume 8902 of Lecture Notes
in Computer Science, pages 82--96, Rome, Italy, December 2014. Springer.
doi:
10.1007/978-3-662-45917-1_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FKS14]
-
L. Fribourg, U. Kühne, and R. Soulat.
Finite Controlled Invariants for Sampled Switched Systems.
Formal Methods in System Design, 45(3):303--329, December 2014.
doi:
10.1007/s10703-014-0211-2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LM14]
-
F. Laroussinie and N. Markey.
Quantified CTL: Expressiveness and Complexity.
Logical Methods in Computer Science, 10(4:17), December 2014.
doi:
10.2168/LMCS-10(4:17)2014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Shi14]
-
M. Shirmohammadi.
Qualitative Analysis of Synchronizing Probabilistic Systems.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France and Université Libre de Bruxelles,
Belgium, December 2014.
[ BibTex |
Web page |
PDF ]
-
[Gou14a]
-
J. Goubault-Larrecq.
Détection d'intrusions avec OrchIDS.
Matinale de l'innovation Logiciels Libres et Sécurité, Paris,
France, December 2014.
[ BibTex ]
-
[GPPS14]
-
C. Gardent, G. Perrier, Y. Parmentier, and S. Schmitz.
Lexical Disambiguation in LTAG using Left Context.
In Proceedings of the 5th Language & Technology Conference
(LTC'11), volume 8387 of Lecture Notes in Artificial Intelligence,
Poznań, Poland, November 2014. Springer.
[ BibTex |
Web page ]
-
[BC14]
-
G. Bana and H. Comon-Lundh.
A Computationally Complete Symbolic Attacker for Equivalence
Properties.
In Proceedings of the 21st ACM Conference on Computer and
Communications Security (CCS'14), pages 609--620, Scottsdale, Arizona,
USA, November 2014. ACM Press.
doi:
10.1145/2660267.2660276.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Pon14]
-
H. Ponce de León.
Testing Concurrent Systems Through Event Structures.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2014.
[ BibTex |
Web page |
PDF ]
-
[Bar14]
-
B. Barbot.
Acceleration for Statistical Model Checking.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2014.
[ BibTex |
Web page |
PDF ]
-
[CHJ+14]
-
Th. Chatain, S. Haar, L. Jezequel, L. Paulevé,
and S. Schwoon.
Characterization of Reachable Attractors Using Petri Net
Unfoldings.
In Proceedings of the 12th Conference on Computational
Methods in System Biology (CMSB'14), volume 8859 of Lecture Notes in
Bioinformatics, pages 129--142, Manchester, UK, November 2014.
Springer-Verlag.
doi:
10.1007/978-3-319-12982-2_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PHL14b]
-
H. Ponce de León, S. Haar, and D. Longuet.
Model-Based Testing for Concurrent Systems with Labeled Event
Structures.
Software Testing, Verification and Reliability, 24(7):558--590,
November 2014.
doi:
10.1002/stvr.1543.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGNK14]
-
C. Aiswarya, P. Gastin, and K. Narayan Kumar.
Verifying Communicating Multi-pushdown Systems via Split-width.
In Proceedings of the 12th International Symposium on
Automated Technology for Verification and Analysis (ATVA'14),
volume 8837 of Lecture Notes in Computer Science, pages 1--17, Sydney,
Australia, November 2014. Springer.
doi:
10.1007/978-3-319-11936-6_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGM14]
-
P. Bouyer, P. Gardy, and N. Markey.
Quantitative verification of weighted Kripke structures.
In Proceedings of the 12th International Symposium on
Automated Technology for Verification and Analysis (ATVA'14),
volume 8837 of Lecture Notes in Computer Science, pages 64--80, Sydney,
Australia, November 2014. Springer.
doi:
10.1007/978-3-319-11936-6_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MV14b]
-
N. Markey and S. Vester.
Symmetry Reduction in Infinite Games with Finite Branching.
In Proceedings of the 12th International Symposium on
Automated Technology for Verification and Analysis (ATVA'14),
volume 8837 of Lecture Notes in Computer Science, pages 281--296, Sydney,
Australia, November 2014. Springer.
doi:
10.1007/978-3-319-11936-6_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD14]
-
M. Arnaud, V. Cortier, and S. Delaune.
Modeling and Verifying Ad Hoc Routing Protocols.
Information and Computation, 238:30--67, November 2014.
doi:
10.1016/j.ic.2014.07.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCD14]
-
S. Bursuc, H. Comon-Lundh, and S. Delaune.
Deducibility constraints and blind signatures.
Information and Computation, 238:106--127, November 2014.
doi:
10.1016/j.ic.2014.07.006.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KNS14]
-
P. Karandikar, M. Niewerth, and Ph. Schnoebelen.
On the state complexity of closures and interiors of regular
languages with subwords.
Research Report 1406.0690, Computing Research Repository, November
2014.
24 pages.
[ BibTex |
Web page |
PDF ]
-
[MCGS14]
-
N. Markey, N. Chaturvedi, G. Geeraerts, and J. Srba.
Efficient strategy synthesis for complex objectives.
Cassting deliverable D2.4 (FP7-ICT-601148), October 2014.
20 pages.
[ BibTex |
Web page |
PDF ]
-
[BHHP14]
-
B. Barbot, S. Haddad, M. Heiner, and C. Picaronny.
Rare Event Handling in Signalling Cascades.
In Proceedings of the 6th International Conference on
Advances in System Simulation (SIMUL'14), pages 126--131, Nice,
France, October 2014. XPS.
[ BibTex |
Web page |
PDF ]
-
[AFG14]
-
S. Abiteboul, L. Fribourg, and J. Goubault-Larrecq.
Gérard Berry : un informaticien médaille d'or du
CNRS 2014.
1024 -- Bulletin de la société informatique de France,
4:139--142, October 2014.
[ BibTex |
Web page |
PDF ]
-
[MA14]
-
D. Montoya and S. Abiteboul.
Inférence d'itinéraires multimodaux à partir de
données smartphone.
In Actes de la 30ème Conférence sur la Gestion de
Données -- Principes, Technologies et Applications (BDA'14),
pages 38--42, Autrans, France, October 2014.
[ BibTex |
Web page |
PDF ]
-
[Lef14]
-
E. Lefaucheux.
Détection de fautes dans les systèmes probabilistes.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2014.
35 pages.
[ BibTex |
Web page |
PDF ]
-
[Dub14]
-
J. Dubut.
Homologie dirigée.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2014.
35 pages.
[ BibTex |
Web page |
PDF ]
-
[Hal14]
-
S. Halfon.
Non Primitive Recursive Complexity Classes.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2014.
21 pages.
[ BibTex |
Web page |
PDF ]
-
[DDS14]
-
S. Demri, A. K. Dhar, and A. Sangnier.
Equivalence Between Model-Checking Flat Counter Systems and
Presburger Arithmetic.
In Proceedings of the 8th Workshop on Reachability Problems
in Computational Models (RP'14), volume 8762 of Lecture Notes in
Computer Science, pages 85--97, Oxford, UK, September 2014. Springer.
doi:
10.1007/978-3-319-11439-2_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD14c]
-
R. Chrétien and S. Delaune.
Le bitcoin, une monnaie 100% numérique.
Interstices, September 2014.
[ BibTex |
Web page |
PDF ]
-
[Sch14a]
-
S. Schmitz.
Complexity Bounds for Ordinal-Based Termination.
In Proceedings of the 8th Workshop on Reachability Problems
in Computational Models (RP'14), volume 8762 of Lecture Notes in
Computer Science, pages 1--19, Oxford, UK, September 2014. Springer.
doi:
10.1007/978-3-319-11439-2_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGS14]
-
B. Bollig, P. Gastin, and J. Schubert.
Parameterized Verification of Communicating Automata under
Context Bounds.
In Proceedings of the 8th Workshop on Reachability Problems
in Computational Models (RP'14), volume 8762 of Lecture Notes in
Computer Science, pages 45--57, Oxford, UK, September 2014. Springer.
doi:
10.1007/978-3-319-11439-2_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HM14]
-
S. Haddad and B. Monmege.
Reachability in MDPs: Refining Convergence of Value
Iteration.
In Proceedings of the 8th Workshop on Reachability Problems
in Computational Models (RP'14), volume 8762 of Lecture Notes in
Computer Science, pages 125--137, Oxford, UK, September 2014. Springer.
doi:
10.1007/978-3-319-11439-2_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS14b]
-
J. Leroux and Ph. Schnoebelen.
On Functions Weakly Computable by Petri Nets and Vector
Addition Systems.
In Proceedings of the 8th Workshop on Reachability Problems
in Computational Models (RP'14), volume 8762 of Lecture Notes in
Computer Science, pages 190--202, Oxford, UK, September 2014. Springer.
doi:
10.1007/978-3-319-11439-2_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HH14]
-
C. Haase and S. Halfon.
Integer Vector Addition Systems with States.
In Proceedings of the 8th Workshop on Reachability Problems
in Computational Models (RP'14), volume 8762 of Lecture Notes in
Computer Science, pages 112--124, Oxford, UK, September 2014. Springer.
doi:
10.1007/978-3-319-11439-2_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMP14]
-
L. Brandán Briones, A. Madalinski, and H. Ponce
de León.
Distributed Diagnosability Analysis with Petri Nets.
In Proceedings of the 25th International Workshop on
Principles of Diagnosis (DX'14), Graz, Austria, September 2014.
[ BibTex |
Web page |
PDF ]
-
[CGNK14]
-
A. Cyriac, P. Gastin, and K. Narayan Kumar.
Controllers for the Verification of Communicating Multi-Pushdown
Systems.
In Proceedings of the 25th International Conference on
Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in
Computer Science, pages 297--311, Rome, Italy, September 2014. Springer.
doi:
10.1007/978-3-662-44584-6_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCD14]
-
R. Chrétien, V. Cortier, and S. Delaune.
Typing messages for free in security protocols: the case of
equivalence properties.
In Proceedings of the 25th International Conference on
Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in
Computer Science, pages 372--386, Rome, Italy, September 2014. Springer.
doi:
10.1007/978-3-662-44584-6_26.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DMS14b]
-
L. Doyen, Th. Massart, and M. Shirmohammadi.
Robust Synchronization in Markov Decision Processes.
In Proceedings of the 25th International Conference on
Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in
Computer Science, pages 234--248, Rome, Italy, September 2014. Springer.
doi:
10.1007/978-3-662-44584-6_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMM14]
-
P. Bouyer, N. Markey, and R. M. Matteplackel.
Averaging in LTL.
In Proceedings of the 25th International Conference on
Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in
Computer Science, pages 266--280, Rome, Italy, September 2014. Springer.
doi:
10.1007/978-3-662-44584-6_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PHL14a]
-
H. Ponce de León, S. Haar, and D. Longuet.
Distributed testing of concurrent systems: vector clocks to the
rescue.
In Proceedings of the 11th International Colloquium on
Theoretical Aspects of Computing (ICTAC'14), volume 8687 of Lecture
Notes in Computer Science, pages 369--387, Bucharest, Romania, September
2014. Springer.
doi:
10.1007/978-3-319-10882-7_22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dou14]
-
A. Doumane.
Études des automates en ludique.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2014.
[ BibTex ]
-
[Gou14c]
-
J. Goubault-Larrecq.
Noetherian spaces.
Invited talk, Continuity, Computability, Constructivity workshop
(CCC), Ljubljana, Slovenia, September 2014.
[ BibTex ]
-
[Jaz14]
-
S. Jaziri.
Robustness issues in priced timed automata.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2014.
[ BibTex ]
-
[CS14]
-
J.-B. Courtois and S. Schmitz.
Alternating Vector Addition Systems with States.
In Proceedings of the 39th International Symposium on
Mathematical Foundations of Computer Science (MFCS'14) --
Part I, volume 8634 of Lecture Notes in Computer Science, pages 220--231,
Budapest, Hungary, August 2014. Springer.
doi:
10.1007/978-3-662-44522-8_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS14]
-
P. Karandikar and Ph. Schnoebelen.
On the state complexity of closures and interiors of regular
languages with subwords.
In Proceedings of the 16th Workshop on Descriptional
Complexity of Formal Systems (DCFS'14), volume 8614 of Lecture Notes
in Computer Science, pages 234--245, Turku, Finland, August 2014.
Springer-Verlag.
doi:
10.1007/978-3-319-09704-6_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SLS+14]
-
Y. Sun, G. Lipari, R. Soulat, L. Fribourg, and N. Markey.
Component-Based Analysis of Hierarchical Scheduling using Linear
Hybrid Automata.
In Proceedings of the 20th IEEE International Conference on
Embedded and Real-Time Computing Systems and Applications
(RTCSA'14), Chongqing, China, August 2014. IEEE Computer Society Press.
doi:
10.1109/RTCSA.2014.6910502.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD14a]
-
S. Demri and M. Deters.
The effects of modalities in separation logics (extended
abstract).
In Proceedings of the 10th Conference on Advances in Modal
Logics (AiML'14), pages 134--138, Groningen, The Netherlands, August
2014. College Publications.
[ BibTex |
Web page |
PDF ]
-
[DKW14]
-
S. Demri, D. Kapur, and C. Weidenbach, editors.
Proceedings of the 7th International Joint Conference on
Automated Reasoning (IJCAR'14), volume 8562 of Lecture Notes in
Computer Science, Vienna, Austria, July 2014. Springer.
[ BibTex |
Web page ]
-
[CKM14]
-
M. Cadilhac, A. Krebs, and P. McKenzie.
Extremely uniform branching programs.
In Proceedings of the 6th Workshop on Non-Classical Models
of Automata and Applications (NCMA'14), volume 304 of books@ocg.at,
pages 73--83, Kassel, Germany, July 2014. Austrian Computer Society.
[ BibTex |
Web page |
PDF ]
-
[BFS14]
-
F. Bouchy, A. Finkel, and P. San Pietro.
Dense-choice Counter Machines Revisited.
Theoretical Computer Science, 542:17--31, July 2014.
doi:
10.1016/j.tcs.2014.04.029.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD14a]
-
K. Chatterjee and L. Doyen.
Games with a Weak Adversary.
In Proceedings of the 41st International Colloquium on
Automata, Languages and Programming (ICALP'14) -- Part II, volume
8573 of Lecture Notes in Computer Science, pages 110--121, Copenhagen,
Denmark, July 2014. Springer.
doi:
10.1007/978-3-662-43951-7_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFM14]
-
M. Blondin, A. Finkel, and P. McKenzie.
Handling Infinitely Branching WSTS.
In Proceedings of the 41st International Colloquium on
Automata, Languages and Programming (ICALP'14) -- Part II, volume
8573 of Lecture Notes in Computer Science, pages 13--25, Copenhagen, Denmark,
July 2014. Springer.
doi:
10.1007/978-3-662-43951-7_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DD14b]
-
S. Demri and M. Deters.
Expressive Completeness of Separation Logic With Two Variables
and No Separating Conjunction.
In Proceedings of the Joint Meeting of the 23rd EACSL Annual
Conference on Computer Science Logic and the 29th Annual ACM/
IEEE Symposium on Logic In Computer Science (CSL/LICS'14),
Vienna, Austria, July 2014. ACM Press.
doi:
10.1145/2603088.2603142.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGMZ14a]
-
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun.
Logical Characterization of Weighted Pebble Walking Automata.
In Proceedings of the Joint Meeting of the 23rd EACSL Annual
Conference on Computer Science Logic and the 29th Annual ACM/
IEEE Symposium on Logic In Computer Science (CSL/LICS'14),
Vienna, Austria, July 2014. ACM Press.
doi:
10.1145/2603088.2603118.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Haa14]
-
C. Haase.
Subclasses of Presburger Arithmetic and the Weak EXP
Hierarchy.
In Proceedings of the Joint Meeting of the 23rd EACSL Annual
Conference on Computer Science Logic and the 29th Annual ACM/
IEEE Symposium on Logic In Computer Science (CSL/LICS'14),
Vienna, Austria, July 2014. ACM Press.
doi:
10.1145/2603088.2603092.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bol14]
-
B. Bollig.
Logic for Communicating Automata with Parameterized Topology.
In Proceedings of the Joint Meeting of the 23rd EACSL Annual
Conference on Computer Science Logic and the 29th Annual ACM/
IEEE Symposium on Logic In Computer Science (CSL/LICS'14),
Vienna, Austria, July 2014. ACM Press.
doi:
10.1145/2603088.2603093.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sch14b]
-
S. Schmitz.
Implicational Relevance Logic is 2-ExpTime-Complete.
In Proceedings of the Joint 25th International Conference on
Rewriting Techniques and Applications and 12th International
Conference on Typed Lambda-Calculi and Applications (RTA/
TLCA'14), volume 8560 of Lecture Notes in Computer Science, pages 395--409,
Vienna, Austria, July 2014. Springer.
doi:
10.1007/978-3-319-08918-8_27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS14a]
-
R. Lazić and S. Schmitz.
Non-Elementary Complexities for Branching VASS, MELL, and
Extensions.
In Proceedings of the Joint Meeting of the 23rd EACSL Annual
Conference on Computer Science Logic and the 29th Annual ACM/
IEEE Symposium on Logic In Computer Science (CSL/LICS'14),
Vienna, Austria, July 2014. ACM Press.
doi:
10.1145/2603088.2603129.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou14d]
-
J. Goubault-Larrecq.
OrchIDS: on the value of rigor in intrusion detection.
CPS Summer School, Grenoble, France, July 2014.
[ BibTex ]
-
[DSS14]
-
A. Durand, N. Schweikardt, and L. Segoufin.
Enumerating answers to first-order queries over databases of low
degree.
In Proceedings of the 33rd Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'14), pages 121--131, Snowbird, Utah, USA, June 2014. ACM
Press.
doi:
10.1145/2594538.2594539.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JLMX14]
-
S. Jaziri, K. G. Larsen, R. Mardare, and B. Xue.
Adequacy and Complete Axiomatization for Timed Modal Logic.
In Proceedings of the 30th Conference on Mathematical
Foundations of Programming Semantics (MFPS'14), volume 308 of
Electronic Notes in Theoretical Computer Science, pages 183--210, Ithaca,
New York, USA, June 2014. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2014.10.011.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GJ14]
-
J. Goubault-Larrecq and A. Jung.
QRB, QFS, and the Probabilistic Powerdomain.
In Proceedings of the 30th Conference on Mathematical
Foundations of Programming Semantics (MFPS'14), volume 308 of
Electronic Notes in Theoretical Computer Science, pages 167--182, Ithaca,
New York, USA, June 2014. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2014.10.010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ADK14]
-
M. Arapinis, S. Delaune, and S. Kremer.
Dynamic Tags for Security Protocols.
Logical Methods in Computer Science, 10(2:11), June 2014.
doi:
10.2168/LMCS-10(2:11)2014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FL14]
-
A. Finkel and J. Leroux.
Neue, einfache Algorithmen für Petrinetze.
Informatik Spektrum, 37(3):229--236, June 2014.
doi:
10.1007/s00287-013-0753-5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KH14]
-
F. Kordon and F. Hulin-Hubard.
BenchKit, a Tool for Massive Concurrent Benchmarking.
In Proceedings of the 14th International Conference on
Application of Concurrency to System Design (ACSD'14), pages
159--165, Tunis, Tunisia, June 2014. IEEE Computer Society Press.
doi:
10.1109/ACSD.2014.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GHKS14]
-
V. Germanos, S. Haar, V. Khomenko, and S. Schwoon.
Diagnosability under Weak Fairness.
In Proceedings of the 14th International Conference on
Application of Concurrency to System Design (ACSD'14), pages
132--141, Tunis, Tunisia, June 2014. IEEE Computer Society Press.
doi:
10.1109/ACSD.2014.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DGLWM14]
-
S. Demri, D. Galmiche, D. Larchey-Wendling, and
D. Méry.
Separation Logic with One Quantified Variable.
In Proceedings of the 9th International Computer Science
Symposium in Russia (CSR'14), volume 8476 of Lecture Notes in Computer
Science, pages 125--138, Moscow, Russia, June 2014. Springer.
doi:
10.1007/978-3-319-06686-8_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou14b]
-
J. Goubault-Larrecq.
Exponentiable streams and prestreams.
Applied Categorical Structures, 22(3):515--549, June 2014.
Errata 1:
http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf; Errata 2:
http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum2.pdf.
doi:
10.1007/s10485-013-9315-x.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KGH+14]
-
F. Kordon, H. Garavel, L.-M. Hillah, F. Hulin-Hubard,
A. Linard, M. Beccuti, S. Evangelista, A. Hamez, N. Lohmann, E. Lopez,
E. Paviot-Adet, C. Rodriguez, C. Rohr, and J. Srba.
Results for the MCC @ Petri Nets 2014, June 2014.
[ BibTex |
Web page ]
-
[FFL+14]
-
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and
R. Soulat.
Correct-by-design Control Synthesis for Multilevel Converters
using State Space Decomposition.
In Proceedings of the 2nd French-Singaporean Workshop on
Formal Methods and Applications (FSFMA'14), volume 156 of Electronic
Proceedings in Theoretical Computer Science, pages 5--16, Singapore, May
2014.
doi:
10.4204/EPTCS.156.5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MV14a]
-
N. Markey and S. Valette.
Annual report for Year 1.
Cassting deliverable D6.2 (FP7-ICT-601148), May 2014.
38 pages.
[ BibTex ]
-
[GM14]
-
P. Gastin and B. Monmege.
Adding Pebbles to Weighted Automata -- Easy Specification &
Efficient Evaluation.
Theoretical Computer Science, 534:24--44, May 2014.
doi:
10.1016/j.tcs.2014.02.034.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GLSM14b]
-
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk.
Techniques et méthodes de génération de signatures
pour la détection d'intrusions.
Fourniture 2 du contrat DGA-INRIA Orchids, May 2014.
[ BibTex ]
-
[GLSM14a]
-
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk.
Politiques de sécurité système.
Fourniture 1 du contrat DGA-INRIA Orchids, May 2014.
[ BibTex ]
-
[SLAF14]
-
Y. Sun, G. Lipari, É. André, and L. Fribourg.
Toward Parametric Timed Interfaces for Real-Time Components.
In Proceedings of the 1st International Workshop on Synthesis
of Continuous Parameters (SYNCOP'14), volume 145 of Electronic
Proceedings in Theoretical Computer Science, pages 49--64, Grenoble, France,
April 2014.
doi:
10.4204/EPTCS.145.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD14b]
-
K. Chatterjee and L. Doyen.
Partial-Observation Stochastic Games: How to Win when Belief
Fails.
ACM Transactions on Computational Logic, 15(2:16), April 2014.
doi:
10.1145/2579819.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SL14]
-
Y. Sun and G. Lipari.
A Weak Simulation Relation for Real-Time Schedulability Analysis
of Global Fixed Priority Scheduling Using Linear Hybrid Automata.
Research Report LSV-14-06, Laboratoire Spécification et
Vérification, ENS Cachan, France, April 2014.
17 pages.
[ BibTex |
Web page |
PDF ]
-
[CDNV14]
-
K. Chatterjee, L. Doyen, S. Nain, and M. Y. Vardi.
The Complexity of Partial-Observation Stochastic Parity Games
with Finite-Memory Strategies.
In Proceedings of the 17th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages
242--257, Grenoble, France, April 2014. Springer.
doi:
10.1007/978-3-642-54830-7_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDGO14]
-
K. Chatterjee, L. Doyen, H. Gimbert, and Y. Oualhadj.
Perfect-Information Stochastic Mean-Payoff Parity Games.
In Proceedings of the 17th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages
210--225, Grenoble, France, April 2014. Springer.
doi:
10.1007/978-3-642-54830-7_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DMS14a]
-
L. Doyen, Th. Massart, and M. Shirmohammadi.
Limit Synchronization in Markov Decision Processes.
In Proceedings of the 17th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages
58--72, Grenoble, France, April 2014. Springer.
doi:
10.1007/978-3-642-54830-7_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Mar14]
-
N. Markey.
Cassting: Synthesizing Complex Systems Using Non-Zero-Sum
Games.
ERCIM News, 97:25--26, April 2014.
[ BibTex |
Web page |
PDF ]
-
[BDH14]
-
D. Baelde, S. Delaune, and L. Hirschi.
A reduced semantics for deciding trace equivalence using
constraint systems.
In Proceedings of the 3rd International Conference on
Principles of Security and Trust (POST'14), volume 8414 of Lecture
Notes in Computer Science, pages 1--21, Grenoble, France, April 2014.
Springer.
doi:
10.1007/978-3-642-54792-8_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BM14a]
-
D. Berwanger and A. B. Mathew.
Games with Recurring Certainty.
In Proceedings of the 2nd International Workshop on Strategic
Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical
Computer Science, pages 91--96, Grenoble, France, April 2014.
doi:
10.4204/EPTCS.146.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDFR14b]
-
K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin.
Doomsday Equilibria for Omega-Regular Games.
In Proceedings of the 2nd International Workshop on Strategic
Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical
Computer Science, pages 43--48, Grenoble, France, April 2014.
doi:
10.4204/EPTCS.146.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMV14]
-
P. Bouyer, N. Markey, and S. Vester.
Nash Equilibria in Symmetric Games with Partial Observation.
In Proceedings of the 2nd International Workshop on Strategic
Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical
Computer Science, pages 49--55, Grenoble, France, April 2014.
doi:
10.4204/EPTCS.146.7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGH+14]
-
T. Antonopoulos, N. Gorogiannis, C. Haase, M. Kanovich, and
J. Ouaknine.
Foundations for Decision Problems in Separation Logic with
General Inductive Predicates.
In Proceedings of the 17th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages
411--425, Grenoble, France, April 2014. Springer.
doi:
10.1007/978-3-642-54830-7_27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFH+14]
-
N. Bertrand, É. Fabre, S. Haar, S. Haddad, and
L. Hélouët.
Active diagnosis for probabilistic systems.
In Proceedings of the 17th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages
29--42, Grenoble, France, April 2014. Springer.
doi:
10.1007/978-3-642-54830-7_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABG+14b]
-
S. Akshay, B. Bollig, P. Gastin, M. Mukund, and
K. Narayan Kumar.
Distributed Timed Automata with Independently Evolving Clocks.
Fundamenta Informaticae, 130(4):377--407, April 2014.
doi:
10.3233/FI-2014-996.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGMZ14b]
-
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun.
Pebble Weighted Automata and Weighted Logics.
ACM Transactions on Computational Logic, 15(2:15), April 2014.
doi:
10.1145/2579819.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MBL14]
-
N. Markey, Th. Brihaye, and K. G. Larsen.
Robustness of collective adaptive systems.
Cassting deliverable D3.1 (FP7-ICT-601148), March 2014.
17 pages.
[ BibTex |
Web page |
PDF ]
-
[BM14b]
-
Th. Brihaye and N. Markey.
Solution concepts for collective adaptive systems.
Cassting deliverable D1.4 (FP7-ICT-601148), March 2014.
13 pages.
[ BibTex |
Web page |
PDF ]
-
[Seg14]
-
L. Segoufin.
A glimpse on constant delay enumeration.
In Proceedings of the 31st Annual Symposium on Theoretical
Aspects of Computer Science (STACS'14), volume 25 of Leibniz
International Proceedings in Informatics, pages 13--27, Lyon, France, March
2014. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2014.13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ADV14]
-
S. Abiteboul, D. Deutch, and V. Vianu.
Deduction with Contradictions in Datalog.
In Proceedings of the 17th International Conference on
Database Theory (ICDT'14), pages 143--154, Athens, Greece, March 2014.
doi:
10.5441/002/icdt.2014.17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EM14]
-
Y. Elias and P. McKenzie.
On Generalized Addition Chains.
INTEGERS -- Electronic Journal of Combinatorial Number Theory,
14(A16), March 2014.
[ BibTex |
Web page |
PDF ]
-
[FSS14]
-
N. Francis, L. Segoufin, and C. Sirangelo.
Datalog Rewritings of Regular Path Queries using Views.
In Proceedings of the 17th International Conference on
Database Theory (ICDT'14), pages 107--118, Athens, Greece, March 2014.
doi:
10.5441/002/icdt.2014.14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLM14]
-
P. Bouyer, K. G. Larsen, and N. Markey.
Lower-Bound Constrained Runs in Weighted Timed Automata.
Performance Evaluation, 73:91--109, March 2014.
doi:
10.1016/j.peva.2013.11.002.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HHM14]
-
S. Haddad, R. Hennicker, and M. H. Møller.
Specification of Asynchronous Component Systems with Modal
IashO-Petri Nets.
In Revised Selected Papers of the 8th Symposium on
Trustworthy Global Computing (TGC'13), volume 8358 of Lecture Notes
in Computer Science, pages 219--234, Buenos Aires, Argentina, March 2014.
Springer.
doi:
10.1007/978-3-319-05119-2_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fin14]
-
A. Finkel.
REACHARD -- Compte-rendu intermédiaire.
Deliverable D3 Reachard (ANR-11-BS02-001), February 2014.
18 pages.
[ BibTex ]
-
[Bra14]
-
J. Brault-Baron.
Hypergraph Acyclicity Revisited.
Research Report 1403.7076, Computing Research Repository, February
2014.
32 pages.
[ BibTex |
Web page |
PDF ]
-
[Sou14]
-
R. Soulat.
Synthesis of Correct-by-Design Schedulers for Hybrid Systems.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2014.
[ BibTex |
Web page |
PDF ]
-
[FGM+14]
-
L. Fribourg, É. Goubault, S. Mohamed, S. Putot, and
R. Soulat.
Synthesis of robust boundary control for systems governed by
semi-discrete differential equations.
Research Report LSV-14-03, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2014.
8 pages.
[ BibTex |
Web page |
PDF ]
-
[SBM14]
-
O. Sankur, P. Bouyer, and N. Markey.
Shrinking Timed Automata.
Information and Computation, 234:107--132, February 2014.
doi:
10.1016/j.ic.2014.01.002.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KL14]
-
S. Kumar and G. Lipari.
Latency Analysis of Network-On-Chip-based Many-Core Processors.
In Proceedings of the 22nd Euromicro International Conference
on Parallel, Distributed, and Network-Based Processing (PDP'14),
pages 432--439, Turin, Italy, February 2014. IEEE Computer Society Press.
doi:
10.1109/PDP.2014.107.
[ BibTex |
DOI ]
-
[ABG+14a]
-
A. Adjé, O. Bouissou, J. Goubault-Larrecq,
É. Goubault, and S. Putot.
Static Analysis of Programs with Imprecise Probabilistic
Inputs.
In Revised Selected Papers of the 5th IFIP TC2/WG2.3
Conference Verified Software---Theories, Tools, and Experiments
(VSTTE'13), volume 8164 of Lecture Notes in Computer Science, pages 22--47,
Atherton, California, USA, 2014. Springer.
doi:
10.1007/978-3-642-54108-7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFHP14]
-
L. Bernardinello, C. Ferigato, S. Haar, and L. Pomello.
Closed Sets in Occurrence Nets with Conflicts.
Fundamenta Informaticae, 133(4):323--344, 2014.
doi:
10.3233/FI-2014-1079.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KHY14]
-
M. Koutny, S. Haddad, and A. Yakovlev, editors.
Transactions on Petri Nets and Other Models of
Concurrency IX, volume 8910 of Lecture Notes in Computer Science.
Springer, 2014.
[ BibTex |
Web page ]
-
[CH14]
-
Th. Chatain and S. Haar.
A Canonical Contraction for Safe Petri Nets.
In Transactions on Petri Nets and Other Models of Concurrency IX,
volume 8910 of Lecture Notes in Computer Science, pages 83--98. Springer,
2014.
doi:
10.1007/978-3-662-45730-6_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GS14]
-
J. Goubault-Larrecq and R. Segala.
Random Measurable Selections.
In Horizons of the Mind. A Tribute to Prakash Panangaden, volume 8464
of Lecture Notes in Computer Science, pages 343--362. Springer, 2014.
doi:
10.1007/978-3-319-06880-0_18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDFR14a]
-
K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin.
Doomsday Equilibria for Omega-Regular Games.
In Proceedings of the 15th International Conference on
Verification, Model Checking and Abstract Interpretation
(VMCAI'14), volume 8318 of Lecture Notes in Computer Science, pages 78--97,
San Diego, California, USA, January 2014. Springer.
doi:
10.1007/978-3-642-54013-4_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Cyr14]
-
A. Cyriac.
Verification of Communicating Recursive Programs via
Split-width.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2014.
[ BibTex |
Web page |
PDF ]
-
[BCG+14]
-
D. Baelde, K. Chaudhuri, A. Gacek, D. Miller, G. Nadathur,
A. Tiu, and Y. Wang.
Abella: A System for Reasoning about Relational Specifications.
Journal of Formalized Reasoning, 7(2):1--89, 2014.
doi:
10.6092/issn.1972-5787/4650.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Cha13]
-
Th. Chatain.
Concurrency in Real-Time Distributed Systems, from Unfoldings to
Implementability.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, December 2013.
[ BibTex |
Web page |
PDF ]
-
[Rod13]
-
C. Rodríguez.
Verification Based on Unfoldings of Petri Nets with Read
Arcs.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2013.
[ BibTex |
Web page |
PDF ]
-
[Sch13]
-
S. Schwoon.
Efficient verification of sequential and concurrent systems.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, December 2013.
[ BibTex |
Web page |
PDF ]
-
[Ant13]
-
É. Antoine.
Distributed data management with a declarative rule-based
language: Webdamlog.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2013.
[ BibTex |
Web page |
PDF ]
-
[BLBL13]
-
M. Bambagini, J. Lelli, G. Buttazzo, and G. Lipari.
On the Energy-Aware Partitioning of Real-Time Tasks on
Homogeneous Multi-Processor Systems.
In Proceedings of the 4th International Conference on
Energy-Aware Computing Systems and Applications (ICEAC'14),,
pages 69--74, Istanbul, Turkey, December 2013. IEEE Circuits and Systems
Society.
doi:
10.1109/ICEAC.2013.6737640.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HHMS13]
-
S. Haar, S. Haddad, T. Melliti, and S. Schwoon.
Optimal Constructions for Active Diagnosis.
In Proceedings of the 33rd Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'13),
volume 24 of Leibniz International Proceedings in Informatics, pages
527--539, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2013.527.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EJS13]
-
J. Esparza, L. Jezequel, and S. Schwoon.
Computation of summaries using net unfoldings.
In Proceedings of the 33rd Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'13),
volume 24 of Leibniz International Proceedings in Informatics, pages
225--236, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2013.225.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDKR13]
-
C. Chevalier, S. Delaune, S. Kremer, and M. D. Ryan.
Composition of Password-based Protocols.
Formal Methods in System Design, 43(3):369--413, December 2013.
doi:
10.1007/s10703-013-0184-6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS13c]
-
D. Berwanger and O. Serre.
Théorie des jeux en informatique.
Technique et Science Informatiques, 32(9-10), December 2013.
[ BibTex |
Web page |
PDF ]
-
[BC13a]
-
S. Balaguer and Th. Chatain.
Avoiding Shared Clocks in Networks of Timed Automata.
Logical Methods in Computer Science, 9(4:13), November 2013.
doi:
10.2168/LMCS-9(4:13)2013.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD13b]
-
R. Chrétien and S. Delaune.
La protection des informations sensibles.
Pour La Science, 433:70--77, November 2013.
[ BibTex |
Web page ]
-
[PHL13]
-
H. Ponce de León, S. Haar, and D. Longuet.
Unfolding-based Test Selection for Concurrent Conformance.
In Proceedings of the 25th IFIP International Conference on
Testing Software and Systems (ICTSS'13), Lecture Notes in Computer
Science, pages 98--113, Istanbul, Turkey, November 2013. Springer.
doi:
10.1007/978-3-642-41707-8_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS13c]
-
W. Kazana and L. Segoufin.
Enumeration of monadic second-order queries on trees.
ACM Transactions on Computational Logic, 14(4), November 2013.
doi:
10.1145/2528928.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFM13]
-
M. Cadilhac, A. Finkel, and P. McKenzie.
Unambiguous Contrained Automata.
International Journal of Foundations of Computer Science,
24(7):1099--1116, November 2013.
doi:
10.1142/S0129054113400339.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS13a]
-
N. Bertrand and Ph. Schnoebelen.
Computable fixpoints in well-structured symbolic model
checking.
Formal Methods in System Design, 43(2):233--267, October 2013.
doi:
10.1007/s10703-012-0168-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MLS+13]
-
N. Markey, K. G. Larsen, A. Skou, D. Lux, J. Rozenkilde,
K. L. Pedersen, and S. M. Sørensen.
Description of case studies.
Cassting deliverable D4.1 (FP7-ICT-601148), October 2013.
19 pages.
[ BibTex ]
-
[Mon13]
-
B. Monmege.
Spécification et vérification de propriétés
quantitatives : expressions, logiques, et automates.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2013.
[ BibTex |
Web page |
PDF ]
-
[PLML13]
-
A. Parri, J. Lelli, M. Marinoni, and G. Lipari.
Design and Implementation of the Multiprocessor Bandwidth
Inheritance Protocol on Linux.
In Proceedings of the 15th Real-Time Linux Workshop
(RTLWS'13), pages 41--54, Lugano-Manno, Switzerland, October 2013. Open
Source Automation Development Lab (OSADL).
[ BibTex |
Web page |
PDF ]
-
[SSL+13]
-
Y. Sun, R. Soulat, G. Lipari, É. André, and
L. Fribourg.
Parametric Schedulability Analysis of Fixed Priority Real-Time
Distributed Systems.
In Preproceedings of the 2nd International Workshop on Formal
Techniques for Safety-Critical Systems (FTSCS'13), pages 179--194,
Queenstown, New Zealand, October 2013.
[ BibTex |
Web page |
PDF ]
-
[PBB13]
-
H. Ponce de León, G. Bonigo, and L. Brandán
Briones.
Distributed Analysis of Diagnosability in Concurrent Systems.
In Proceedings of the 24th International Workshop on
Principles of Diagnosis (DX'13), Jerusalem, Israel, October 2013.
[ BibTex |
Web page |
PDF ]
-
[ABD+13]
-
É. André, B. Barbot, C. Démoulins, L. M. Hillah,
F. Hulin-Hubard, F. Kordon, A. Linard, and L. Petrucci.
A Modular Approach for Reusing Formalisms in Verification Tools
of Concurrent Systems.
In Proceedings of the 15th International Conference on Formal
Engineering Methods (ICFEM'13), Lecture Notes in Computer Science,
pages 199--214, Queenstown, New Zealand, October-November 2013. Springer.
doi:
10.1007/978-3-642-41202-8_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDG+13]
-
Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine,
J.-F. Raskin, and J. Worrell.
Time-Bounded Reachability for Monotonic Hybrid Automata:
Complexity and Fixed Points.
In Proceedings of the 11th International Symposium on
Automated Technology for Verification and Analysis (ATVA'13),
volume 8172 of Lecture Notes in Computer Science, pages 55--70, Hanoi,
Vietnam, October 2013. Springer.
doi:
10.1007/978-3-319-02444-8_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDRR13]
-
K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin.
Looking at Mean-Payoff and Total-Payoff through Windows.
In Proceedings of the 11th International Symposium on
Automated Technology for Verification and Analysis (ATVA'13),
volume 8172 of Lecture Notes in Computer Science, pages 118--132, Hanoi,
Vietnam, October 2013. Springer.
doi:
10.1007/978-3-319-02444-8_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RS13a]
-
C. Rodríguez and S. Schwoon.
Cunf: A Tool for Unfolding and Verifying Petri Nets with Read
Arcs.
In Proceedings of the 11th International Symposium on
Automated Technology for Verification and Analysis (ATVA'13),
volume 8172 of Lecture Notes in Computer Science, pages 492--495, Hanoi,
Vietnam, October 2013. Springer.
doi:
10.1007/978-3-319-02444-8_42.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AFS13a]
-
É. André, L. Fribourg, and R. Soulat.
Merge and Conquer: State Merging in Parametric Timed Automata.
In Proceedings of the 11th International Symposium on
Automated Technology for Verification and Analysis (ATVA'13),
volume 8172 of Lecture Notes in Computer Science, pages 381--396, Hanoi,
Vietnam, October 2013. Springer.
doi:
10.1007/978-3-319-02444-8_27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDH13]
-
K. Chatterjee, L. Doyen, and Th. A. Henzinger.
A survey of partial-observation stochastic parity games.
Formal Methods in System Design, 43(2):268--284, October 2013.
doi:
10.1007/s10703-012-0164-2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GO13]
-
J. Goubault-Larrecq and J. Olivain.
On the Efficiency of Mathematics in Intrusion Detection: The
NetEntropy Case.
In Revised Selected Papers of the 6th International
Symposium on Foundations and Practice of Security (FPS'13), volume
8352 of Lecture Notes in Computer Science, pages 3--16, La Rochelle, France,
October 2013. Springer.
doi:
10.1007/978-3-319-05302-8_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AV13b]
-
S. Abiteboul and V. Vianu.
Models for Data-Centric Workflows.
In In Search of Elegance in the Theory and Practice of
Computation -- Essays Dedicated to Peter Buneman, volume 8000 of
Lecture Notes in Computer Science, pages 1--12. Springer, September 2013.
doi:
10.1007/978-3-642-41660-6_1.
[ BibTex |
DOI ]
-
[tCS13]
-
B. ten Cate and L. Segoufin.
Unary negation.
Logical Methods in Computer Science, 9(3:25), September 2013.
doi:
10.2168/LMCS-9(3:25)2013.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCMV13]
-
R. Bonnet, R. Chadha, P. Madhusudan, and M. Viswanathan.
Reachability under contextual locking.
Logical Methods in Computer Science, 9(3:21), September 2013.
doi:
10.2168/LMCS-9(3:21)2013.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BL13b]
-
G. Buttazzo and G. Lipari.
Ptask: An Educational C Library for Programming Real-Time
Systems on Linux.
In Proceedings of the 18th IEEE International Conference on
Emerging Technologies and Factory Automation (ETFA'13), Cagliari,
Italy, September 2013. IEEE Industrial Electronics Society.
doi:
10.1109/ETFA.2013.6648001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bro13]
-
R. Brochenin.
Separation Logic: Expressiveness, Complexity, Temporal
Extension.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2013.
[ BibTex |
Web page |
PDF ]
-
[Kaz13]
-
W. Kazana.
Query Evaluation with Constant Delay.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2013.
[ BibTex |
Web page |
PDF ]
-
[Hir13a]
-
L. Hirschi.
Réduction d'entrelacements pour l'équivalence de
traces.
Research Report LSV-13-13, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2013.
22 pages.
[ BibTex |
Web page |
PDF ]
-
[BMS13b]
-
P. Bouyer, N. Markey, and O. Sankur.
Robustness in timed automata.
In Proceedings of the 7th Workshop on Reachability Problems
in Computational Models (RP'13), volume 8169 of Lecture Notes in
Computer Science, pages 1--18, Uppsala, Sweden, September 2013. Springer.
doi:
10.1007/978-3-642-41036-9_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Rei13]
-
J. Reichert.
On The Complexity of Counter Reachability Games.
In Proceedings of the 7th Workshop on Reachability Problems
in Computational Models (RP'13), volume 8169 of Lecture Notes in
Computer Science, pages 196--208, Uppsala, Sweden, September 2013. Springer.
doi:
10.1007/978-3-642-41036-9_18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHJL13]
-
B. Bérard, S. Haddad, A. Jovanovic, and D. Lime.
Parametric Interrupt Timed Automata.
In Proceedings of the 7th Workshop on Reachability Problems
in Computational Models (RP'13), volume 8169 of Lecture Notes in
Computer Science, pages 59--69, Uppsala, Sweden, September 2013. Springer.
doi:
10.1007/978-3-642-41036-9_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS13c]
-
L. Fribourg and R. Soulat.
Stability Controllers for Sampled Switched Systems.
In Proceedings of the 7th Workshop on Reachability Problems
in Computational Models (RP'13), volume 8169 of Lecture Notes in
Computer Science, pages 135--145, Uppsala, Sweden, September 2013. Springer.
doi:
10.1007/978-3-642-41036-9_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SHL+13]
-
R. Soulat, G. Hérault, D. Labrousse, B. Revol, G. Feld,
S. Lefebvre, and L. Fribourg.
Use of a full wave correct-by-design command to control a
multilevel modular converter.
In Proceedings of the 15th European Conference on Power
Electronics and Applications (EPE'13), Lille, France, September 2013.
IEEE Power Electronics Society.
doi:
10.1109/EPE.2013.6634448.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KKS13]
-
S. Kremer, R. Künnemann, and G. Steel.
Universally Composable Key-Management.
In Proceedings of the 18th European Symposium on Research in
Computer Security (ESORICS'13), volume 8134 of Lecture Notes in
Computer Science, pages 327--344, Egham, U.K., September 2013. Springer.
doi:
10.1007/978-3-642-40203-6_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AtCK13]
-
S. Abiteboul, B. ten Cate, and Y. Katsis.
On the equivalence of distributed systems with queries and
communication.
Journal of Computer and System Sciences, 79(6):739--762, September
2013.
doi:
10.1016/j.jcss.2013.01.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDD13]
-
C. Barrett, S. Demri, and M. Deters.
Witness runs for counter machines.
In Proceedings of the 9th International Symposium on
Frontiers of Combining Systems (FroCoS'13), volume 8152 of Lecture
Notes in Artificial Intelligence, pages 120--150, Nancy, France, September
2013. Springer.
doi:
10.1007/978-3-642-40885-4_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sta13]
-
D. Stan.
Équilibres mixtes dans les jeux concurrents.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2013.
29 pages.
[ BibTex |
Web page |
PDF ]
-
[BF13]
-
V. Braberman and L. Fribourg, editors.
Proceedings of the 11th International Conference on
Formal Modelling and Analysis of Timed Systems (FORMATS'13),
volume 8053 of Lecture Notes in Computer Science, Buenos Aires, Argentina,
August 2013. Springer.
[ BibTex |
Web page ]
-
[BL13a]
-
S. Benedetto and G. Lipari.
ADOK: A Minimal Object Oriented Real-Time Operating System
in C++.
In Proceedings of the 3rd Embedded Operating Systems
Workshop (EWiLi'13), Toulouse, France, August 2013.
[ BibTex |
Web page |
PDF ]
-
[Gou13a]
-
J. Goubault-Larrecq.
A Constructive Proof of the Topological Kruskal Theorem.
In Proceedings of the 38th International Symposium on
Mathematical Foundations of Computer Science (MFCS'13), volume 8087
of Lecture Notes in Computer Science, pages 22--41, Klosterneuburg, Austria,
August 2013. Springer.
doi:
10.1007/978-3-642-40313-2_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LM13]
-
F. Laroussinie and N. Markey.
Satisfiability of ATL with strategy contexts.
In Proceedings of the 4th International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'13), volume 119
of Electronic Proceedings in Theoretical Computer Science, pages 208--223,
Borca di Cadore, Italy, August 2013.
doi:
10.4204/EPTCS.119.18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SS13]
-
S. Schmitz and Ph. Schnoebelen.
The Power of Well-Structured Systems.
In Proceedings of the 24th International Conference on
Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in
Computer Science, pages 5--24, Buenos Aires, Argentina, August 2013.
Springer.
doi:
10.1007/978-3-642-40184-8_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABHH13]
-
S. Akshay, N. Bertrand, S. Haddad, and L. Hélouët.
The steady-state control problem for Markov decision processes.
In Proceedings of the 10th International Conference on
Quantitative Evaluation of Systems (QEST'13), pages 290--304, Buenos
Aires, Argentina, August 2013. IEEE Computer Society Press.
doi:
10.1007/978-3-642-40196-1_26.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CJ13]
-
Th. Chatain and C. Jard.
Back in Time Petri Nets.
In Proceedings of the 11th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053
of Lecture Notes in Computer Science, pages 91--105, Buenos Aires, Argentina,
August 2013. Springer.
doi:
10.1007/978-3-642-40229-6_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMS13a]
-
P. Bouyer, N. Markey, and O. Sankur.
Robust Weighted Timed Automata and Games.
In Proceedings of the 11th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053
of Lecture Notes in Computer Science, pages 31--46, Buenos Aires, Argentina,
August 2013. Springer.
doi:
10.1007/978-3-642-40229-6_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HSS13]
-
C. Haase, S. Schmitz, and Ph. Schnoebelen.
The Power of Priority Channel Systems.
In Proceedings of the 24th International Conference on
Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in
Computer Science, pages 319--333, Buenos Aires, Argentina, August 2013.
Springer.
doi:
10.1007/978-3-642-40184-8_23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SBMR13]
-
O. Sankur, P. Bouyer, N. Markey, and P.-A. Reynier.
Robust Controller Synthesis in Timed Automata.
In Proceedings of the 24th International Conference on
Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in
Computer Science, pages 546--560, Buenos Aires, Argentina, August 2013.
Springer.
doi:
10.1007/978-3-642-40184-8_38.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FGH13]
-
A. Finkel, S. Göller, and C. Haase.
Reachability in Register Machines with Polynomial Updates.
In Proceedings of the 38th International Symposium on
Mathematical Foundations of Computer Science (MFCS'13), volume 8087
of Lecture Notes in Computer Science, pages 409--420, Klosterneuburg,
Austria, August 2013. Springer.
doi:
10.1007/978-3-642-40313-2_37.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Dem13]
-
S. Demri.
On selective unboundedness of VASS.
Journal of Computer and System Sciences, 79(5):689--713, August 2013.
doi:
10.1016/j.jcss.2013.01.014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Hir13b]
-
L. Hirschi.
Reduction of interleavings for trace equivalence checking of
security protocols.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, August 2013.
[ BibTex ]
-
[Fan13]
-
E. Fang.
Permissive multi-strategies in timed games.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, August 2013.
[ BibTex ]
-
[GLS13a]
-
A. Gheerbrant, L. Libkin, and C. Sirangelo.
Reasoning About Pattern-Based XML Queries.
In Proceedings of the 7th International Conference on Web
Reasoning and Rule Systems (WRRS'13), volume 7994 of Lecture Notes in
Computer Science, pages 4--18, Mannheim, Germany, July 2013. Springer.
doi:
10.1007/978-3-642-39666-3_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS13a]
-
L. Fribourg and R. Soulat.
Control of Switching Systems by Invariance Analysis: Application
to Power Electronics.
Wiley-ISTE, July 2013.
144 pages.
[ BibTex |
Web page ]
-
[RS13b]
-
C. Rodríguez and S. Schwoon.
An Improved Construction of Petri Net Unfoldings.
In Proceedings of the 1st French-Singaporean Workshop on
Formal Methods and Applications (FSFMA'13), volume 31 of Open Access
Series in Informatics, pages 47--52, Singapore, July 2013. Leibniz-Zentrum
für Informatik.
doi:
10.4230/OASIcs.FSFMA.2013.47.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HMY13]
-
S. Haddad, L. Mokdad, and S. Youcef.
Bounding models families for performance evaluation in composite
Web services.
Journal of Computational Science, 4(4):232--241, July 2013.
doi:
10.1016/j.jocs.2011.11.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDS13]
-
S. Demri, A. K. Dhar, and A. Sangnier.
On the Complexity of Verifying Regular Properties on Flat
Counter Systems.
In Proceedings of the 40th International Colloquium on
Automata, Languages and Programming (ICALP'13) -- Part II, volume
7966 of Lecture Notes in Computer Science, pages 162--173, Riga, Latvia, July
2013. Springer.
doi:
10.1007/978-3-642-39212-2_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fri13]
-
L. Fribourg.
Control of Switching Systems by Invariance Analysis
(Invited Talk).
In Proceedings of the 1st French-Singaporean Workshop on
Formal Methods and Applications (FSFMA'13), volume 31 of Open Access
Series in Informatics, page 1, Singapore, July 2013. Leibniz-Zentrum für
Informatik.
doi:
10.4230/OASIcs.FSFMA.2013.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FKS13]
-
L. Fribourg, U. Kühne, and R. Soulat.
Constructing Attractors of Nonlinear Dynamical Systems by State
Space Decomposition.
In Proceedings of the 1st French-Singaporean Workshop on
Formal Methods and Applications (FSFMA'13), volume 31 of Open Access
Series in Informatics, pages 53--60, Singapore, July 2013. Leibniz-Zentrum
für Informatik.
doi:
10.4230/OASIcs.FSFMA.2013.53.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AHH+13]
-
É. André, L. M. Hillah, F. Hulin-Hubard, F. Kordon,
Y. Lembachar, A. Linard, and L. Petrucci.
CosyVerif: An Open Source Extensible Verification
Environment.
In Proceedings of the 18th IEEE International Conference on
Engineering of Complex Computer Systems (ICECCS'13), pages 33--36,
Singapore, July 2013. IEEE Computer Society Press.
doi:
10.1109/ICECCS.2013.15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HRS13]
-
S. Haar, C. Rodríguez, and S. Schwoon.
Reveal Your Faults: It's Only Fair!
In Proceedings of the 13th International Conference on
Application of Concurrency to System Design (ACSD'13), pages
120--129, Barcelona, Spain, July 2013. IEEE Computer Society Press.
doi:
10.1109/ACSD.2013.15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HKS13]
-
S. Haar, C. Kern, and S. Schwoon.
Computing the Reveals Relation in Occurrence Nets.
Theoretical Computer Science, 493:66--79, July 2013.
doi:
10.1016/j.tcs.2013.04.028.
[ BibTex |
DOI |
Web page |
PDF ]
-
[McK13]
-
P. McKenzie.
Can chimps go it alone?
In Proceedings of the 15th Workshop on Descriptional
Complexity of Formal Systems (DCFS'13), volume 8031 of Lecture Notes
in Computer Science, page 17, London, Ontario, Canada, July 2013.
Springer-Verlag.
doi:
10.1007/978-3-642-39310-5_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCD13b]
-
R. Chrétien, V. Cortier, and S. Delaune.
From security protocols to pushdown automata.
In Proceedings of the 40th International Colloquium on
Automata, Languages and Programming (ICALP'13) -- Part II, volume
7966 of Lecture Notes in Computer Science, pages 137--149, Riga, Latvia, July
2013. Springer.
doi:
10.1007/978-3-642-39212-2_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCP13]
-
V. Cheval, V. Cortier, and A. Plet.
Lengths may break privacy ---or how to check for equivalences
with length.
In Proceedings of the 25th International Conference on
Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in
Computer Science, pages 708--723, Saint Petersburg, Russia, July 2013.
Springer.
doi:
10.1007/978-3-642-39799-8_50.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HIOP13]
-
C. Haase, S. Ishtiaq, J. Ouaknine, and M. Parkinson.
SeLoger: A Tool for Graph-Based Reasoning in Separation Logic.
In Proceedings of the 25th International Conference on
Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in
Computer Science, pages 790--795, Saint Petersburg, Russia, July 2013.
Springer.
doi:
10.1007/978-3-642-39799-8_55.
[ BibTex |
DOI |
Web page |
PDF ]
-
[San13b]
-
O. Sankur.
Shrinktech: A Tool for the Robustness Analysis of Timed
Automata.
In Proceedings of the 25th International Conference on
Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in
Computer Science, pages 1006--1012, Saint Petersburg, Russia, July 2013.
Springer.
doi:
10.1007/978-3-642-39799-8_72.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bre13]
-
R. Brenguier.
PRALINE: A Tool for Computing Nash Equilibria in Concurrent
Games.
In Proceedings of the 25th International Conference on
Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in
Computer Science, pages 890--895, Saint Petersburg, Russia, July 2013.
Springer.
doi:
10.1007/978-3-642-39799-8_63.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou13b]
-
J. Goubault-Larrecq.
A few pearls in the theory of quasi-metric spaces.
Invited talk (semi-plenary speaker), Summer Topology Conference,
North Bay, Ontario, CA, July 2013.
[ BibTex ]
-
[Gou13e]
-
J. Goubault-Larrecq.
A short proof of the Schröder-Simpson theorem.
Invited talk, Workshop on Asymmetric Topology, Summer Topology
Conference, North Bay, Ontario, CA, July 2013.
[ BibTex ]
-
[ABG13]
-
S. Akshay, B. Bollig, and P. Gastin.
Event-clock Message Passing Automata: A Logical Characterization
and an Emptiness-Checking Algorithm.
Formal Methods in System Design, 42(3):262--300, June 2013.
doi:
10.1007/s10703-012-0179-8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GS13]
-
P. Gastin and N. Sznajder.
Fair Synthesis for Asynchronous Distributed Systems.
ACM Transactions on Computational Logic, 14(2:9), June 2013.
doi:
10.1145/2480759.2480761.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AAM+13]
-
S. Abiteboul, É. Antoine, G. Miklau, J. Stoyanovich, and
J. Testard.
Rule-based application development using Webdamlog.
In Proceedings of the ACM SIGMOD Internaitonal Conference
on Management of Data (SIGMOD'13), pages 965--968, New York, New York,
USA, June 2013. ACM Press.
doi:
10.1145/2463676.2465251.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BD13]
-
K. Bansal and S. Demri.
Model-checking bounded multi-pushdown systems.
In Proceedings of the 8th International Computer Science
Symposium in Russia (CSR'13), volume 7913 of Lecture Notes in Computer
Science, pages 405--417, Ekaterinburg, Russia, June 2013. Springer.
doi:
10.1007/978-3-642-38536-0_35.
[ BibTex |
DOI |
Web page |
PDF ]
-
[VM13a]
-
S. Valette and N. Markey.
Cassting website.
Cassting deliverable D6.1 (FP7-ICT-601148), June 2013.
10 pages.
[ BibTex |
Web page |
PDF ]
-
[CH13]
-
Th. Chatain and S. Haar.
A Canonical Contraction for Safe Petri Nets.
In Proceedings of the 7th International Workshop on Petri
Nets and Software Engineering (PNSE'13), volume 969 of CEUR Workshop
Proceedings, pages 25--39, Milano, Italy, June 2013. RWTH Aachen, Germany.
[ BibTex |
Web page |
PDF ]
-
[GHPR13]
-
G. Geeraerts, A. Heußner, M. Praveen, and J.-F. Raskin.
ω-Petri nets.
In Proceedings of the 34th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927
of Lecture Notes in Computer Science, pages 49--69, Milano, Italy, June 2013.
Springer.
doi:
10.1007/978-3-642-38697-8_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BST13]
-
M. Bojańczyk, L. Segoufin, and S. Toruńczyk.
Verification of Database-driven Systems via Amalgamation.
In Proceedings of the 32nd Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'13), pages 63--74, New York, New York, USA, June 2013. ACM
Press.
doi:
10.1145/2463664.2465228.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GLS13b]
-
A. Gheerbrant, L. Libkin, and C. Sirangelo.
When is Naïve Evaluation Possible?
In Proceedings of the 32nd Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'13), pages 75--86, New York, New York, USA, June 2013. ACM
Press.
doi:
10.1145/2463664.2463674.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AV13a]
-
S. Abiteboul and V. Vianu.
Collaborative Data-Driven Workflows: Think Global, Act Local.
In Proceedings of the 32nd Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'13), pages 91--102, New York, New York, USA, June 2013. ACM
Press.
doi:
10.1145/2463664.2463672.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS13b]
-
W. Kazana and L. Segoufin.
Enumeration of First-Order Queries on Classes of Structures With
Bounded Expansion.
In Proceedings of the 32nd Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'13), pages 297--308, New York, New York, USA, June 2013.
ACM Press.
doi:
10.1145/2463664.2463667.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCD13a]
-
V. Cheval, V. Cortier, and S. Delaune.
Deciding equivalence-based properties using constraint solving.
Theoretical Computer Science, 492:1--39, June 2013.
doi:
10.1016/j.tcs.2013.04.016.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCS13]
-
H. Comon-Lundh, V. Cortier, and G. Scerri.
Tractable inference systems: an extension with a deducibility
predicate.
In Proceedings of the 24th International Conference on
Automated Deduction (CADE'13), volume 7898 of Lecture Notes in
Artificial Intelligence, pages 91--108, Lake Placid, New York, USA, June
2013. Springer.
doi:
10.1007/978-3-642-38574-2_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKM13]
-
B. Bollig, D. Kuske, and R. Mennicke.
The Complexity of Model Checking Multi-Stack Systems.
In Proceedings of the 28th Annual IEEE Symposium on Logic
in Computer Science (LICS'13), pages 163--170, New-Orleans, Louisiana,
USA, June 2013. IEEE Computer Society Press.
doi:
10.1109/LICS.2013.22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DFP13]
-
S. Demri, D. Figueira, and M. Praveen.
Reasoning about Data Repetitions with Counter Systems.
In Proceedings of the 28th Annual IEEE Symposium on Logic
in Computer Science (LICS'13), pages 33--42, New-Orleans, Louisiana,
USA, June 2013. IEEE Computer Society Press.
doi:
10.1109/LICS.2013.8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS13d]
-
A. Boral and S. Schmitz.
Model Checking Parse Trees.
In Proceedings of the 28th Annual IEEE Symposium on Logic
in Computer Science (LICS'13), pages 153--162, New-Orleans, Louisiana,
USA, June 2013. IEEE Computer Society Press.
doi:
10.1109/LICS.2013.21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHLM13]
-
B. Bollig, P. Habermehl, M. Leucker, and B. Monmege.
A Fresh Approach to Learning Register Automata.
In Proceedings of the 17th International Conference on
Developments in Language Theory (DLT'13), volume 7907 of Lecture
Notes in Computer Science, pages 118--130, Marne-la-Vallée, France, June
2013. Springer.
doi:
10.1007/978-3-642-38771-5_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RSK13]
-
C. Rodríguez, S. Schwoon, and V. Khomenko.
Contextual Merged Processes.
In Proceedings of the 34th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927
of Lecture Notes in Computer Science, pages 29--48, Milano, Italy, June 2013.
Springer.
doi:
10.1007/978-3-642-38697-8_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FH13]
-
E. Fraca and S. Haddad.
Complexity Analysis of Continuous Petri Nets.
In Proceedings of the 34th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927
of Lecture Notes in Computer Science, pages 170--189, Milano, Italy, June
2013. Springer.
doi:
10.1007/978-3-642-38697-8_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HHM13]
-
S. Haddad, R. Hennicker, and M. H. Møller.
Channel Properties of Asynchronously Composed Petri Nets.
In Proceedings of the 34th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927
of Lecture Notes in Computer Science, pages 369--388, Milano, Italy, June
2013. Springer.
doi:
10.1007/978-3-642-38697-8_20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AR13]
-
A. Arul and J. Reichert.
The Complexity of Robot Games on the Integer Line.
In Proceedings of the 11th International Workshop on
Quantitative Aspects of Programming Languages (QAPl'13), volume 117
of Electronic Proceedings in Theoretical Computer Science, pages 132--148,
Rome, Italy, June 2013.
doi:
10.4204/EPTCS.117.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS13b]
-
N. Bertrand and Ph. Schnoebelen.
Solving stochastic Büchi games on infinite arenas with a
finite attractor.
In Proceedings of the 11th International Workshop on
Quantitative Aspects of Programming Languages (QAPl'13), volume 117
of Electronic Proceedings in Theoretical Computer Science, pages 116--131,
Rome, Italy, June 2013.
doi:
10.4204/EPTCS.117.8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou13d]
-
J. Goubault-Larrecq.
OrchIDS, ou : de l'importance de la sémantique.
Séminaire DGA Innosciences. DGA, Bagneux, June 2013.
[ BibTex ]
-
[BCH13a]
-
S. Balaguer, Th. Chatain, and S. Haar.
Building Occurrence Nets from Reveals Relations.
Fundamenta Informaticae, 123(3):245--272, May 2013.
doi:
10.3233/FI-2013-809.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS13b]
-
L. Fribourg and R. Soulat.
Limit Cycles of Controlled Switched Systems: Existence,
Stability, Sensitivity.
In Proceedings of the 3rd International Workshop on New
Computational Methods for Inverse Problems (NCMIP'13), volume 464
of Journal of Physics: Conference Series, Cachan, France, May 2013. IOS
Press.
doi:
10.1088/1742-6596/464/1/012007.
[ BibTex |
DOI |
Web page |
PDF ]
-
[San13a]
-
O. Sankur.
Robustness in Timed Automata: Analysis, Synthesis,
Implementation.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, May 2013.
[ BibTex |
Web page |
PDF ]
-
[ABB+13]
-
E. G. Amparore, B. Barbot, M. Beccuti, S. Donatelli, and
G. Franceschinis.
Simulation-based Verification of Hybrid Automata Stochastic
Logic Formulas for Stochastic Symmetric Nets.
In Proceedings of the 1st ACM SIGSIM Conference on
Principles of Advanced Discrete Simulation (PADS'13), pages
253--264, Montreal, Canada, May 2013. ACM Press.
doi:
10.1145/2486092.2486124.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AFS13b]
-
É. André, L. Fribourg, and J. Sproston.
An Extension of the Inverse Method to Probabilistic Timed
Automata.
Formal Methods in System Design, 42(2):119--145, April 2013.
doi:
10.1007/s10703-012-0169-x.
[ BibTex |
DOI |
Web page |
PDF ]
-
[VM13b]
-
S. Valette and N. Markey.
Minutes of the Kick-Off Meeting.
Cassting deliverable D6.1 (FP7-ICT-601148), April 2013.
9 pages.
[ BibTex |
Web page |
PDF ]
-
[BCG+13]
-
L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and
C. Vacher.
Decidable Classes of Tree Automata Mixing Local and Global
Constraints Modulo Flat Theories.
Logical Methods in Computer Science, 9(2), April 2013.
doi:
10.2168/LMCS-9(2:1)2013.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCH+13c]
-
B. Bollig, A. Cyriac, L. Hélouët, A. Kara, and
Th. Schwentick.
Dynamic Communicating Automata and Branching High-Level MSCs.
In Proceedings of the 7th International Conference on
Language and Automata Theory and Applications (LATA'13), volume
7810 of Lecture Notes in Computer Science, pages 177--189, Bilbao, Spain,
April 2013. Springer.
doi:
10.1109/REVET.2012.6195253.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CB13]
-
V. Cheval and B. Blanchet.
Proving More Observational Equivalences with ProVerif.
In Proceedings of the 2nd International Conference on
Principles of Security and Trust (POST'13), volume 7796 of Lecture
Notes in Computer Science, pages 226--246, Rome, Italy, March 2013. Springer.
doi:
10.1007/978-3-642-36830-1_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD13a]
-
R. Chrétien and S. Delaune.
Formal analysis of privacy for routing protocols in mobile
ad hoc networks.
In Proceedings of the 2nd International Conference on
Principles of Security and Trust (POST'13), volume 7796 of Lecture
Notes in Computer Science, pages 1--20, Rome, Italy, March 2013. Springer.
doi:
10.1007/978-3-642-36830-1_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFHR13]
-
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo.
Ordinal Theory for Expressiveness of Well-Structured Transition
Systems.
Information and Computation, 224:1--22, March 2013.
doi:
10.1016/j.ic.2012.11.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou13c]
-
J. Goubault-Larrecq.
Non-Hausdorff Topology and Domain Theory---Selected Topics in
Point-Set Topology, volume 22 of New Mathematical Monographs.
Cambridge University Press, March 2013.
[ BibTex |
Web page ]
-
[BC13b]
-
R. Bonnet and R. Chadha.
Bounded Context-Switching and Reentrant Locking.
In Proceedings of the 16th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages
65--80, Rome, Italy, March 2013. Springer.
doi:
10.1007/978-3-642-37075-5_5.
[ BibTex |
DOI ]
-
[LGBB13]
-
G. Lipari, L. George, E. Bini, and M. Bertogna.
On the Average Complexity of the Processor Demand Analysis for
Earliest Deadline Scheduling.
In Real-Time Sytems: the past, the present, and the future --
Proceedings of a conference organized in celebration of Professor
Alan Burns' sixtieth birthday, pages 75--86, York, UK, March 2013.
CreateSpace Independent Publishing Platform.
[ BibTex |
Web page |
PDF ]
-
[LB13]
-
G. Lipari and G. Buttazzo.
Resource reservation for Mixed Criticality Systems.
In Real-Time Sytems: the past, the present, and the future --
Proceedings of a conference organized in celebration of Professor
Alan Burns' sixtieth birthday, pages 60--74, York, UK, March 2013.
CreateSpace Independent Publishing Platform.
[ BibTex |
Web page |
PDF ]
-
[DKN+13]
-
M. Duflot, M. Kwiatkowska, G. Norman, D. Parker,
S. Peyronnet, C. Picaronny, and J. Sproston.
Practical Applications of Probabilistic Model Checking to
Communication Protocols.
In Formal Methods for Industrial Critical Systems: A Survey of
Applications, chapter 7, pages 133--150. John Wiley & Sons, Ltd. and IEEE
Computer Society Press, March 2013.
doi:
10.1002/9781118459898.ch7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABMW13]
-
S. Abiteboul, P. Bourhis, A. Muscholl, and Z. Wu.
Recursive queries on trees and data trees.
In Proceedings of the 16th International Conference on
Database Theory (ICDT'13), pages 93--104, Genoa, Italy, March 2013. ACM
Press.
doi:
10.1145/2448496.2448509.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGM13]
-
B. Bollig, P. Gastin, and B. Monmege.
Weighted Specifications over Nested Words.
In Proceedings of the 16th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages
385--400, Rome, Italy, March 2013. Springer.
doi:
10.1007/978-3-642-37075-5_25.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BNS13]
-
E. Bertsch, M.-J. Nederhof, and S. Schmitz.
On LR Parsing with Selective Delays.
In Proceedings of the 22nd International Conference on
Compiler Construction (CC'13), volume 7791 of Lecture Notes in Computer
Science, pages 244--263, Rome, Italy, March 2013. Springer.
doi:
10.1007/978-3-642-37051-9_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS13a]
-
P. Karandikar and S. Schmitz.
The Parametric Ordinal-Recursive Complexity of Post Embedding
Problems.
In Proceedings of the 16th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages
273--288, Rome, Italy, March 2013. Springer.
doi:
10.1007/978-3-642-37075-5_18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fin13]
-
A. Finkel.
REACHARD -- Compte-rendu intermédiaire.
Deliverable D2 Reachard (ANR-11-BS02-001), March 2013.
9 pages.
[ BibTex ]
-
[BCH+13b]
-
B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H.
Roux.
The Expressive Power of Time Petri Nets.
Theoretical Computer Science, 474:1--20, February 2013.
doi:
10.1016/j.tcs.2012.12.005.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCD13]
-
M. Baudet, V. Cortier, and S. Delaune.
YAPA: A generic tool for computing intruder knowledge.
ACM Transactions on Computational Logic, 14(1:4), February 2013.
doi:
10.1145/2422085.2422089.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FK13]
-
L. Fribourg and U. Kühne.
Parametric Verification and Test Coverage for Hybrid Automata
using the Inverse Method.
International Journal of Foundations of Computer Science,
24(2):233--249, February 2013.
doi:
10.1142/S0129054113400091.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HM13]
-
S. Haar and T. Masopust.
Languages, Decidability, and Complexity.
In Control of Discrete-Event Systems -- Automata and Petri Net
Perspectives, volume 433 of Lecture Notes in Control and Information
Sciences, pages 23--43. Springer, 2013.
doi:
10.1007/978-1-4471-4276-8_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HF13]
-
S. Haar and É. Fabre.
Diagnosis with Petri Net Unfoldings.
In Control of Discrete-Event Systems -- Automata and Petri Net
Perspectives, volume 433 of Lecture Notes in Control and Information
Sciences, pages 301--318. Springer, 2013.
doi:
10.1007/978-1-4471-4276-8_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBL+13]
-
B. Bérard, P. Bouyer, K. G. Larsen, N. Markey,
J. Mullins, O. Sankur, M. Sassolas, and C. Thrane.
Measuring the robustness.
Deliverable ImpRo 3.1, (ANR-10-BLAN-0317), January 2013.
59 pages.
[ BibTex |
Web page |
PDF ]
-
[BFH+13]
-
P. Bouyer, S. Faucou, S. Haar, A. Jovanivić, D. Lime,
N. Markey, O. H. Roux, and O. Sankur.
Control tasks for Timed System; Robustness issues.
Deliverable ImpRo 5.1, (ANR-10-BLAN-0317), January 2013.
34 pages.
[ BibTex |
Web page |
PDF ]
-
[AS13]
-
É. André and R. Soulat.
The Inverse Method.
Wiley-ISTE, January 2013.
176 pages.
[ BibTex |
Web page ]
-
[HMN13]
-
S. Haddad, J. Mairesse, and H.-T. Nguyen.
Synthesis and Analysis of Product-form Petri Nets.
Fundamenta Informaticae, 122(1-2):147--172, 2013.
doi:
10.3233/FI-2013-786.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GJ13]
-
J. Goubault-Larrecq and J.-P. Jouannaud.
The Blossom of Finite Semantic Trees.
In Programming Logics -- Essays in Memory of Harald Ganzinger,
volume 7797 of Lecture Notes in Computer Science, pages 90--122. Springer,
January 2013.
[ BibTex |
Web page |
PDF ]
-
[Bon13]
-
R. Bonnet.
Theory of Well-Structured Transition Systems and Extended
Vector-Addition Systems.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2013.
[ BibTex |
Web page |
PDF ]
-
[DR13]
-
L. Doyen and A. Rabinovich.
Robot games.
Research Report LSV-13-02, Laboratoire Spécification et
Vérification, ENS Cachan, France, January 2013.
2 pages.
[ BibTex |
Web page |
PDF ]
-
[Haa12]
-
S. Haar.
What topology tells us about diagnosability in partial order
semantics.
Discrete Event Dynamic Systems: Theory and Applications,
22(4):383--402, December 2012.
doi:
10.1007/s10626-011-0121-z.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CU12]
-
R. Chadha and M. Ummels.
The complexity of quantitative information flow in recursive
programs.
In Proceedings of the 32nd Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'12),
volume 18 of Leibniz International Proceedings in Informatics, pages
534--545, Hyderabad, India, December 2012. Leibniz-Zentrum für
Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2012.534.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Ben12b]
-
H. Benzina.
Enforcing Virtualized Systems Security.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2012.
[ BibTex |
Web page |
PDF ]
-
[Bal12]
-
S. Balaguer.
La concurrence dans les systèmes distribués
temps-réel.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2012.
[ BibTex |
Web page |
PDF ]
-
[FFL+12b]
-
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and
R. Soulat.
Correct-by-Design Control of 5-level and 7-level Power
Converters.
Research Report LSV-12-25, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2012.
8 pages.
[ BibTex |
Web page |
PDF ]
-
[FS12]
-
L. Fribourg and R. Soulat.
Controlled Recurrent Subspaces for Sampled Switched Linear
Systems.
Research Report LSV-12-24, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2012.
11 pages.
[ BibTex |
Web page |
PDF ]
-
[Ves12]
-
S. Vester.
Symmetric Nash equilibria.
Research Report LSV-12-23, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2012.
51 pages.
[ BibTex |
Web page |
PDF ]
-
[Che12]
-
V. Cheval.
Automatic verification of cryptographic protocols: privacy-type
properties.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2012.
[ BibTex |
Web page |
PDF ]
-
[CFM12b]
-
M. Cadilhac, A. Finkel, and P. McKenzie.
Bounded Parikh automata.
International Journal of Foundations of Computer Science,
23(8):1691--1710, December 2012.
doi:
10.1142/S0129054112400709.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGKR12]
-
D. Berwanger, E. Grädel, L. Kaiser, and
R. Rabinovich.
Entanglement and the complexity of directed graphs.
Theoretical Computer Science, 463:2--25, December 2012.
doi:
10.1016/j.tcs.2012.07.010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFP12]
-
R. Bonnet, A. Finkel, and M. Praveen.
Extending the Rackoff technique to affine nets.
In Proceedings of the 32nd Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'12),
volume 18 of Leibniz International Proceedings in Informatics, Hyderabad,
India, December 2012. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2012.301.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS12]
-
D. Berwanger and O. Serre.
Parity games on undirected graphs.
Information Processing Letters, 112(23):928--932, December 2012.
doi:
10.1016/j.ipl.2012.08.021.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GS12]
-
P. Gastin and N. Sznajder.
Decidability of well-connectedness for distributed synthesis.
Information Processing Letters, 112(24):963--968, December 2012.
doi:
10.1016/j.ipl.2012.08.018.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDF12]
-
A. Bušić, H. Djafri, and J.-M. Fourneau.
Bounded state space truncation and censored Markov chains.
In Proceedings of the 51st IEEE Conference on Decision and
Control (CDC'12), pages 5828--5833, Maui, Hawaii, USA, December 2012.
IEEE Control System Society.
doi:
10.1109/CDC.2012.6426156.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AvMSS12]
-
M. Anderson, D. van Melkebeek, N. Schweikardt, and
L. Segoufin.
Locality from Circuit Lower Bounds.
SIAM Journal on Computing, 41(6):1481--1523, November 2012.
doi:
10.1137/110856873.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bre12]
-
R. Brenguier.
Équilibres de Nash dans les Jeux Concurrents --
Application aux Jeux Temporisés.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2012.
[ BibTex |
Web page |
PDF ]
-
[BHP12b]
-
B. Barbot, S. Haddad, and C. Picaronny.
Importance Sampling for Model Checking of Continuous Time
Markov Chains.
In Proceedings of the 4th International Conference on
Advances in System Simulation (SIMUL'12), pages 30--35, Lisbon,
Portugal, November 2012. XPS.
[ BibTex |
Web page |
PDF ]
-
[CD12c]
-
K. Chatterjee and L. Doyen.
Energy parity games.
Theoretical Computer Science, 458:49--60, November 2012.
doi:
10.1016/j.tcs.2012.07.038.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FLC12]
-
D. Faggioli, G. Lipari, and T. Cucinotta.
Analysis and Implementation of the Multiprocessor Bandwidth
Inheritance Protocol.
Real-Time Systems, 48(6):789--825, November 2012.
doi:
10.1007/s11241-012-9162-0.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDG12]
-
S. Demri, D. D'Souza, and R. Gascon.
Temporal Logics of Repeating Values.
Journal of Logic and Computation, 22(5):1059--1096, October 2012.
doi:
10.1093/logcom/exr013.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFM12a]
-
M. Cadilhac, A. Finkel, and P. McKenzie.
Affine Parikh automata.
RAIRO Informatique Théorique et Applications, 46(4):511--545,
October 2012.
doi:
10.1051/ita/2012013.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDMM12]
-
Ph. Darondeau, S. Demri, R. Meyer, and
Ch. Morvan.
Petri Net Reachability Graphs: Decidability Status of FO
Properties.
Logical Methods in Computer Science, 8(4:9), October 2012.
doi:
10.2168/LMCS-8(4:9)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AG12]
-
A. Adjé and J. Goubault-Larrecq.
Concrete Semantics of Programs with Non-Deterministic and Random
Inputs.
Research Report cs.LO/1210.2605, Computing Research Repository,
October 2012.
19 pages.
[ BibTex |
Web page |
PDF ]
-
[BGMZ12]
-
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun.
A Probabilistic Kleene Theorem.
In Proceedings of the 10th International Symposium on
Automated Technology for Verification and Analysis (ATVA'12),
volume 7561 of Lecture Notes in Computer Science, pages 400--415,
Thiruvananthapuram, India, October 2012. Springer.
doi:
10.1007/978-3-642-33386-6_31.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SVMdM12]
-
D. V. Simões De Sousa, H. Viana, N. Markey, and
J. A. F. de Macêdo.
Querying Trajectories through Model Checking based on Timed
Automata.
In Proceedings of the 27th Brazilian Symposium on Databases
(SBBD'12), São Paulo, Brazil, October 2012. Sociedade Brasileira de
Computação.
[ BibTex |
Web page |
PDF ]
-
[AGL12]
-
A. Adjé and J. Goubault-Larrecq.
Concrete semantics of programs with non-deterministic and random
inputs.
Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities),
WP 2, version 1, October 2012.
[ BibTex |
Web page ]
-
[FG12a]
-
A. Finkel and J. Goubault-Larrecq.
Forward Analysis for WSTS, Part II: Complete WSTS.
Logical Methods in Computer Science, 8(3:28), September 2012.
doi:
10.2168/LMCS-8(3:28)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Abi12b]
-
S. Abiteboul.
Sharing Distributed Knowledge on the Web (Invited Talk).
In Proceedings of the 21st Annual EACSL Conference on
Computer Science Logic (CSL'12), volume 16 of Leibniz International
Proceedings in Informatics, pages 6--8, Fontainebleau, France, September
2012. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.CSL.2012.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BSS12]
-
M. Bojańczyk, L. Segoufin, and H. Straubing.
Piecewise testable tree languages.
Logical Methods in Computer Science, 8(3:26), September 2012.
doi:
10.2168/LMCS-8(3:26)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Chr12]
-
R. Chrétien.
Trace equivalence of protocols for an unbounded number of
sessions.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2012.
30 pages.
[ BibTex |
Web page |
PDF ]
-
[KS12b]
-
R. Künnemann and G. Steel.
YubiSecure? Formal Security Analysis Results for the
Yubikey and YubiHSM.
In Revised Selected Papers of the 8th Workshop on Security
and Trust Management (STM'12), volume 7783 of Lecture Notes in Computer
Science, pages 257--272, Pisa, Italy, September 2012. Springer.
doi:
10.1007/978-3-642-38004-4_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FLP12]
-
A. Finkel, J. Leroux, and I. Potapov, editors.
Proceedings of the 6th International Wokshop on
Reachability Problems (RP'12), volume 7550 of Lecture Notes in
Computer Science, Bordeaux, France, September 2012. Springer.
doi:
10.1007/978-3-642-33512-9.
[ BibTex |
DOI |
Web page ]
-
[SLBC12]
-
R. M. Santos, G. Lipari, E. Bini, and T. Cucinotta.
On-line schedulability tests for adaptive reservations in fixed
priority scheduling.
Real-Time Systems, 48(5):601--634, September 2012.
doi:
10.1007/s11241-012-9156-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JKS12]
-
P. Jančar, P. Karandikar, and Ph. Schnoebelen.
Unidirectional channel systems can be tested.
In Proceedings of the 7th IFIP International Conference on
Theoretical Computer Science (IFIP TCS'12), volume 7604 of Lecture
Notes in Computer Science, pages 149--163, Amsterdam, The Netherlands,
September 2012. Springer.
doi:
10.1007/978-3-642-33475-7_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RS12]
-
C. Rodríguez and S. Schwoon.
Verification of Petri Nets with Read Arcs.
In Proceedings of the 23rd International Conference on
Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in
Computer Science, pages 471--485, Newcastle, UK, September 2012. Springer.
doi:
10.1007/978-3-642-32940-1_33.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CGNK12]
-
A. Cyriac, P. Gastin, and K. Narayan Kumar.
MSO Decidability of Multi-Pushdown Systems via Split-Width.
In Proceedings of the 23rd International Conference on
Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in
Computer Science, pages 547--561, Newcastle, UK, September 2012. Springer.
doi:
10.1007/978-3-642-32940-1_38.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGS12]
-
R. Brenguier, S. Göller, and O. Sankur.
A Comparison of Succinctly Represented Finite-State Systems.
In Proceedings of the 23rd International Conference on
Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in
Computer Science, pages 147--161, Newcastle, UK, September 2012. Springer.
doi:
10.1007/978-3-642-32940-1_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHSS12]
-
B. Bérard, S. Haddad, M. Sassolas, and N. Sznajder.
Concurrent Games on VASS with Inhibition.
In Proceedings of the 23rd International Conference on
Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in
Computer Science, pages 39--52, Newcastle, UK, September 2012. Springer.
doi:
10.1007/978-3-642-32940-1_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BC12a]
-
S. Balaguer and Th. Chatain.
Avoiding Shared Clocks in Networks of Timed Automata.
In Proceedings of the 23rd International Conference on
Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in
Computer Science, pages 100--114, Newcastle, UK, September 2012. Springer.
doi:
10.1007/978-3-642-32940-1_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLM12]
-
A. Da Costa, F. Laroussinie, and N. Markey.
Quantified CTL: expressiveness and model checking.
In Proceedings of the 23rd International Conference on
Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in
Computer Science, pages 177--192, Newcastle, UK, September 2012. Springer.
doi:
10.1007/978-3-642-32940-1_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FLMS12]
-
L. Fribourg, D. Lesens, P. Moro, and R. Soulat.
Robustness Analysis for Scheduling Problems using the Inverse
Method.
In Proceedings of the 19th International Symposium on
Temporal Representation and Reasoning (TIME'12), pages 73--80,
Leicester, UK, September 2012. IEEE Computer Society Press.
doi:
10.1109/TIME.2012.10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBJM12]
-
P. Bouyer, Th. Brihaye, M. Jurdziński, and
Q. Menet.
Almost-Sure Model-Checking of Reactive Timed Automata.
In Proceedings of the 9th International Conference on
Quantitative Evaluation of Systems (QEST'12), pages 138--147, London,
UK, September 2012. IEEE Computer Society Press.
doi:
10.1109/QEST.2012.10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLM12]
-
P. Bouyer, K. G. Larsen, and N. Markey.
Lower-Bound Constrained Runs in Weighted Timed Automata.
In Proceedings of the 9th International Conference on
Quantitative Evaluation of Systems (QEST'12), pages 128--137, London,
UK, September 2012. IEEE Computer Society Press.
doi:
10.1109/QEST.2012.28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFM12c]
-
M. Cadilhac, A. Finkel, and P. McKenzie.
Unambiguous Constrained Automata.
In Proceedings of the 16th International Conference on
Developments in Language Theory (DLT'12), volume 7410 of Lecture
Notes in Computer Science, pages 239--250, Taipei, Taiwan, August 2012.
Springer.
doi:
10.1007/978-3-642-31653-1_22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKL12]
-
D. Berwanger, L. Kaiser, and S. Leßenich.
Solving Counter Parity Games.
In Proceedings of the 37th International Symposium on
Mathematical Foundations of Computer Science (MFCS'12), volume 7464
of Lecture Notes in Computer Science, pages 160--171, Bratislava, Slovakia,
August 2012. Springer.
doi:
10.1007/978-3-642-32589-2_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBC+12]
-
P. Baldan, A. Bruni, A. Corradini, B. König,
C. Rodríguez, and S. Schwoon.
Efficient unfolding of contextual Petri nets.
Theoretical Computer Science, 449(1):2--22, August 2012.
doi:
10.1016/j.tcs.2012.04.046.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFK+12]
-
R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel,
and J.-K. Tsay.
Efficient Padding Oracle Attacks on Cryptographic Hardware.
In Proceedings of the 32nd Annual International Cryptology
Conference (CRYPTO'12), volume 7417 of Lecture Notes in Computer Science,
pages 608--625, Santa Barbara, California, USA, August 2012. Springer.
doi:
10.1007/978-3-642-32009-5_36.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD12b]
-
F. Carreiro and S. Demri.
Beyond Regularity for Presburger Modal Logics.
In Selected Papers from the 9th Workshop on Advances in
Modal Logics (AiML'12), pages 161--182, Copenhagen, Denmark, August
2012. College Publications.
[ BibTex |
Web page |
PDF ]
-
[AFKS12]
-
É. André, L. Fribourg, U. Kühne, and R. Soulat.
IMITATOR 2.5: A Tool for Analyzing Robustness in Scheduling
Problems.
In Proceedings of the 18th International Symposium on Formal
Methods (FM'12), volume 7436 of Lecture Notes in Computer Science, pages
33--36, Paris, France, August 2012. Springer.
doi:
10.1007/978-3-642-32759-9_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AMH12]
-
A. Agarwal, A. Madalinski, and S. Haar.
Effective Verification of Weak Diagnosability.
In Proceedings of the 8th IFAC Symposium on Fault
Detection, Supervision and Safety for Technical Processes
(SAFEPROCESS'12), Mexico City, Mexico, August 2012. IFAC.
doi:
10.3182/20120829-3-MX-2028.00083.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DG12]
-
S. Demri and P. Gastin.
Specification and Verification using Temporal Logics.
In Modern applications of automata theory, volume 2 of IISc Research
Monographs, chapter 15, pages 457--494. World Scientific, July 2012.
[ BibTex |
Web page |
PDF ]
-
[BDH+12]
-
D. Berwanger, A. Dawar, P. Hunter, S. Kreutzer, and
J. Obdrzálek.
The DAG-width of directed graphs.
Journal of Combinatorial Theory, Series B, 102(4):900--923, July
2012.
doi:
10.1016/j.jctb.2012.04.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FFL+12c]
-
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and
R. Soulat.
Numerical simulation and physical experimentation of a 5-level
and 7-level power converter under a control designed by a formal method.
Research Report LSV-12-16, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2012.
18 pages.
[ BibTex |
Web page |
PDF ]
-
[Loz12]
-
É. Lozes.
Separation Logic: Expressiveness and Copyless Message-Passing.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, July 2012.
[ BibTex |
Web page |
PDF ]
-
[GM12]
-
P. Gastin and B. Monmege.
Adding Pebbles to Weighted Automata.
In Proceedings of the 17th International Conference on
Implementation and Application of Automata (CIAA'12), volume 7381 of
Lecture Notes in Computer Science, pages 28--51, Porto, Portugal, July 2012.
Springer-Verlag.
doi:
10.1007/978-3-642-31606-7_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMO+12]
-
P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen,
and J. Worrell.
On Termination and Invariance for Faulty Channel Systems.
Formal Aspects of Computing, 24(4-6):595--607, July 2012.
doi:
10.1007/s00165-012-0234-7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDL12a]
-
B. Bollig, N. Decker, and M. Leucker.
Frequency Linear-time Temporal Logic.
In Proceedings of the 6th International Symposium on
Theoretical Aspects of Software Engineering (TASE'12), pages
85--92, Beijing, China, July 2012. IEEE Computer Society Press.
doi:
10.1109/TASE.2012.43.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMS12]
-
P. Bouyer, N. Markey, and O. Sankur.
Robust Reachability in Timed Automata: A Game-based Approach.
In Proceedings of the 39th International Colloquium on
Automata, Languages and Programming (ICALP'12) -- Part II, volume
7392 of Lecture Notes in Computer Science, pages 128--140, Warwick, UK, July
2012. Springer.
doi:
10.1007/978-3-642-31585-5_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Ben12a]
-
H. Benzina.
A Network Policy Model for Virtualized Systems.
In Proceedings of the 17th IEEE Symposium on Computers and
Communications (ISCC'12), pages 680--683, Nevsehir, Turkey, July
2012. IEEE Computer Society Press.
doi:
10.1109/ISCC.2012.6249376.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KS12a]
-
P. Karandikar and Ph. Schnoebelen.
Cutting Through Regular Post Embedding Problems.
In Proceedings of the 7th International Computer Science
Symposium in Russia (CSR'12), volume 7353 of Lecture Notes in Computer
Science, pages 229--240, Nizhni Novgorod, Russia, July 2012. Springer.
doi:
10.1007/978-3-642-30642-6_22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Abi12c]
-
S. Abiteboul.
Viewing the Web as a Distributed Knowledge Base.
In Proceedings of the 2012 International Workshop Description
Logic (DL'09), volume 846 of CEUR Workshop Proceedings, Rome, Italy, June
2012. RWTH Aachen, Germany.
[ BibTex |
Web page |
PDF ]
-
[CD12d]
-
K. Chatterjee and L. Doyen.
Partial-Observation Stochastic Games: How to Win when Belief
Fails.
In Proceedings of the 27th Annual IEEE Symposium on Logic
in Computer Science (LICS'12), pages 175--184, Dubrovnik, Croatia, June
2012. IEEE Computer Society Press.
doi:
10.1109/LICS.2012.28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HP12]
-
S. Haddad and L. Pomello, editors.
Proceedings of the 33rd International Conference on
Applications and Theory of Petri Nets (ICATPN'12), volume 7347 of
Lecture Notes in Computer Science, Hamburg, Germany, June 2012. Springer.
doi:
10.1007/978-3-642-31131-4.
[ BibTex |
DOI |
Web page ]
-
[FG12b]
-
A. Finkel and J. Goubault-Larrecq.
The Theory of WSTS: The Case of Complete WSTS.
In Proceedings of the 33rd International Conference on
Applications and Theory of Petri Nets (PETRI NETS'12), volume 7347
of Lecture Notes in Computer Science, pages 3--31, Hamburg, Germany, June
2012. Springer.
doi:
10.1007/978-3-642-31131-4_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FFL+12a]
-
G. Feld, L. Fribourg, D. Labrousse, S. Lefebvre, B. Revol,
and R. Soulat.
Control of Multilevel Power Converters using Formal Methods.
Research Report LSV-12-14, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2012.
14 pages.
[ BibTex |
Web page |
PDF ]
-
[Dja12]
-
H. Djafri.
Approches numériques et statistiques pour le model checking
des processus stochastiques.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2012.
[ BibTex |
Web page |
PDF ]
-
[HSS12]
-
S. Haddad, S. Schmitz, and Ph. Schnoebelen.
The Ordinal-Recursive Complexity of Timed-Arc Petri Nets, Data
Nets, and Other Enriched Nets.
In Proceedings of the 27th Annual IEEE Symposium on Logic
in Computer Science (LICS'12), pages 355--364, Dubrovnik, Croatia, June
2012. IEEE Computer Society Press.
doi:
10.1109/LICS.2012.46.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDS12b]
-
S. Demri, A. K. Dhar, and A. Sangnier.
Taming Past LTL and Flat Counter Systems.
In Proceedings of the 6th International Joint Conference on
Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in
Artificial Intelligence, pages 179--193, Manchester, UK, June 2012.
Springer-Verlag.
doi:
10.1007/978-3-642-31365-3_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD12]
-
M. Arapinis, V. Cheval, and S. Delaune.
Verifying privacy-type properties in a modular way.
In Proceedings of the 25th IEEE Computer Security
Foundations Symposium (CSF'12), pages 95--109, Cambridge Massachusetts,
USA, June 2012. IEEE Computer Society Press.
doi:
10.1109/CSF.2012.16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKP12]
-
S. Delaune, S. Kremer, and D. Pasailă.
Security protocols, constraint systems, and group theories.
In Proceedings of the 6th International Joint Conference on
Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in
Artificial Intelligence, pages 164--178, Manchester, UK, June 2012.
Springer-Verlag.
doi:
10.1007/978-3-642-31365-3_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCH12a]
-
S. Balaguer, Th. Chatain, and S. Haar.
A Concurrency-Preserving Translation from Time Petri Nets to
Networks of Timed Automata.
Formal Methods in System Design, 40(3):330--355, June 2012.
doi:
10.1007/s10703-012-0146-4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BK12]
-
B. Bollig and D. Kuske.
An optimal construction of Hanf sentences.
Journal of Applied Logic, 10(2):179--186, June 2012.
doi:
10.1016/j.jal.2012.01.002.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABD12]
-
S. Abiteboul, M. Bienvenu, and D. Deutch.
Deduction in the Presence of Distribution and Contradictions.
In Proceedings of the 15th International Workshop on the Web
and Databases (WebDB'12), pages 31--36, Scottsdale, Arizona, USA, May
2012.
[ BibTex |
Web page |
PDF ]
-
[AAMS12]
-
S. Abiteboul, Y. Amsterdamer, T. Milo, and P. Senellart.
Auto-completion learning for XML.
In Proceedings of the ACM SIGMOD Internaitonal Conference
on Management of Data (SIGMOD'12), pages 669--672, Scottsdale, Arizona,
USA, May 2012. ACM Press.
doi:
10.1145/2213836.2213928.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABV12a]
-
S. Abiteboul, P. Bourhis, and V. Vianu.
Comparing workflow specification languages: A matter of views.
ACM Transactions on Database Systems, 37(2:10), May 2012.
doi:
10.1145/2188349.2188352.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PHL12]
-
H. Ponce de León, S. Haar, and D. Longuet.
Conformance Relations for Labeled Event Structures.
In Proceedings of the 6th International Conference on Tests
and Proofs (TAP'12), volume 7305 of Lecture Notes in Computer Science,
pages 83--98, Prague, Czech Republic, May-June 2012. Springer.
doi:
10.1007/978-3-642-30473-6_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[IL12]
-
M. Izabachène and B. Libert.
Divisible E-Cash in the Standard Model.
In Proceedings of the 5th International Conference on
Pairing-Based Cryptography (PAIRING'12), volume 7708 of Lecture Notes
in Computer Science, pages 314--332, Cologne, Germany, May 2012. Springer.
doi:
10.1007/978-3-642-36334-4_20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Ben12c]
-
H. Benzina.
Towards Designing Secure Virtualized Systems.
In Proceedings of the 2nd International Conference on Digital
Information and Communication Technology and its Application
(DICTAP'12), pages 250--255, Bangkok, Thailand, May 2012. IEEE Computer
Society Press.
doi:
10.1109/DICTAP.2012.6215385.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD12e]
-
H. Comon-Lundh and S. Delaune.
Formal Security Proofs.
In Software Safety and Security, volume 33 of NATO Science for Peace
and Security Series -- D: Information and Communication Security, pages
26--63. IOS Press, May 2012.
[ BibTex |
Web page |
PDF ]
-
[CD12f]
-
V. Cortier and S. Delaune.
Decidability and combination results for two notions of
knowledge in security protocols.
Journal of Automated Reasoning, 48(4):441--487, April 2012.
doi:
10.1007/s10817-010-9208-8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ASV12]
-
S. Abiteboul, P. Senellart, and V. Vianu.
The ERC webdam on foundations of web data management.
In Proceedings of the 21st World Wide Web Conference
(WWW'12) -- Companion Volume, pages 211--214, Lyon, France, April 2012.
ACM Press.
[ BibTex |
Web page |
PDF ]
-
[AAS12]
-
S. Abiteboul, É. Antoine, and J. Stoyanovich.
Viewing the Web as a Distributed Knowledge Base.
In Proceedings of the 28th International Conference on Data
Engineering (ICDE'12), pages 1--4, Washington, D.C., USA, April 2012.
IEEE Computer Society Press.
doi:
10.1109/ICDE.2012.150.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AFS12]
-
É. André, L. Fribourg, and R. Soulat.
Enhancing the Inverse Method with State Merging.
In Proceedings of the 4th NASA Formal Methods Symposium
(NFM'12), volume 7226 of Lecture Notes in Computer Science, pages 100--105,
Norfolk, Virginia, USA, April 2012. Springer.
doi:
10.1007/978-3-642-28891-3_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GMM12]
-
P. Ganty, R. Majumdar, and B. Monmege.
Bounded underapproximations.
Formal Methods in System Design, 40(2):206--231, April 2012.
doi:
10.1007/s10703-011-0136-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CHKS12]
-
H. Comon-Lundh, M. Hagiya, Y. Kawamoto, and H. Sakurada.
Computational Soundness of Indistinguishability Properties
without Computable Parsing.
In Proceedings of the 8th International Conference on
Information Security Practice and Experience (ISPEC'12), volume
7232 of Lecture Notes in Computer Science, pages 63--79, Hangzhou, China,
April 2012. Springer.
doi:
10.1007/978-3-642-29101-2_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGGP12]
-
O. Bouissou, É. Goubault, J. Goubault-Larrecq, and
S. Putot.
A Generalization of P-boxes to Affine Arithmetic, and
Applications to Static Analysis of Programs.
Computing, 94(2-4):189--201, March 2012.
doi:
10.1007/s00607-011-0182-8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BC12b]
-
G. Bana and H. Comon-Lundh.
Towards Unconditional Soundness: Computationally Complete
Symbolic Attacker.
In Proceedings of the 1st International Conference on
Principles of Security and Trust (POST'12), volume 7215 of Lecture
Notes in Computer Science, pages 189--208, Tallinn, Estonia, March 2012.
Springer.
doi:
10.1007/978-3-642-28641-4_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCS12]
-
H. Comon-Lundh, V. Cortier, and G. Scerri.
Security proof with dishonest keys.
In Proceedings of the 1st International Conference on
Principles of Security and Trust (POST'12), volume 7215 of Lecture
Notes in Computer Science, pages 149--168, Tallinn, Estonia, March 2012.
Springer.
doi:
10.1007/978-3-642-28641-4_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDD12]
-
V. Cortier, J. Degrieck, and S. Delaune.
Analysing routing protocols: four nodes topologies are
sufficient.
In Proceedings of the 1st International Conference on
Principles of Security and Trust (POST'12), volume 7215 of Lecture
Notes in Computer Science, pages 30--50, Tallinn, Estonia, March 2012.
Springer.
doi:
10.1007/978-3-642-28641-4_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHP12a]
-
B. Barbot, S. Haddad, and C. Picaronny.
Coupling and Importance Sampling for Statistical Model
Checking.
In Proceedings of the 18th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'12),
volume 7214 of Lecture Notes in Computer Science, pages 331--346, Tallinn,
Estonia, March 2012. Springer.
doi:
10.1007/978-3-642-28756-5_23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CMV12]
-
R. Chadha, P. Madhusudan, and M. Viswanathan.
Reachability under Contextual Locking.
In Proceedings of the 18th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'12),
volume 7214 of Lecture Notes in Computer Science, pages 437--450, Tallinn,
Estonia, March 2012. Springer.
doi:
10.1007/978-3-642-28756-5_30.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCGNK12]
-
B. Bollig, A. Cyriac, P. Gastin, and K. Narayan Kumar.
Model Checking Languages of Data Words.
In Proceedings of the 15th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages
391--405, Tallinn, Estonia, March 2012. Springer.
doi:
10.1007/978-3-642-28729-9_26.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBMU12]
-
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels.
Concurrent games with ordered objectives.
In Proceedings of the 15th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages
301--315, Tallinn, Estonia, March 2012. Springer.
doi:
10.1007/978-3-642-28729-9_20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BJ12]
-
A. Bouhoula and F. Jacquemard.
Sufficient completeness verification for conditional and
constrained TRS.
Journal of Applied Logic, 10(1):127--143, March 2012.
doi:
10.1016/j.jal.2011.09.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABV12b]
-
S. Abiteboul, P. Bourhis, and V. Vianu.
Highly expressive query languages for unordered data trees.
In Proceedings of the 15th International Conference on
Database Theory (ICDT'12), pages 46--60, Berlin, Germany, March 2012.
ACM Press.
doi:
10.1145/2274576.2274583.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AAD+12]
-
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and
P. Senellart.
Finding optimal probabilistic generators for XML collections.
In Proceedings of the 15th International Conference on
Database Theory (ICDT'12), pages 127--139, Berlin, Germany, March 2012.
ACM Press.
doi:
10.1145/2274576.2274591.
[ BibTex |
DOI |
Web page |
PDF ]
-
[IHL+12]
-
R. Iosif, P. Habermehl, S. Labbe, É. Lozes, and
B. Yakobowski.
Concurrent Programs with Simple Data Structures ash
Sequential Programs with Composite Data Structures.
Deliverable VERIDYC D 2 (ANR-09-SEGI-016), March 2012.
[ BibTex |
Web page |
PDF ]
-
[LL12]
-
M. Lange and É. Lozes.
Model-Checking the Higher-Dimensional Modal μ-Calculus.
In Proceedings of the 8th Workshop on Fixed Points in
Computer Science (FICS'12), volume 77 of Electronic Proceedings in
Theoretical Computer Science, pages 39--46, Tallinn, Estonia, March 2012.
doi:
10.4204/EPTCS.77.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCH12b]
-
S. Balaguer, Th. Chatain, and S. Haar.
Concurrent semantics for timed distributed systems.
Deliverable ImpRo D 4.1 (ANR-2010-BLAN-0317), March 2012.
[ BibTex |
Web page |
PDF ]
-
[Doy12]
-
L. Doyen.
Games and Automata: From Boolean to Quantitative Verification.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, March 2012.
[ BibTex |
Web page |
PDF ]
-
[Sou12]
-
R. Soulat.
Scheduling with IMITATOR: Some Case Studies.
Research Report LSV-12-05, Laboratoire Spécification et
Vérification, ENS Cachan, France, March 2012.
13 pages.
[ BibTex |
Web page |
PDF ]
-
[CCK12]
-
R. Chadha, S. Ciobâcă, and S. Kremer.
Automated verification of equivalence properties of
cryptographic protocols.
In Programming Languages and Systems --- Proceedings of the
22nd European Symposium on Programming (ESOP'12), volume 7211 of
Lecture Notes in Computer Science, pages 108--127, Tallinn, Estonia, March
2012. Springer.
doi:
10.1007/978-3-642-28869-2_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLL+12]
-
G. Belkacem, D. Labrousse, S. Lefebvre, P.-Y. Joubert,
U. Kühne, L. Fribourg, R. Soulat, É. Florentin, and
Ch. Rey.
Distributed and Coupled Electrothermal Model of Power
Semiconductor Devices.
In Proceedings of the 1st International Conference on
Renewable Energies and VEhicular Technology (REVET'12), pages
84--89, Hammamet, Tunisia, March 2012. IEEE Power & Energy Society.
doi:
10.1109/REVET.2012.6195253.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KMT12]
-
S. Kremer, A. Mercier, and R. Treinen.
Reducing Equational Theories for the Decision of Static
Equivalence.
Journal of Automated Reasoning, 2(48):197--217, February 2012.
doi:
10.1007/s10817-010-9203-0.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDK12]
-
S. Ciobâcă, S. Delaune, and S. Kremer.
Computing knowledge in security protocols under convergent
equational theories.
Journal of Automated Reasoning, 48(2):219--262, February 2012.
doi:
10.1007/s10817-010-9197-7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DJLL12]
-
S. Demri, M. Jurdziński, O. Lachish, and R. Lazić.
The covering and boundedness problems for branching vector
addition systems.
Journal of Computer and System Sciences, 79(1):23--38, February 2012.
doi:
10.1016/j.jcss.2012.04.002.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHP12c]
-
B. Barbot, S. Haddad, and C. Picaronny.
Importance Sampling for Model Checking of Time-Bounded Until.
Research Report LSV-12-04, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2012.
14 pages.
[ BibTex |
Web page |
PDF ]
-
[BHS12]
-
B. Bérard, S. Haddad, and M. Sassolas.
Interrupt Timed Automata: Verification and Expressiveness.
Formal Methods in System Design, 40(1):41--87, February 2012.
doi:
10.1007/s10703-011-0140-2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDL12b]
-
R. Brochenin, S. Demri, and É. Lozes.
On the Almighty Wand.
Information and Computation, 211:106--137, February 2012.
doi:
10.1016/j.ic.2011.12.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou12]
-
J. Goubault-Larrecq.
QRB-Domains and the Probabilistic Powerdomain.
Logical Methods in Computer Science, 8(1:14), 2012.
doi:
10.2168/LMCS-8(1:14)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD12a]
-
P. Cabalar and S. Demri.
Automata-Based Computation of Temporal Equilibrium Models.
In Proceedings of the 21st International Workshop on Logic
Program Synthesis and Transformation (LOPSTR'11), volume 7225 of
Lecture Notes in Computer Science, pages 57--72, Odense, Denmark, 2012.
Springer.
doi:
10.1007/978-3-642-32211-2_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDS12a]
-
M. Dahl, S. Delaune, and G. Steel.
Formal Analysis of Privacy for Anonymous Location Based
Services.
In Revised Selected Papaers of the Workshop on Theory of
Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in
Computer Science, pages 98--112, Saarbrücken, Germany, January 2012.
Springer.
doi:
10.1007/978-3-642-27375-9_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JLTV12]
-
F. Jacquemard, É. Lozes, R. Treinen, and J. Villard.
Multiple Congruence Relations, First-Order Theories on Terms,
and the Frames of the Applied Pi-Calculus.
In Revised Selected Papaers of the Workshop on Theory of
Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in
Computer Science, pages 166--185, Saarbrücken, Germany, January 2012.
Springer.
doi:
10.1007/978-3-642-27375-9_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Abi12a]
-
S. Abiteboul.
Sciences des données: De la logique du premier ordre à
la Toile.
Leçons inaugurales du Collège de France. Fayard, 2012.
[ BibTex ]
-
[LV12]
-
É. Lozes and J. Villard.
Reliable Contracts for Unreliable Half-Duplex Communications.
In Revised Selected Papers of the 8th International
Workshop on Web Services and Formal Methods (WS-FM'11), volume
7176 of Lecture Notes in Computer Science, pages 2--16, Clermont-Ferrand,
France, 2012. Springer.
doi:
10.1007/978-3-642-29834-9_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABB+12]
-
S. Akshay, B. Bérard, P. Bouyer, S. Haar, S. Haddad,
C. Jard, D. Lime, N. Markey, P.-A. Reynier, O. Sankur, and Y. Thierry-Mieg.
Overview of Robustness in Timed Systems.
Deliverable ImpRo D 2.1 (ANR-2010-BLAN-0317), January 2012.
[ BibTex |
Web page |
PDF ]
-
[AGG12]
-
A. Adjé, S. Gaubert, and É. Goubault.
Coupling policy iteration with semi-definite relaxation to
compute accurate numerical invariants in static analysis.
Logical Methods in Computer Science, 8(1:1), January 2012.
doi:
10.2168/LMCS-8(1:01)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fig12]
-
D. Figueira.
Alternating register automata on finite words and trees.
Logical Methods in Computer Science, 8(1:22), 2012.
doi:
10.2168/LMCS-8(1:22)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFLZ12]
-
R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun.
Model Checking Vector Addition Systems with one zero-test.
Logical Methods in Computer Science, 8(2:11), 2012.
doi:
10.2168/LMCS-8(2:11)2012.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EHH12]
-
D. El Hog-Benzina, S. Haddad, and R. Hennicker.
Refinement and Asynchronous Composition of Modal Petri Nets.
In Transactions on Petri Nets and Other Models of Concurrency V,
volume 6900 of Lecture Notes in Computer Science, pages 96--120. Springer,
2012.
doi:
10.1007/978-3-642-29072-5_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACK+11]
-
S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and
P. Senellart.
Capturing continuous data and answering aggregate queries in
probabilistic XML.
ACM Transactions on Database Systems, 36(4:25), December 2011.
doi:
10.1145/2043652.2043658.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD11b]
-
M. Arnaud, V. Cortier, and S. Delaune.
Modeling and Verifying Ad Hoc Routing Protocols.
Research Report LSV-11-24, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2011.
66 pages.
[ BibTex |
Web page |
PDF ]
-
[Arn11]
-
M. Arnaud.
Formal verification of secured routing protocols.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2011.
[ BibTex |
Web page |
PDF ]
-
[Cio11a]
-
S. Ciobâcă.
Automated Verification of Security Protocols with Appplications
to Electronic Voting.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2011.
[ BibTex |
Web page |
PDF ]
-
[LV11]
-
É. Lozes and J. Villard.
Sharing Contract-Obedient Endpoints.
Research Report LSV-11-23, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2011.
42 pages.
[ BibTex |
Web page |
PDF ]
-
[ILV11]
-
M. Izabachène, B. Libert, and D. Vergnaud.
Block-wise P-Signatures and Non-Interactive Anonymous
Credentials with Efficient Attributes.
In Proceedings of the 13th IMA International Conference on
Cryptography and Coding (IMACC'11), volume 7089 of Lecture Notes in
Computer Science, pages 431--450, Oxford, UK, December 2011. Springer.
doi:
10.1007/978-3-642-25516-8_26.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDMM11]
-
Ph. Darondeau, S. Demri, R. Meyer, and
Ch. Morvan.
Petri Net Reachability Graphs: Decidability Status of FO
Properties.
In Proceedings of the 31st Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'11),
volume 13 of Leibniz International Proceedings in Informatics, pages
140--151, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2011.140.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SBM11]
-
O. Sankur, P. Bouyer, and N. Markey.
Shrinking Timed Automata.
In Proceedings of the 31st Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'11),
volume 13 of Leibniz International Proceedings in Informatics, pages 90--102,
Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2011.90.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDK11]
-
C. Chevalier, S. Delaune, and S. Kremer.
Transforming Password Protocols to Compose.
In Proceedings of the 31st Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'11),
volume 13 of Leibniz International Proceedings in Informatics, pages
204--216, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2011.204.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBMU11]
-
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels.
Nash Equilibria in Concurrent Games with Büchi
Objectives.
In Proceedings of the 31st Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'11),
volume 13 of Leibniz International Proceedings in Informatics, pages
375--386, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2011.375.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKP11]
-
D. Berwanger, L. Kaiser, and B. Puchala.
Perfect-Information Construction for Coordination in Games.
In Proceedings of the 31st Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'11),
volume 13 of Leibniz International Proceedings in Informatics, pages
387--398, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2011.387.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGM11]
-
S. Abiteboul, G. Gottlob, and M. Manna.
Distributed XML design.
Journal of Computer and System Sciences, 77(6):936--964, November
2011.
doi:
10.1016/j.jcss.2011.02.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PS11]
-
Th. Place and L. Segoufin.
A decidable characterization of locally testable tree
languages.
Logical Methods in Computer Science, 7(4:03), November 2011.
doi:
10.2168/LMCS-7(4:3)2011.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Jac11]
-
F. Jacquemard.
Extended Tree Automata for the Verification of Infinite State
Systems.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, November 2011.
[ BibTex |
Web page |
PDF ]
-
[ECGJ11]
-
J. Echeveste, A. Cont, J.-L. Giavitto, and F. Jacquemard.
Formalisation des relations temporelles entre une partition et
une performance musicale dans un contexte d'accompagnement automatique.
In Actes du 8ème Colloque sur la Modélisation des
Systèmes Réactifs (MSR'11), volume 45 of Journal Européen
des Systèmes Automatisés, pages 109--124, Lille, France, November
2011. Hermès.
doi:
10.3166/jesa.45.109-124.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHP11]
-
B. Barbot, S. Haddad, and C. Picaronny.
Échantillonnage préférentiel pour le model checking
statistique.
In Actes du 8ème Colloque sur la Modélisation des
Systèmes Réactifs (MSR'11), volume 45 of Journal Européen
des Systèmes Automatisés, pages 237--252, Lille, France, November
2011. Hermès.
doi:
10.3166/jesa.45.237-252.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SGA11]
-
F. M. Suchanek, D. Gross-Amblard, and S. Abiteboul.
Watermarking for Ontologies.
In Proceedings of the 10th International Semantic Web
Conference (ISWC'11), volume 7031 of Lecture Notes in Computer Science,
pages 697--713, Bonn, Germany, October 2011. Springer.
doi:
10.1007/978-3-642-25073-6_44.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD11b]
-
K. Chatterjee and L. Doyen.
Games and Markov Decision Processes with Mean-payoff Parity and
Energy Parity Objectives.
In Proceedings of the 7th Annual Doctoral Workshop on
Mathematical and Engineering Methods in Computer Science
(MEMICS'11), volume 7119 of Lecture Notes in Computer Science, Lednice,
Czech Republic, October 2011. Springer.
[ BibTex |
Web page |
PDF ]
-
[BBD+11b]
-
Th. Brihaye, V. Bruyère, L. Doyen, M. Ducobu,
and J.-F. Raskin.
Antichain-based QBF Solving.
In Proceedings of the 9th International Symposium on
Automated Technology for Verification and Analysis (ATVA'11),
volume 6996 of Lecture Notes in Computer Science, pages 183--197, Taipei,
Taiwan, October 2011. Springer.
doi:
10.1007/978-3-642-24372-1_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JKS11]
-
F. Jacquemard, Y. Kojima, and M. Sakai.
Controlled Term Rewriting.
In Proceedings of the 8th International Symposium on
Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture
Notes in Artificial Intelligence, pages 179--194, Saarbrücken, Germany,
October 2011. Springer.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FRS11]
-
L. Fribourg, B. Revol, and R. Soulat.
Synthesis of Switching Rules for Ensuring Reachability
Properties of Sampled Linear Systems.
In Proceedings of the 13th International Workshops on
Verification of Infinite State Systems (INFINITY'11), volume 73 of
Electronic Proceedings in Theoretical Computer Science, pages 35--48, Taipei,
Taiwan, October 2011.
doi:
10.4204/EPTCS.73.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BD11]
-
M. Bersani and S. Demri.
The complexity of reversal-bounded model-checking.
In Proceedings of the 8th International Symposium on
Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture
Notes in Artificial Intelligence, pages 71--86, Saarbrücken, Germany,
October 2011. Springer.
doi:
10.1007/978-3-642-24364-6_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKL11]
-
D. Berwanger, L. Kaiser, and S. Leßenich.
Imperfect Recall and Counter Games.
Research Report LSV-11-20, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2011.
21 pages.
[ BibTex |
Web page |
PDF ]
-
[CCD11]
-
V. Cheval, H. Comon-Lundh, and S. Delaune.
Trace Equivalence Decision: Negative Tests and Non-determinism.
In Proceedings of the 18th ACM Conference on Computer and
Communications Security (CCS'11), pages 321--330, Chicago, Illinois,
USA, October 2011. ACM Press.
doi:
10.1145/2046707.2046744.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMOU11]
-
P. Bouyer, N. Markey, J. Olschewski, and M. Ummels.
Measuring Permissiveness in Parity Games: Mean-Payoff Parity
Games Revisited.
In Proceedings of the 9th International Symposium on
Automated Technology for Verification and Analysis (ATVA'11),
volume 6996 of Lecture Notes in Computer Science, pages 135--149, Taipei,
Taiwan, October 2011. Springer.
doi:
10.1007/978-3-642-24372-1_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CSV11a]
-
R. Chadha, A. P. Sistla, and M. Viswanathan.
Power of Randomization in Automata on Infinite Strings.
Logical Methods in Computer Science, 7(3:22), September 2011.
doi:
10.2168/LMCS-7(3:22)2011.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KD11]
-
A. Kumar Dhar.
Counter Systems with Presburger-definable Reachability Sets:
Decidability and Complexity.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2011.
[ BibTex |
Web page |
PDF ]
-
[Cha11]
-
P. Chambart.
Du Problème de sous-mot de Post et de la complexité
des canaux non fiables.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2011.
[ BibTex |
Web page |
PDF ]
-
[Gal11]
-
A. Galland.
Distributed Data Management with Access Control.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2011.
[ BibTex |
Web page |
PDF ]
-
[UW11b]
-
M. Ummels and D. Wojtczak.
The Complexity of Nash Equilibria in Stochastic Multiplayer
Games.
Logical Methods in Computer Science, 7(3:20), September 2011.
doi:
10.2168/LMCS-7(3:20)2011.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Da 11]
-
A. Da Costa.
Propriétés de jeux multi-agents.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, September 2011.
[ BibTex |
Web page |
PDF ]
-
[Pas11b]
-
D. Pasailă.
Verifying equivalence properties of security protocols.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2011.
[ BibTex |
Web page |
PDF ]
-
[Deg11]
-
J. Degrieck.
Réduction de graphes pour l'analyse de protocoles de routage
sécurisés.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2011.
[ BibTex |
Web page |
PDF ]
-
[CFM11a]
-
M. Cadilhac, A. Finkel, and P. McKenzie.
Bounded Parikh Automata.
In Proceedings of the 8th International Conference WORDS
(WORDS'11), volume 63 of Electronic Proceedings in Theoretical Computer
Science, pages 93--102, Prague, Czech Republic, September 2011.
doi:
10.4204/EPTCS.63.13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FLS11]
-
R. Focardi, F. L. Luccio, and G. Steel.
An Introduction to Security API Analysis.
In Foundations of Security Analysis and Design -- FOSAD
Tutorial Lectures (FOSAD'VI), volume 6858 of Lecture Notes in
Computer Science, pages 35--65. Springer, September 2011.
doi:
10.1007/978-3-642-23082-0_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMS11]
-
P. Bouyer, N. Markey, and O. Sankur.
Robust Model-Checking of Timed Automata via Pumping in Channel
Machines.
In Proceedings of the 9th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'11), volume 6919
of Lecture Notes in Computer Science, pages 97--112, Aalborg, Denmark,
September 2011. Springer.
doi:
10.1007/978-3-642-24310-3_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bon11a]
-
R. Bonnet.
Decidability of LTL Model Checking for Vector Addition Systems
with one Zero-test.
In Proceedings of the 5th Workshop on Reachability Problems
in Computational Models (RP'11), volume 6945 of Lecture Notes in
Computer Science, pages 85--95, Genova, Italy, September 2011. Springer.
doi:
10.1007/978-3-642-24288-5_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FK11a]
-
L. Fribourg and U. Kühne.
Parametric Verification and Test Coverage for Hybrid Automata
Using the Inverse Method.
In Proceedings of the 5th Workshop on Reachability Problems
in Computational Models (RP'11), volume 6945 of Lecture Notes in
Computer Science, pages 191--204, Genova, Italy, September 2011. Springer.
doi:
10.1007/978-3-642-24288-5_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AS11]
-
É. André and R. Soulat.
Synthesis of Timing Parameters Satisfying Safety Properties.
In Proceedings of the 5th Workshop on Reachability Problems
in Computational Models (RP'11), volume 6945 of Lecture Notes in
Computer Science, pages 31--44, Genova, Italy, September 2011. Springer.
doi:
10.1007/978-3-642-24288-5_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CKV+11]
-
R. Chadha, V. Korthikranthi, M. Viswanathan, G. Agha, and
Y. Kwon.
Model Checking MDPs with a Unique Compact Invariant Set of
Distributions.
In Proceedings of the 8th International Conference on
Quantitative Evaluation of Systems (QEST'11), pages 121--130, Aachen,
Germany, September 2011. IEEE Computer Society Press.
doi:
10.1109/QEST.2011.22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDD+11a]
-
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and
N. Pekergin.
COSMOS: a Statistical Model Checker for the Hybrid Automata
Stochastic Logic.
In Proceedings of the 8th International Conference on
Quantitative Evaluation of Systems (QEST'11), pages 143--144, Aachen,
Germany, September 2011. IEEE Computer Society Press.
doi:
10.1109/QEST.2011.24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFH11]
-
M. Beccuti, G. Franceschinis, and S. Haddad.
MDWNsolver: A Framework to Design and Solve Markov Decision
Petri Nets.
International Journal of Performability Engineering, 7(5):417--428,
September 2011.
[ BibTex |
Web page |
PDF ]
-
[UW11a]
-
M. Ummels and D. Wojtczak.
The Complexity of Nash Equilibria in Limit-Average Games.
In Proceedings of the 22nd International Conference on
Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in
Computer Science, pages 482--496, Aachen, Germany, September 2011. Springer.
doi:
10.1007/978-3-642-23217-6_32.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bol11]
-
B. Bollig.
An automaton over data words that captures EMSO logic.
In Proceedings of the 22nd International Conference on
Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in
Computer Science, pages 171--186, Aachen, Germany, September 2011. Springer.
doi:
10.1007/978-3-642-23217-6_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RSB11]
-
C. Rodríguez, S. Schwoon, and P. Baldan.
Efficient contextual unfolding.
In Proceedings of the 22nd International Conference on
Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in
Computer Science, pages 342--357, Aachen, Germany, September 2011. Springer.
doi:
10.1007/978-3-642-23217-6_23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLM+11]
-
P. Bouyer, K. G. Larsen, N. Markey, O. Sankur, and
C. Thrane.
Timed automata can always be made implementable.
In Proceedings of the 22nd International Conference on
Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in
Computer Science, pages 76--91, Aachen, Germany, September 2011. Springer.
doi:
10.1007/978-3-642-23217-6_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFLM11]
-
P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey.
Quantitative analysis of real-time systems using priced timed
automata.
Communications of the ACM, 54(9):78--87, September 2011.
doi:
10.1145/1995376.1995396.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDS11]
-
K. Chatterjee, L. Doyen, and R. Singh.
On Memoryless Quantitative Objectives.
In Proceedings of the 18th International Symposium on
Fundamentals of Computation Theory (FCT'11), volume 6914 of Lecture
Notes in Computer Science, pages 148--159, Oslo, Norway, August 2011.
Springer.
doi:
10.1007/978-3-642-22953-4_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD11a]
-
K. Chatterjee and L. Doyen.
Energy and Mean-Payoff Parity Markov Decision Processes.
In Proceedings of the 36th International Symposium on
Mathematical Foundations of Computer Science (MFCS'11), volume 6907
of Lecture Notes in Computer Science, pages 206--218, Warsaw, Poland, August
2011. Springer.
doi:
10.1007/978-3-642-22993-0_21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DMS11a]
-
L. Doyen, Th. Massart, and M. Shirmohammadi.
Infinite Synchronizing Words for Probabilistic Automata.
In Proceedings of the 36th International Symposium on
Mathematical Foundations of Computer Science (MFCS'11), volume 6907
of Lecture Notes in Computer Science, pages 278--289, Warsaw, Poland, August
2011. Springer.
doi:
10.1007/978-3-642-22993-0_27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCGZ11]
-
B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun.
Temporal Logics for Concurrent Recursive Programs:
Satisfiability and Model Checking.
In Proceedings of the 36th International Symposium on
Mathematical Foundations of Computer Science (MFCS'11), volume 6907
of Lecture Notes in Computer Science, pages 132--144, Warsaw, Poland, August
2011. Springer.
doi:
10.1007/978-3-642-22993-0_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS11]
-
M. Blockelet and S. Schmitz.
Model-Checking Coverability Graphs of Vector Addition Systems.
In Proceedings of the 36th International Symposium on
Mathematical Foundations of Computer Science (MFCS'11), volume 6907
of Lecture Notes in Computer Science, pages 108--119, Warsaw, Poland, August
2011. Springer.
doi:
10.1007/978-3-642-22993-0_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[San11]
-
O. Sankur.
Untimed Language Preservation in Timed Systems.
In Proceedings of the 36th International Symposium on
Mathematical Foundations of Computer Science (MFCS'11), volume 6907
of Lecture Notes in Computer Science, pages 556--567, Warsaw, Poland, August
2011. Springer.
doi:
10.1007/978-3-642-22993-0_50.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bon11b]
-
R. Bonnet.
The reachability problem for Vector Addition Systems with one
zero-test.
In Proceedings of the 36th International Symposium on
Mathematical Foundations of Computer Science (MFCS'11), volume 6907
of Lecture Notes in Computer Science, pages 145--157, Warsaw, Poland, August
2011. Springer.
doi:
10.1007/978-3-642-22993-0_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDD+11c]
-
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and
N. Pekergin.
Petri Nets Compositional Modeling and Verification of Flexible
Manufacturing Systems.
In Proceedings of the 7th IEEE Conference on Automation
Science and Engineering (CASE'11), pages 588--593, Trieste, Italy,
August 2011. IEEE Robotics & Automation Society.
doi:
10.1109/CASE.2011.6042488.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou11a]
-
J. Goubault-Larrecq.
A Few Pearls in the Theory of Quasi-Metric Spaces.
Invited talk, Fifth International Conference on Topology, Algebra,
and Categories in Logic (TACL'11), Marseilles, France, July 2011, July 2011.
[ BibTex ]
-
[BDM+11]
-
M. Bojańczyk, C. David, A. Muscholl,
Th. Schwentick, and L. Segoufin.
Two-variable logic on data words.
ACM Transactions on Computational Logic, 12(4:27), July 2011.
doi:
10.1145/1970398.1970403.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LPS11]
-
F. Luccio, L. Pagli, and G. Steel.
Mathematical and Algorithmic Foundations of the Internet.
CRC Press, July 2011.
[ BibTex |
Web page ]
-
[CFM11b]
-
M. Cadilhac, A. Finkel, and P. McKenzie.
On the Expressiveness of Parikh Automata and Related Models.
In Proceedings of the 3rd Workshop on Non-Classical Models
of Automata and Applications (NCMA'11), volume 282 of books@ocg.at,
pages 103--119, Milano, Italy, July 2011. Austrian Computer Society.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SR11]
-
S. Schwoon and C. Rodríguez.
Construction and SAT-based verification of Contextual
Unfoldings.
In Proceedings of the 13th International Workshop on
Descriptional Complexity of Formal Systems (DCFS'11), volume 6808
of Lecture Notes in Computer Science, pages 34--42, Limburg, Germany, July
2011. Springer.
doi:
10.1007/978-3-642-22600-7_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Cio11b]
-
S. Ciobâcă.
Computing finite variants for subterm convergent rewrite
systems.
In Proceedings of the 25th International Workshop on
Unification (UNIF'11), Wroclaw, Poland, July 2011.
[ BibTex |
Web page |
PDF ]
-
[Sch11]
-
S. Schmitz.
A Note on Sequential Rule-Based POS Tagging.
In Proceedings of the 9th International Workshop on
Finite-State Methods and Natural Language Processing
(FSMNLP'11), pages 83--87, Blois, France, July 2011. ACL Press.
[ BibTex |
Web page |
PDF ]
-
[BBBS11]
-
N. Bertrand, P. Bouyer, Th. Brihaye, and
A. Stainer.
Emptiness and Universality Problems in Timed Automata with
Positive Frequency.
In Proceedings of the 38th International Colloquium on
Automata, Languages and Programming (ICALP'11) -- Part II, volume
6756 of Lecture Notes in Computer Science, pages 246--257, Zürich,
Switzerland, July 2011. Springer.
doi:
10.1007/978-3-642-22012-8_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDG+11]
-
Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine,
J.-F. Raskin, and J. Worrell.
On Reachability for Hybrid Automata over Bounded Time.
In Proceedings of the 38th International Colloquium on
Automata, Languages and Programming (ICALP'11) -- Part II, volume
6756 of Lecture Notes in Computer Science, pages 416--427, Zürich,
Switzerland, July 2011. Springer.
doi:
10.1007/978-3-642-22012-8_33.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BtCS11]
-
V. Bárány, B. ten Cate, and L. Segoufin.
Guarded negation.
In Proceedings of the 38th International Colloquium on
Automata, Languages and Programming (ICALP'11) -- Part II, volume
6756 of Lecture Notes in Computer Science, pages 356--367, Zürich,
Switzerland, July 2011. Springer.
doi:
10.1007/978-3-642-22012-8_28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SS11]
-
S. Schmitz and Ph. Schnoebelen.
Multiply-Recursive Upper Bounds with Higman's Lemma.
In Proceedings of the 38th International Colloquium on
Automata, Languages and Programming (ICALP'11) -- Part II, volume
6756 of Lecture Notes in Computer Science, pages 441--452, Zürich,
Switzerland, July 2011. Springer.
doi:
10.1007/978-3-642-22012-8_35.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AvMSS11]
-
M. Anderson, D. van Melkebeek, N. Schweikardt, and
L. Segoufin.
Locality of queries definable in invariant first-order logic
with arbitrary built-in predicates.
In Proceedings of the 38th International Colloquium on
Automata, Languages and Programming (ICALP'11) -- Part II, volume
6756 of Lecture Notes in Computer Science, pages 368--379, Zürich,
Switzerland, July 2011. Springer.
doi:
10.1007/978-3-642-22012-8_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD11a]
-
M. Arnaud, V. Cortier, and S. Delaune.
Deciding security for protocols with recursive tests.
In Proceedings of the 23rd International Conference on
Automated Deduction (CADE'11), volume 6803 of Lecture Notes in Computer
Science, pages 49--63, Wroclaw, Poland, July 2011. Springer.
doi:
10.1007/978-3-642-22438-6_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AFFM11]
-
C. Areces, D. Figueira, S. Figueira, and S. Mera.
The Expressive Power of Memory Logics.
Review of Symbolic Logic, 4(2):290 -- 318, June 2011.
doi:
10.1017/S1755020310000389.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GK11]
-
J. Goubault-Larrecq and K. Keimel.
Choquet-Kendall-Matheron Theorems for Non-Hausdorff
Spaces.
Mathematical Structures in Computer Science, 21(3):511--561, June
2011.
doi:
10.1017/S0960129510000617.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGP11]
-
S. Abiteboul, A. Galland, and N. Polyzotis.
Web information management with access control.
In Proceedings of the 14th International Workshop on the Web
and Databases (WebDB'11), Athens, Greece, June 2011.
[ BibTex |
Web page |
PDF ]
-
[KS11]
-
W. Kazana and L. Segoufin.
First-order query evaluation on structures of bounded degree.
Logical Methods in Computer Science, 7(2:20), June 2011.
doi:
10.2168/LMCS-7(2:20)2011.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABGA11]
-
S. Abiteboul, M. Bienvenu, A. Galland, and É. Antoine.
A rule-based language for Web data management.
In Proceedings of the 30th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'11), pages 293--304, Athens, Greece, June 2011. ACM Press.
doi:
10.1145/1989284.1989320.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCJ+11]
-
M. Backes, I. Cervesato, A. Jaggard, A. Scedrov, and J.-K.
Tsay.
Cryptographically sound security proofs for basic and public-key
Kerberos.
International Journal on Information Security, 10(2):107--134, June
2011.
doi:
10.1007/s10207-011-0125-6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HKS11]
-
S. Haar, C. Kern, and S. Schwoon.
Computing the Reveals Relation in Occurrence Nets.
In Proceedings of the 2nd International Symposium on Games,
Automata, Logics, and Formal Verification (GandALF'11), volume 54
of Electronic Proceedings in Theoretical Computer Science, pages 31--44,
Minori, Italy, June 2011.
doi:
10.4204/EPTCS.54.3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FFK+11]
-
É. Florentin, L. Fribourg, U. Kühne, S. Lefebvre, and
Ch. Rey.
COUPLET: Coupled Electrothermal Simulation.
Research Report LSV-11-18, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2011.
32 pages.
[ BibTex |
Web page |
PDF ]
-
[Mar11a]
-
N. Markey.
Robustness in Real-time Systems.
In Proceedings of the 6th IEEE International Symposium on
Industrial Embedded Systems (SIES'11), pages 28--34,
Västerås, Sweden, June 2011. IEEE Computer Society Press.
doi:
10.1109/SIES.2011.5953652.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KSW11]
-
S. Kremer, G. Steel, and B. Warinschi.
Security for Key Management Interfaces.
In Proceedings of the 24th IEEE Computer Security
Foundations Symposium (CSF'11), pages 266--280, Cernay-la-Ville,
France, June 2011. IEEE Computer Society Press.
doi:
10.1109/CSF.2011.25.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKRS11]
-
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel.
Formal analysis of protocols based on TPM state registers.
In Proceedings of the 24th IEEE Computer Security
Foundations Symposium (CSF'11), pages 66--82, Cernay-la-Ville, France,
June 2011. IEEE Computer Society Press.
doi:
10.1109/CSF.2011.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCH11]
-
S. Balaguer, Th. Chatain, and S. Haar.
Building Tight Occurrence Nets from Reveals Relations.
In Proceedings of the 11th International Conference on
Application of Concurrency to System Design (ACSD'11), pages
44--53, Newcastle upon Tyne, UK, June 2011. IEEE Computer Society Press.
doi:
10.1109/ACSD.2011.16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HMN11]
-
S. Haddad, J. Mairesse, and H.-T. Nguyen.
Synthesis and Analysis of Product-form Petri Nets.
In Proceedings of the 32nd International Conference on
Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709
of Lecture Notes in Computer Science, pages 288--307, Newcastle upon Tyne,
UK, June 2011. Springer.
doi:
10.1007/978-3-642-21834-7_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFS11]
-
P. Chambart, A. Finkel, and S. Schmitz.
Forward Analysis and Model Checking for Trace Bounded WSTS.
In Proceedings of the 32nd International Conference on
Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709
of Lecture Notes in Computer Science, Newcastle upon Tyne, UK, June 2011.
Springer.
doi:
10.1007/978-3-642-21834-7_4.
[ BibTex |
DOI |
Web page ]
-
[FFSS11]
-
D. Figueira, S. Figueira, S. Schmitz, and
Ph. Schnoebelen.
Ackermannian and Primitive-Recursive Bounds with Dickson's
Lemma.
In Proceedings of the 26th Annual IEEE Symposium on Logic
in Computer Science (LICS'11), pages 269--278, Toronto, Canada, June
2011. IEEE Computer Society Press.
doi:
10.1109/LICS.2011.39.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GV11]
-
J. Goubault-Larrecq and D. Varacca.
Continuous Random Variables.
In Proceedings of the 26th Annual IEEE Symposium on Logic
in Computer Science (LICS'11), pages 97--106, Toronto, Canada, June
2011. IEEE Computer Society Press.
doi:
10.1109/LICS.2011.23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fig11]
-
D. Figueira.
A decidable two-way logic on data words.
In Proceedings of the 26th Annual IEEE Symposium on Logic
in Computer Science (LICS'11), pages 365--374, Toronto, Canada, June
2011. IEEE Computer Society Press.
doi:
10.1109/LICS.2011.18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Ben11]
-
H. Benzina.
Logic in Virtualized Systems.
In Proceedings of the International Conference on Computer
Applications and Network Security (ICCANS'11), Republic of Maldives,
May 2011.
[ BibTex |
Web page |
PDF ]
-
[LS11]
-
L. Libkin and C. Sirangelo.
Data exchange and schema mappings in open and closed worlds.
Journal of Computer and System Sciences, 77(3):542--571, May 2011.
doi:
10.1016/j.jcss.2010.04.010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDD+11b]
-
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and
N. Pekergin.
HASL: An Expressive Language for Statistical Verification of
Stochastic Models.
In Proceedings of the 5th International Conference on
Performance Evaluation Methodologies and Tools (VALUETOOLS'11),
pages 306--315, Cachan, France, May 2011.
[ BibTex |
Web page |
PDF ]
-
[BCL11]
-
P. Bouyer, F. Cassez, and F. Laroussinie.
Timed Modal Logics for Real-Time Systems: Specification,
Verification and Control.
Journal of Logic, Language and Information, 20(2):169--203, April
2011.
doi:
10.1007/s10849-010-9127-4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABKT11]
-
S. Abiteboul, K. Böhm, C. Koch, and K.-L. Tan.
Proceedings of the 27th International Conference on Data
Engineering (ICDE'11).
In Proceedings of the 27th International Conference on Data
Engineering (ICDE'11), Hannover, Germany, April 2011. IEEE Computer
Society Press.
doi:
10.1109/ICDE.2011.5767975.
[ BibTex |
DOI |
Web page ]
-
[BCD+11]
-
L. Brim, J. Chaloupka, L. Doyen, R. Gentilini, and J.-F.
Raskin.
Faster algorithms for mean-payoff games.
Formal Methods in System Design, 38(2):97--118, April 2011.
doi:
10.1007/s10703-010-0105-x.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGL+11]
-
É. Antoine, A. Galland, K. Lyngbaek, A. Marian, and
N. Polyzotis.
Social networking on top of the WebdamExchange system.
In Proceedings of the 27th International Conference on Data
Engineering (ICDE'11), pages 1300--1303, Hannover, Germany, April 2011.
IEEE Computer Society Press.
doi:
10.1109/ICDE.2011.5767939.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGMZ11]
-
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun.
Weighted Expressions and DFS Tree Automata.
Research Report LSV-11-08, Laboratoire Spécification et
Vérification, ENS Cachan, France, April 2011.
32 pages.
[ BibTex |
Web page |
PDF ]
-
[Mar11b]
-
N. Markey.
Verification of Embedded Systems -- Algorithms and Complexity.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, April 2011.
[ BibTex |
Web page |
PDF ]
-
[Gou11b]
-
J. Goubault-Larrecq.
Musings Around the Geometry of Interaction, and Coherence.
Theoretical Computer Science, 412(20):1998--2014, April 2011.
doi:
10.1016/j.tcs.2010.12.023.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABGR11]
-
S. Abiteboul, M. Bienvenu, A. Galland, and M.-Ch.
Rousset.
Distributed Datalog Revisited.
In Revised Selected Papers of the 1st International
Workshop Datalog Reloaded (Datalog'10), volume 6702 of Lecture Notes
in Computer Science, pages 252--261, Oxford, UK, March 2011. Springer.
doi:
10.1007/978-3-642-24206-9_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JKV11]
-
F. Jacquemard, F. Klay, and C. Vacher.
Rigid Tree Automata.
Information and Computation, 209(3):486--512, March 2011.
doi:
10.1016/j.ic.2010.11.015.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AtCK11]
-
S. Abiteboul, B. ten Cate, and Y. Katsis.
On the equivalence of distributed systems with queries and
communication.
In Proceedings of the 14th International Conference on
Database Theory (ICDT'11), pages 126--137, Uppsala, Sweden, March 2011.
ACM Press.
doi:
10.1145/1938551.1938570.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABV11]
-
S. Abiteboul, P. Bourhis, and V. Vianu.
Comparing workflow specification languages: a matter of views.
In Proceedings of the 14th International Conference on
Database Theory (ICDT'11), pages 78--89, Uppsala, Sweden, March 2011.
ACM Press.
doi:
10.1145/1938551.1938564.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DMS11b]
-
L. Doyen, Th. Massart, and M. Shirmohammadi.
Synchronizing Objectives for Markov Decision Processes.
In Proceedings of the International Workshop on Interactions,
Games and Protocols (iWIGP'11), volume 50 of Electronic Proceedings in
Theoretical Computer Science, pages 61--75, Saarbrücken, Germany, March
2011.
[ BibTex |
Web page |
PDF ]
-
[FK11b]
-
L. Fribourg and U. Kühne.
Parametric Verification of Hybrid Automata Using the Inverse
Method.
Research Report LSV-11-04, Laboratoire Spécification et
Vérification, ENS Cachan, France, March 2011.
25 pages.
[ BibTex |
Web page |
PDF ]
-
[CC11]
-
H. Comon-Lundh and V. Cortier.
How to prove security of communication protocols? A discussion
on the soundness of formal models w.r.t. computational ones.
In Proceedings of the 28th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'11), volume 9 of Leibniz
International Proceedings in Informatics, pages 29--44, Dortmund, Germany,
March 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2011.29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[tCS11]
-
B. ten Cate and L. Segoufin.
Unary negation.
In Proceedings of the 28th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'11), volume 9 of Leibniz
International Proceedings in Informatics, pages 344--355, Dortmund, Germany,
March 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2011.344.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ST11]
-
L. Segoufin and S. Toruńczyk.
Automata based verification over linearly ordered data domains.
In Proceedings of the 28th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'11), volume 9 of Leibniz
International Proceedings in Informatics, pages 81--92, Dortmund, Germany,
March 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2011.81.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Kre11]
-
S. Kremer.
Modelling and analyzing security protocols in cryptographic
process calculi.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, March 2011.
[ BibTex |
Web page |
PDF ]
-
[Ste11b]
-
G. Steel.
Formal Analysis of Security APIs.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, March 2011.
[ BibTex |
Web page |
PDF ]
-
[Del11]
-
S. Delaune.
Verification of security protocols: from confidentiality to
privacy.
Mémoire d'habilitation, École Normale Supérieure de
Cachan, France, March 2011.
[ BibTex |
Web page |
PDF ]
-
[Pas11a]
-
D. Pasailă.
Conjunctive queries determinacy and rewriting.
In Proceedings of the 14th International Conference on
Database Theory (ICDT'11), pages 220--231, Uppsala, Sweden, March 2011.
ACM Press.
doi:
10.1145/1938551.1938580.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFHR11]
-
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo.
Ordinal Theory for Expressiveness of Well Structured Transition
Systems.
In Proceedings of the 14th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'11), volume 6604 of Lecture Notes in Computer Science, pages
153--167, Saarbrücken, Germany, March-April 2011. Springer.
doi:
10.1007/978-3-642-19805-2_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS11]
-
D. Figueira and L. Segoufin.
Bottom-up automata on data trees and vertical XPath.
In Proceedings of the 28th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'11), volume 9 of Leibniz
International Proceedings in Informatics, pages 93--104, Dortmund, Germany,
March 2011. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.STACS.2011.93.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bou11]
-
P. Bourhis.
On the dynamics of active documents for distributed data
management.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2011.
[ BibTex |
Web page |
PDF ]
-
[ACGP11]
-
M. Abdalla, C. Chevalier, L. Granboulan, and
D. Pointcheval.
Contributory Password-Authenticated Group Key Exchange with Join
Capability.
In Proceedings of the Cryptographers' Track at the RSA
Conference 2011 (CT-RSA'11), volume 6558 of Lecture Notes in Computer
Science, pages 142--160, San Francisco, California, USA, February 2011.
Springer.
doi:
10.1007/978-3-642-19074-2_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Vil11]
-
J. Villard.
Heaps and Hops.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2011.
[ BibTex |
Web page |
PDF ]
-
[BBD+11a]
-
S. Baarir, M. Beccuti, C. Dutheillet, G. Franceschinis, and
S. Haddad.
Lumping partially symmetrical stochastic models.
Performance Evaluation, 76:21--44, January 2011.
doi:
10.1016/j.peva.2010.09.002.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CSV11b]
-
R. Chadha, A. P. Sistla, and M. Viswanathan.
Probabilistic Büchi automata with non-extremal acceptance
thresholds.
In Proceedings of the 12th International Conference on
Verification, Model Checking and Abstract Interpretation
(VMCAI'11), volume 6538 of Lecture Notes in Computer Science, pages
103--117, Austin, Texas, USA, January 2011. Springer.
doi:
10.1007/978-3-642-18275-4_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DR11]
-
L. Doyen and J.-F. Raskin.
Games with Imperfect Information: Theory and Algorithms.
In Lectures in Game Theory for Computer Scientists. Cambridge
University Press, January 2011.
[ BibTex |
Web page |
PS |
PDF ]
-
[Ste11a]
-
G. Steel.
Formal Analysis of Security APIs.
In Encyclopedia of Cryptography and Security, pages 492--494.
Springer, 2nd edition, 2011.
doi:
10.1007/978-1-4419-5906-5_873.
[ BibTex |
DOI ]
-
[AMR+11]
-
S. Abiteboul, I. Manolescu, Ph. Rigaux, M.-
Ch. Rousset, and P. Senellart.
Web Data Management.
Cambridge University Press, 2011.
[ BibTex |
Web page ]
-
[Had11]
-
S. Haddad.
Introduction to Verification.
In Models and Analysis in Distributed Systems, chapter 6, pages
137--154. John Wiley & Sons, Ltd., 2011.
[ BibTex ]
-
[DP11]
-
S. Demri and D. Poitrenaud.
Verification of Infinite-State Systems.
In Models and Analysis in Distributed Systems, chapter 8, pages
221--269. John Wiley & Sons, Ltd., 2011.
[ BibTex |
Web page |
PDF ]
-
[HKPP11a]
-
S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors.
Distributed Systems Design and Algorithms.
John Wiley & Sons, Ltd., 2011.
[ BibTex |
Web page ]
-
[HKPP11b]
-
S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors.
Models and Analysis in Distributed Systems.
John Wiley & Sons, Ltd., 2011.
[ BibTex |
Web page ]
-
[CDM11]
-
H. Comon-Lundh, S. Delaune, and J. K. Millen.
Constraint solving techniques and enriching the model with
equational theories.
In Formal Models and Techniques for Analyzing Security Protocols,
volume 5 of Cryptology and Information Security Series, pages 35--61. IOS
Press, 2011.
[ BibTex |
Web page |
PDF ]
-
[CK11]
-
V. Cortier and S. Kremer, editors.
Formal Models and Techniques for Analyzing Security Protocols,
volume 5 of Cryptology and Information Security Series.
IOS Press, 2011.
[ BibTex |
Web page ]
-
[BKKL11]
-
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker.
SMA---The Smyle Modeling Approach.
In Revised Selected Papars of the 3rd IFIP TC2 Central
and East European Conference on Software Engineering Techniques
(CEE-SET'08), volume 4980 of Lecture Notes in Computer Science, pages
103--117, Brno, Czech Republic, 2011. Springer.
doi:
10.1007/978-3-642-22386-0_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LAL10]
-
D. Longuet, M. Aiguier, and P. Le Gall.
Proof-guided test selection from first-order specifications with
equality.
Journal of Automated Reasoning, 45(4):437--473, December 2010.
doi:
10.1007/s10817-009-9128-7.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BFHR10]
-
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo.
Comparing Petri Data Nets and Timed Petri Nets.
Research Report LSV-10-23, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
16 pages.
[ BibTex |
Web page |
PDF ]
-
[Vac10]
-
C. Vacher.
Automates à contraintes globales pour la vérification de
propriétés de sécurité.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
[ BibTex |
Web page |
PDF ]
-
[Pla10]
-
Th. Place.
Decidable Characterizations for Tree Logics.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
[ BibTex |
Web page |
PDF ]
-
[Fig10b]
-
D. Figueira.
On decidable automata on data words and data trees in relation
to satisfiability of LTL and XPath.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
[ BibTex |
Web page |
PDF ]
-
[And10c]
-
É. André.
An Inverse Method for the Synthesis of Timing Parameters in
Concurrent Systems.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
[ BibTex |
Web page |
PDF ]
-
[Sou10b]
-
R. Soulat.
On Properties of the Inverse Method: Commutation of
Instanciation and Full Covering of the Behavioral Cartography.
Research Report LSV-10-22, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
14 pages.
[ BibTex |
Web page |
PDF ]
-
[And10d]
-
É. André.
Synthesizing Parametric Constraints on Various Case Studies
Using IMITATOR II.
Research Report LSV-10-21, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2010.
66 pages.
[ BibTex |
Web page |
PDF ]
-
[DR10a]
-
S. Demri and A. Rabinovich.
The Complexity of Linear-time Temporal Logic over the Class of
Ordinals.
Logical Methods in Computer Science, 6(4), December 2010.
doi:
10.2168/LMCS-6(4:9)2010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CSV10]
-
R. Chadha, A. P. Sistla, and M. Viswanathan.
Model Checking Concurrent Programs with Nondeterminism and
Randomization.
In Proceedings of the 30th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'10),
volume 8 of Leibniz International Proceedings in Informatics, pages 364--375,
Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2010.364.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGMNK10]
-
S. Akshay, P. Gastin, M. Mukund, and K. Narayan Kumar.
Model checking time-constrained scenario-based specifications.
In Proceedings of the 30th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'10),
volume 8 of Leibniz International Proceedings in Informatics, pages 204--215,
Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2010.204.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDHR10]
-
K. Chatterjee, L. Doyen, Th. A. Henzinger, and J.-F.
Raskin.
Generalized Mean-payoff and Energy Games.
In Proceedings of the 30th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'10),
volume 8 of Leibniz International Proceedings in Informatics, pages 505--516,
Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2010.505.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFLZ10]
-
R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun.
Place-Boundedness for Vector Addition Systems with one
zero-test.
In Proceedings of the 30th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'10),
volume 8 of Leibniz International Proceedings in Informatics, pages 192--203,
Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2010.192.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HBM+10]
-
P. Hunter, P. Bouyer, N. Markey, J. Ouaknine, and
J. Worrell.
Computing rational radical sums in uniform TC^0.
In Proceedings of the 30th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'10),
volume 8 of Leibniz International Proceedings in Informatics, pages 308--316,
Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2010.308.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLM10]
-
A. Da Costa, F. Laroussinie, and N. Markey.
ATL with strategy contexts: Expressiveness and Model
Checking.
In Proceedings of the 30th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'10),
volume 8 of Leibniz International Proceedings in Informatics, pages 120--132,
Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2010.120.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLPS10]
-
P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo.
XML with incomplete information.
Journal of the ACM, 58(1), December 2010.
doi:
10.1145/1870103.1870107.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKS10]
-
S. Delaune, S. Kremer, and G. Steel.
Formal Analysis of PKCS#11 and Proprietary Extensions.
Journal of Computer Security, 18(6):1211--1245, November 2010.
doi:
10.3233/JCS-2009-0394.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou10b]
-
J. Goubault-Larrecq.
Finite Models for Formal Security Proofs.
Journal of Computer Security, 18(6):1247--1299, November 2010.
doi:
10.3233/JCS-2009-0395.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KM10]
-
S. Kremer and L. Mazaré.
Computationally Sound Analysis of Protocols using Bilinear
Pairings.
Journal of Computer Security, 18(6):999--1033, November 2010.
doi:
10.3233/JCS-2009-0388.
[ BibTex |
DOI |
Web page |
PDF ]
-
[And10b]
-
É. André.
IMITATOR II User Manual.
Research Report LSV-10-20, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2010.
31 pages.
[ BibTex |
Web page |
PDF ]
-
[LMT10]
-
R. Lanotte, A. Maggiolo-Schettini, and A. Troina.
Weak bisimulation for Probabilistic Timed Automata?
Theoretical Computer Science, 411(50):4291--4322, November 2010.
doi:
10.1016/j.tcs.2010.09.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AJRG10]
-
R. Abassi, F. Jacquemard, M. Rusinowitch, and S. Guemara
El Fatmi.
XML Access Control: from XACML to Annotated Schemas.
In Proceedings of the 2nd International Conference on
Communications and Networking (ComNet'10), Tozeur, Tunisia, November
2010. IEEE Computer Society Press.
doi:
10.1109/COMNET.2010.5699810.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHB10]
-
S. S. Bauer, R. Hennicker, and M. Bidoit.
A Modal Interface Theory with Data Constraints.
In Revised Selected Papers of the 13th Brazilian Symposium
on Formal Methods (SBMF'10), volume 6527 of Lecture Notes in Computer
Science, pages 80--95. Springer, November 2010.
doi:
10.1007/978-3-642-19829-8_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LBD+10]
-
S. Li, S. Balaguer, A. David, K. G. Larsen, B. Nielsen, and
S. Pusinskas.
Scenario-based verification of real-time systems using
Uppaal.
Formal Methods in System Design, 37(2-3):200--264, November 2010.
doi:
10.1007/s10703-010-0103-z.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHSZ10]
-
B. Bérard, S. Haddad, M. Sassolas, and M. Zeitoun.
Distributed Synthesis with Incomparable Information.
Research Report LSV-10-17, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2010.
20 pages.
[ BibTex |
Web page |
PDF ]
-
[CD10a]
-
K. Chatterjee and L. Doyen.
The Complexity of Partial-Observation Parity Games.
In Proceedings of the 17th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'10),
volume 6397 of Lecture Notes in Artificial Intelligence, pages 1--14,
Yogyakarta, Indonesia, October 2010. Springer.
doi:
10.1007/978-3-642-16242-8_1.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[KBBB10]
-
U. Kühne, S. Beyer, J. Bormann, and J. Barstow.
Automated Formal Verification of Processors Based on
Architectural Models.
In Proceedings of the 10th International Conference on Formal
Methods in Computer Aided Design (FMCAD'10), pages 129--136,
Lugano, Switzerland, October 2010. IEEE Computer Society Press.
[ BibTex |
Web page |
PDF ]
-
[BCFS10]
-
M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel.
Attacking and Fixing PKCS#11 Security Tokens.
In Proceedings of the 17th ACM Conference on Computer and
Communications Security (CCS'10), pages 260--269, Chicago, Illinois,
USA, October 2010. ACM Press.
doi:
10.1145/1866307.1866337.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Haa10a]
-
S. Haar.
Types of Asynchronous Diagnosability and the
phReveals-Relation in Occurrence Nets.
IEEE Transactions on Automatic Control, 55(10):2310--2320, October
2010.
doi:
10.1109/TAC.2010.2063490.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SRKK10]
-
B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh.
Towards automatic analysis of election verifiability
properties.
In Proceedings of the Joint Workshop on Automated Reasoning
for Security Protocol Analysis and Issues in the Theory of
Security (ARSPA-WITS'10), volume 6186 of Lecture Notes in Computer
Science, pages 146--163, Paphos, Cyprus, October 2010. Springer.
doi:
10.1007/978-3-642-16074-5_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCHK10]
-
P. Baldan, Th. Chatain, S. Haar, and B. König.
Unfolding-based Diagnosis of Systems with an Evolving Topology.
Information and Computation, 208(10):1169--1192, October 2010.
doi:
10.1016/j.ic.2009.11.009.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BK10]
-
D. Berwanger and L. Kaiser.
Information Tracking in Games on Graphs.
Journal of Logic, Language and Information, 19(4):395--412, October
2010.
doi:
10.1007/s10849-009-9115-8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCD+10]
-
D. Berwanger, K. Chatterjee, L. Doyen, M. De Wulf, and
Th. A. Henzinger.
Strategy Construction for Parity Games with Imperfect
Information.
Information and Computation, 208(10):1206--1220, October 2010.
doi:
10.1016/j.ic.2009.09.006.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BS10]
-
M. Bojańczyk and L. Segoufin.
Tree Languages Defined in First-Order Logic with One Quantifier
Alternation.
Logical Methods in Computer Science, 6(4:1), October 2010.
doi:
10.2168/LMCS-6(4:1)2010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Rod10]
-
C. Rodríguez.
Implementation of a complete prefix unfolder for contextual
nets.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex |
Web page |
PDF ]
-
[HMY10b]
-
S. Haddad, L. Mokdad, and S. Youcef.
Selection of the Best composite Web Service Based on Quality of
Service.
In Proceedings of the 2nd International Symposium on Services
Science and 3rd International Conference on Business Process and
Services Computing (ISSSashBPSC'10), volume 177 of Lecture Notes
in Informatics, pages 255--266, Leipzig, Germany, September-October 2010.
Gesellschaft für Informatik.
[ BibTex |
Web page |
PDF ]
-
[Sce10]
-
G. Scerri.
Modélisation des clés de l'intrus.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex ]
-
[CDH10a]
-
K. Chatterjee, L. Doyen, and Th. A. Henzinger.
Expressiveness and Closure Properties for Quantitative
Languages.
Logical Methods in Computer Science, 6(3:10), September 2010.
doi:
10.2168/LMCS-6(3:10)2010.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BGGP10]
-
O. Bouissou, É. Goubault, J. Goubault-Larrecq, and
S. Putot.
A Generalization of P-boxes to Affine Arithmetic, and
Applications to Static Analysis of Programs.
In Proceedings of the 14th GAMM-IMACS International
Symposium on Scientific Computing, Computer Arithmetic and
Validated Numerics (SCAN'10), Lyon, France, September 2010.
[ BibTex ]
-
[Dem10a]
-
S. Demri.
Counter Systems for Data Logics.
In Proceedings of the 12th European Conference on Logics in
Artificial Intelligence (JELIA'10), volume 6431 of Lecture Notes in
Artificial Intelligence, page 10, Helsinki, Finland, September 2010.
Springer.
doi:
10.1007/978-3-642-15675-5_3.
[ BibTex |
DOI |
Web page |
PDF ]
-
[MW10]
-
N. Markey and J. Wijsen, editors.
Proceedings of the 17th International Symposium on
Temporal Representation and Reasoning (TIME'10), Paris, France,
September 2010. IEEE Computer Society Press.
doi:
10.1109/TIME.2010.4.
[ BibTex |
DOI |
Web page ]
-
[DKRS10a]
-
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel.
A Formal Analysis of Authentication in the TPM.
In Revised Selected Papers of the 7th International
Workshop on Formal Aspects in Security and Trust (FAST'10),
volume 6561 of Lecture Notes in Computer Science, pages 111--125, Pisa,
Italy, September 2010. Springer.
doi:
10.1007/978-3-642-19751-2_8.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BWA10]
-
M. Baudet, B. Warinschi, and M. Abadi.
Guessing Attacks and the Computational Soundness of Static
Equivalence.
Journal of Computer Security, 18(5):909--968, September 2010.
doi:
10.3233/JCS-2009-0386.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BG10]
-
H. Benzina and J. Goubault-Larrecq.
Some Ideas on Virtualized Systems Security, and Monitors.
In Revised Selected Papers of the 5th International
Workshop on Data Privacy Management and Autonomous Spontaneous
Security (DPM'10) and 3rd International Workshop on Autonomous and
Spontaneous Security (SETOP'10), volume 6514 of Lecture Notes in
Computer Science, pages 244--258, Athens, Greece, September 2010. Springer.
doi:
10.1007/978-3-642-19348-4_18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LV10]
-
É. Lozes and J. Villard.
A spatial equational logic for the applied π-calculus.
Distributed Computing, 23(1):61--83, September 2010.
doi:
10.1007/s00446-010-0112-6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[And10a]
-
É. André.
IMITATOR II: A Tool for Solving the Good Parameters Problem in
Timed Automata.
In Proceedings of the 12th International Workshops on
Verification of Infinite State Systems (INFINITY'10), volume 39 of
Electronic Proceedings in Theoretical Computer Science, pages 91--99,
Singapore, September 2010.
doi:
10.4204/EPTCS.39.7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Dem10b]
-
S. Demri.
On Selective Unboundedness of VASS.
In Proceedings of the 12th International Workshops on
Verification of Infinite State Systems (INFINITY'10), volume 39 of
Electronic Proceedings in Theoretical Computer Science, pages 1--15,
Singapore, September 2010.
doi:
10.4204/EPTCS.39.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDF10]
-
A. Bušić, H. Djafri, and J.-M. Fourneau.
Stochastic Bounds for Censored Markov Chains.
In Proceedings of the 6th International Meeting on the
Numerical Solution of Markov Chain (NSMC'10), Williamsburg,
Virginia, USA, September 2010.
[ BibTex |
Web page |
PDF ]
-
[KRS10]
-
S. Kremer, M. D. Ryan, and B. Smyth.
Election verifiability in electronic voting protocols.
In Proceedings of the 15th European Symposium on Research in
Computer Security (ESORICS'10), volume 6345 of Lecture Notes in
Computer Science, pages 389--404, Athens, Greece, September 2010. Springer.
doi:
10.1007/978-3-642-15497-3_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDS10a]
-
M. Dahl, S. Delaune, and G. Steel.
Formal Analysis of Privacy for Vehicular Mix-Zones.
In Proceedings of the 15th European Symposium on Research in
Computer Security (ESORICS'10), volume 6345 of Lecture Notes in
Computer Science, pages 55--70, Athens, Greece, September 2010. Springer.
doi:
10.1007/978-3-642-15497-3_4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BBM10a]
-
P. Bouyer, R. Brenguier, and N. Markey.
Computing Equilibria in Two-Player Timed Games
via Turn-Based Finite Games.
In Proceedings of the 8th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'10), volume 6246
of Lecture Notes in Computer Science, pages 62--76, Vienna, Austria,
September 2010. Springer.
doi:
10.1007/978-3-642-15297-9_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCH10]
-
S. Balaguer, Th. Chatain, and S. Haar.
A Concurrency-Preserving Translation from Time Petri Nets to
Networks of Timed Automata.
In Proceedings of the 17th International Symposium on
Temporal Representation and Reasoning (TIME'10), pages 77--84, Paris,
France, September 2010. IEEE Computer Society Press.
doi:
10.1109/TIME.2010.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHS10]
-
B. Bérard, S. Haddad, and M. Sassolas.
Real Time Properties for Interrupt Timed Automata.
In Proceedings of the 17th International Symposium on
Temporal Representation and Reasoning (TIME'10), pages 69--76, Paris,
France, September 2010. IEEE Computer Society Press.
doi:
10.1109/TIME.2010.11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKM10]
-
B. Bollig, D. Kuske, and I. Meinecke.
Propositional Dynamic Logic for Message-Passing Systems.
Logical Methods in Computer Science, 6(3:16), September 2010.
doi:
10.2168/LMCS-6(3:16)2010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DL10]
-
S. Demri and D. Lugiez.
Complexity of Modal Logics with Presburger Constraints.
Journal of Applied Logic, 8(3):233--252, September 2010.
doi:
10.1016/j.jal.2010.03.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[San10]
-
O. Sankur.
Model-checking robuste des automates temporisés via
les machines à canaux.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex |
Web page |
PDF ]
-
[Sou10a]
-
R. Soulat.
Améliorations algorithmiques d'un moteur de model-checking
et études de cas.
Rapport de Master, Master 2 Recherche Informatique Paris
Sud 11, September 2010.
[ BibTex |
Web page |
PDF ]
-
[Boi10]
-
A. Boiret.
Grammaires context-free pour les arbres sans rang.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex |
Web page |
PDF ]
-
[Dim10]
-
J. Dimino.
Sur les arbres de rang non borné avec données.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex |
Web page |
PDF ]
-
[Mon10]
-
B. Monmege.
Propriétés quantitatives des mots et des arbres --
Applications aux langages XML.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex |
Web page |
PDF ]
-
[ABMG10]
-
S. Abiteboul, P. Bourhis, B. Marinoiu, and A. Galland.
AXART -- Enabling Collaborative Work with AXML Artifacts.
In Proceedings of the 36th International Conference on Very
Large Data Bases (VLDB'10), volume 3 of Proceedings of the VLDB
Endowment, pages 1553--1556, Singapore, September 2010. ACM Press.
[ BibTex |
Web page |
PDF ]
-
[BBC+10a]
-
P. Baldan, A. Bruni, A. Corradini, B. König, and
S. Schwoon.
On the Computation of McMillan's Prefix for Contextual Nets
and Graph Grammars.
In Proceedings of the 5th International Conference on Graph
Transformations (ICGT'10), volume 6372 of Lecture Notes in Computer
Science, pages 91--106, Enschede, The Netherlands, September-October 2010.
Springer.
doi:
10.1007/978-3-642-15928-2_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Cyr10b]
-
A. Cyriac.
Temporal Logics for Concurrent Recursive Programs.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2010.
[ BibTex |
Web page |
PDF ]
-
[Haa10b]
-
S. Haar.
What Topology Tells us about Diagnosability in Partial Order
Semantics.
In Proceedings of the 10th Workshop on Discrete Event
Systems (WODES'10), pages 221--226, Berlin, Germany, August-September
2010. IFAC.
[ BibTex |
Web page |
PDF ]
-
[GL10]
-
P. Gastin and F. Laroussinie, editors.
Proceedings of the 21st International Conference on
Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in
Computer Science. Springer, August-September 2010.
doi:
10.1007/978-3-642-15375-4.
[ BibTex |
DOI |
Web page ]
-
[FHL10]
-
D. Figueira, P. Hofman, and S. Lasota.
Relating timed and register automata.
In Proceedings of the 17th International Workshop on
Expressiveness in Concurrency (EXPRESS'10), volume 41 of Electronic
Proceedings in Theoretical Computer Science, pages 61--75, Paris, France,
August 2010.
doi:
10.4204/EPTCS.41.5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKRS10b]
-
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel.
A Formal Analysis of Authentication in the TPM (short paper).
In Preliminary Proceedings of the 8th International Workshop
on Security Issues in Coordination Models, Languages and Systems
(SecCo'10), Paris, France, August 2010.
[ BibTex |
Web page |
PS |
PDF ]
-
[Sch10c]
-
Ph. Schnoebelen.
Lossy Counter Machines Decidability Cheat Sheet.
In Proceedings of the 4th Workshop on Reachability Problems
in Computational Models (RP'10), volume 6227 of Lecture Notes in
Computer Science, pages 51--75, Brno, Czech Republic, August 2010. Springer.
doi:
10.1007/978-3-642-15349-5_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AF10a]
-
É. André and L. Fribourg.
Behavioral Cartography of Timed Automata.
In Proceedings of the 4th Workshop on Reachability Problems
in Computational Models (RP'10), volume 6227 of Lecture Notes in
Computer Science, pages 76--90, Brno, Czech Republic, August 2010. Springer.
doi:
10.1007/978-3-642-15349-5_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDG+10]
-
A. Degorre, L. Doyen, R. Gentilini, J.-F. Raskin, and
S. Toruńczyk.
Energy and Mean-Payoff Games with Imperfect Information.
In Proceedings of the 19th Annual EACSL Conference on
Computer Science Logic (CSL'10), volume 6247 of Lecture Notes in
Computer Science, pages 260--274, Brno, Czech Republic, August 2010.
Springer.
doi:
10.1007/978-3-642-15205-4_22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sch10d]
-
Ph. Schnoebelen.
Revisiting Ackermann-Hardness for Lossy Counter Machines and
Reset Petri Nets.
In Proceedings of the 35th International Symposium on
Mathematical Foundations of Computer Science (MFCS'10), volume 6281
of Lecture Notes in Computer Science, pages 616--628, Brno, Czech Republic,
August 2010. Springer.
doi:
10.1007/978-3-642-15155-2_54.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDGH10]
-
K. Chatterjee, L. Doyen, H. Gimbert, and Th. A.
Henzinger.
Randomness for Free.
In Proceedings of the 35th International Symposium on
Mathematical Foundations of Computer Science (MFCS'10), volume 6281
of Lecture Notes in Computer Science, pages 246--257, Brno, Czech Republic,
August 2010. Springer.
doi:
10.1007/978-3-642-15155-2_23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FP10]
-
G. Fontaine and Th. Place.
Classes of trees definable in the μ-calculus.
In Proceedings of the 35th International Symposium on
Mathematical Foundations of Computer Science (MFCS'10), volume 6281
of Lecture Notes in Computer Science, pages 381--392, Brno, Czech Republic,
August 2010. Springer.
doi:
10.1007/978-3-642-15155-2_34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDH10b]
-
K. Chatterjee, L. Doyen, and Th. A. Henzinger.
Qualitative Analysis of Partially-observable Markov Decision
Processes.
In Proceedings of the 35th International Symposium on
Mathematical Foundations of Computer Science (MFCS'10), volume 6281
of Lecture Notes in Computer Science, pages 258--269, Brno, Czech Republic,
August 2010. Springer.
doi:
10.1007/978-3-642-15155-2_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[OU10]
-
J. Olschewski and M. Ummels.
The Complexity of Finding Reset Words in Finite Automata.
In Proceedings of the 35th International Symposium on
Mathematical Foundations of Computer Science (MFCS'10), volume 6281
of Lecture Notes in Computer Science, pages 568--579, Brno, Czech Republic,
August 2010. Springer.
doi:
10.1007/978-3-642-15155-2_50.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDE+10]
-
K. Chatterjee, L. Doyen, H. Edelsbrunner, Th. A.
Henzinger, and P. Rannou.
Mean-Payoff Automaton Expressions.
In Proceedings of the 21st International Conference on
Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in
Computer Science, pages 269--283, Paris, France, August-September 2010.
Springer.
doi:
10.1007/978-3-642-15375-4_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBM10b]
-
P. Bouyer, R. Brenguier, and N. Markey.
Nash Equilibria for Reachability Objectives in Multi-player
Timed Games.
In Proceedings of the 21st International Conference on
Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in
Computer Science, pages 192--206, Paris, France, August-September 2010.
Springer.
doi:
10.1007/978-3-642-15375-4_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CS10a]
-
P. Chambart and Ph. Schnoebelen.
Computing blocker sets for the Regular Post Embedding
Problem.
In Proceedings of the 14th International Conference on
Developments in Language Theory (DLT'10), volume 6224 of Lecture
Notes in Computer Science, pages 136--147, London, Ontario, Canada, August
2010. Springer.
doi:
10.1007/978-3-642-14455-4_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HNS10]
-
P.-C. Héam, C. Nicaud, and S. Schmitz.
Parametric Random Generation of Deterministic Tree Automata.
Theoretical Computer Science, 411(38-39):3469--3480, August 2010.
doi:
10.1016/j.tcs.2010.05.036.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JR10]
-
F. Jacquemard and M. Rusinowitch.
Rewrite-based verification of XML updates.
In Proceedings of the 12th International ACM SIGPLAN
Conference on Principles and Practice of Declarative Programming
(PPDP'10), pages 119--130, Hagenberg, Austria, July 2010. ACM Press.
doi:
10.1145/1836089.1836105.
[ BibTex |
DOI |
Web page |
PDF ]
-
[NSV10]
-
A. Nash, L. Segoufin, and V. Vianu.
Views and queries: Determinacy and rewriting.
ACM Transactions on Database Systems, 35(3), July 2010.
doi:
10.1145/1806907.1806913.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Car10]
-
J.-L. Carré.
Analyse statique de programmes multi-thread pour
l'embarqué.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2010.
[ BibTex |
Web page |
PDF ]
-
[Aks10]
-
S. Akshay.
Spécification et vérification pour des systèmes
distribués et temporisés.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2010.
[ BibTex |
Web page |
PDF ]
-
[DDS10b]
-
M. Dahl, S. Delaune, and G. Steel.
Formal Analysis of Privacy for Vehicular Mix-Zones.
In Proceedings of the Workshop on Foundations of Security and
Privacy (FCS-PrivMod'10), pages 55--70, Edinburgh, Scotland, UK, July
2010.
doi:
10.1007/978-3-642-15497-3_4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Sch10b]
-
S. Schmitz.
On the Computational Complexity of Dominance Links in
Grammatical Formalisms.
In Proceedings of the 48th Annual Meeting of the Association
for Computational Linguistics (ACL'10), pages 514--524, Uppsala,
Sweden, July 2010. Association for Computational Linguistics.
[ BibTex |
Web page |
PDF ]
-
[CCD10]
-
V. Cheval, H. Comon-Lundh, and S. Delaune.
Automating security analysis: symbolic equivalence of constraint
systems.
In Proceedings of the 5th International Joint Conference on
Automated Reasoning (IJCAR'10), volume 6173 of Lecture Notes in
Artificial Intelligence, pages 412--426, Edinburgh, Scotland, UK, July 2010.
Springer-Verlag.
doi:
10.1007/978-3-642-14203-1_35.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou10c]
-
J. Goubault-Larrecq.
Noetherian Spaces in Verification.
In Proceedings of the 37th International Colloquium on
Automata, Languages and Programming (ICALP'10) -- Part II, volume
6199 of Lecture Notes in Computer Science, pages 2--21, Bordeaux, France,
July 2010. Springer.
doi:
10.1007/978-3-642-14162-1_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CS10b]
-
P. Chambart and Ph. Schnoebelen.
Pumping and Counting on the Regular Post Embedding Problem.
In Proceedings of the 37th International Colloquium on
Automata, Languages and Programming (ICALP'10) -- Part II, volume
6199 of Lecture Notes in Computer Science, pages 64--75, Bordeaux, France,
July 2010. Springer.
doi:
10.1007/978-3-642-14162-1_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD10b]
-
K. Chatterjee and L. Doyen.
Energy Parity Games.
In Proceedings of the 37th International Colloquium on
Automata, Languages and Programming (ICALP'10) -- Part II, volume
6199 of Lecture Notes in Computer Science, pages 599--610, Bordeaux, France,
July 2010. Springer.
doi:
10.1007/978-3-642-14162-1_50.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGMZ10]
-
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun.
Pebble weighted automata and transitive closure logics.
In Proceedings of the 37th International Colloquium on
Automata, Languages and Programming (ICALP'10) -- Part II, volume
6199 of Lecture Notes in Computer Science, pages 587--598, Bordeaux, France,
July 2010. Springer.
doi:
10.1007/978-3-642-14162-1_49.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CC10]
-
S. Ciobâcă and V. Cortier.
Protocol composition for arbitrary primitives.
In Proceedings of the 23rd IEEE Computer Security
Foundations Symposium (CSF'10), pages 322--336, Edinburgh, Scotland,
UK, July 2010. IEEE Computer Society Press.
doi:
10.1109/CSF.2010.29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACD10]
-
M. Arnaud, V. Cortier, and S. Delaune.
Modeling and Verifying Ad Hoc Routing Protocols.
In Proceedings of the 23rd IEEE Computer Security
Foundations Symposium (CSF'10), pages 59--74, Edinburgh, Scotland, UK,
July 2010. IEEE Computer Society Press.
doi:
10.1109/CSF.2010.12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKK+10]
-
B. Bollig, J.-P. Katoen, C. Kern, M. Leucker, D. Neider, and
D. R. Piegdon.
libalf: the Automata Learning Framework.
In Proceedings of the 22nd International Conference on
Computer Aided Verification (CAV'10), volume 6174 of Lecture Notes in
Computer Science, pages 360--364, Edinburgh, Scotland, UK, July 2010.
Springer.
doi:
10.1007/978-3-642-14295-6_32.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SS10]
-
N. Schweikardt and L. Segoufin.
Addition-invariant FO and regularity.
In Proceedings of the 25th Annual IEEE Symposium on Logic
in Computer Science (LICS'10), pages 273--282, Edinburgh, Scotland, UK,
July 2010. IEEE Computer Society Press.
doi:
10.1109/LICS.2010.16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PS10]
-
Th. Place and L. Segoufin.
Deciding definability in FO_2(<) on trees.
In Proceedings of the 25th Annual IEEE Symposium on Logic
in Computer Science (LICS'10), pages 253--262, Edinburgh, Scotland, UK,
July 2010. IEEE Computer Society Press.
doi:
10.1109/LICS.2010.17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou10d]
-
J. Goubault-Larrecq.
ωQRB-Domains and the
Probabilistic Powerdomain.
In Proceedings of the 25th Annual IEEE Symposium on Logic
in Computer Science (LICS'10), pages 352--361, Edinburgh, Scotland, UK,
July 2010. IEEE Computer Society Press.
doi:
10.1109/LICS.2010.50.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCG+10]
-
L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and
C. Vacher.
The Emptiness Problem for Tree Automata with Global
Constraints.
In Proceedings of the 25th Annual IEEE Symposium on Logic
in Computer Science (LICS'10), pages 263--272, Edinburgh, Scotland, UK,
July 2010. IEEE Computer Society Press.
doi:
10.1109/LICS.2010.28.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GK10]
-
P. Gastin and D. Kuske.
Uniform satisfiability problem for local temporal logics over
Mazurkiewicz traces.
Information and Computation, 208(7):797--816, July 2010.
doi:
10.1016/j.ic.2009.12.003.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Cyr10a]
-
A. Cyriac.
A New Version of Focus Games for LTL Satisfiability.
In Proceedings of the Workshop on Comparing Logical
Decision Methods (CLoDeM'10), Edinburgh, Scotland, UK, July 2010.
[ BibTex |
Web page |
PDF ]
-
[BJL+10]
-
Th. Brihaye, M. Jungers, S. Lasaulce, N. Markey, and
G. Oreiby.
Using Model Checking for Analyzing Distributed Power Control
Problems.
EURASIP Journal on Wireless Communications and Networking,
2010(861472), June 2010.
doi:
10.1155/2010/861472.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DHLN10]
-
L. Doyen, Th. A. Henzinger, A. Legay, and
D. Nickovic.
Robustness of Sequential Circuits.
In Proceedings of the 10th International Conference on
Application of Concurrency to System Design (ACSD'10), pages
77--84, Braga, Portugal, June 2010. IEEE Computer Society Press.
doi:
10.1109/ACSD.2010.26.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EHH10]
-
D. El Hog-Benzina, S. Haddad, and R. Hennicker.
Process Refinement and Asynchronous Composition with
Modalities.
In Proceedings of the 2nd International Workshop on
Abstractions for Petri Nets and Other Models of Concurrency
(APNOC'10), Braga, Portugal, June 2010.
[ BibTex |
Web page |
PDF ]
-
[HMY10a]
-
S. Haddad, L. Mokdad, and S. Youcef.
Response time of BPEL4WS constructors.
In Proceedings of the 15th IEEE Symposium on Computers and
Communications (ISCC'10), pages 695--700, Riccione, Italy, June 2010.
IEEE Computer Society Press.
doi:
10.1109/ISCC.2010.5546538.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CF10]
-
Th. Chatain and É. Fabre.
Factorization Properties of Symbolic Unfoldings of Colored
Petri Nets.
In Proceedings of the 31st International Conference on
Applications and Theory of Petri Nets (PETRI NETS'10), volume 6128
of Lecture Notes in Computer Science, pages 165--184, Braga, Portugal, June
2010. Springer.
doi:
10.1007/978-3-642-13675-7_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LS10b]
-
L. Libkin and C. Sirangelo.
Reasoning about XML with temporal logics and automata.
Journal of Applied Logic, 8(2):210--232, June 2010.
doi:
10.1016/j.jal.2009.09.005.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BH10b]
-
B. Bollig and L. Hélouët.
Realizability of Dynamic MSC Languages.
In Proceedings of the 5th International Computer Science
Symposium in Russia (CSR'10), volume 6072 of Lecture Notes in Computer
Science, pages 48--59, Kazan, Russia, June 2010. Springer.
doi:
10.1007/978-3-642-13182-0_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKKL10a]
-
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker.
Learning Communicating Automata from MSCs.
IEEE Transactions on Software Engineering, 36(3):390--408, May-June
2010.
doi:
10.1109/TSE.2009.89.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CJ10]
-
Th. Chatain and C. Jard.
Sémantique concurrente symbolique des réseaux de Petri
saufs et dépliages finis des réseaux temporels.
In Actes de la 10ème Conférence Internationale sur les
NOuvelles TEchnologies de la RÉpartition (NOTERE'10), Tozeur,
Tunisia, May-June 2010. IEEE Computer Society Press.
[ BibTex |
Web page |
PDF ]
-
[DKR10b]
-
S. Delaune, S. Kremer, and M. D. Ryan.
Verifying Privacy-Type Properties of Electronic Voting
Protocols: A Taster.
In Towards Trustworthy Elections -- New Directions in
Electronic Voting, volume 6000 of Lecture Notes in Computer Science,
pages 289--309. Springer, May 2010.
doi:
10.1007/978-3-642-12980-3_18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLS10]
-
S. Demri, R. Lazić, and A. Sangnier.
Model checking memoryful linear-time logics over one-counter
automata.
Theoretical Computer Science, 411(22-24):2298--2316, May 2010.
doi:
10.1016/j.tcs.2010.02.021.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFLM10]
-
P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey.
Timed Automata with Observers under Energy Constraints.
In Proceedings of the 13th International Conference on Hybrid
Systems: Computation and Control (HSCC'10), pages 61--70, Stockholm,
Sweden, April 2010. ACM Press.
doi:
10.1145/1755952.1755963.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou10a]
-
J. Goubault-Larrecq.
De Groot Duality and Models of Choice: Angels, Demons, and
Nature.
Mathematical Structures in Computer Science, 20(2):169--237, April
2010.
doi:
10.1017/S0960129509990363.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CKW10]
-
V. Cortier, S. Kremer, and B. Warinschi.
A Survey of Symbolic Methods in Computational Analysis of
Cryptographic Systems.
Journal of Automated Reasoning, 46(3-4):225--259, April 2010.
doi:
10.1007/s10817-010-9187-9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BH10a]
-
M. Ben Hmida and S. Haddad.
Client Synthesis for Aspect Oriented Web Services.
In Revised Selected Papers of the 15th Monterey Workshop on
Foundations of Computer Software (MONTEREY'08), volume 6028 of
Lecture Notes in Computer Science, pages 24--42, Budapest, Hungary, April
2010. Springer.
doi:
10.1007/978-3-642-12566-9_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[RHS10]
-
L. Recalde, S. Haddad, and M. Silva.
Continuous Petri Nets: Expressive Power and Decidability
Issues.
International Journal of Foundations of Computer Science,
21(2):235--256, April 2010.
doi:
10.1142/S0129054110007222.
[ BibTex |
DOI ]
-
[VLC10]
-
J. Villard, É. Lozes, and C. Calcagno.
Tracking Heaps that Hop with Heap-Hop.
In Proceedings of the 16th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'10),
volume 6015 of Lecture Notes in Computer Science, pages 275--279, Paphos,
Cyprus, March 2010. Springer.
doi:
10.1007/978-3-642-12002-2_23.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DS10]
-
S. Demri and A. Sangnier.
When Model-Checking Freeze LTL over Counter Machines Becomes
Decidable.
In Proceedings of the 13th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages
176--190, Paphos, Cyprus, March 2010. Springer.
doi:
10.1007/978-3-642-12032-9_13.
[ BibTex |
DOI |
Web page |
PDF ]
-
[tCF10]
-
B. ten Cate and G. Fontaine.
An Easy Completeness Proof for the Modal μ-Calculus on
Finite Trees.
In Proceedings of the 13th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages
161--175, Paphos, Cyprus, March 2010. Springer.
doi:
10.1007/978-3-642-12032-9_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CS10c]
-
P. Chambart and Ph. Schnoebelen.
Toward a compositional theory of leftist grammars and
transformations.
In Proceedings of the 13th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages
237--251, Paphos, Cyprus, March 2010. Springer.
doi:
10.1007/978-3-642-12032-9_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKR10a]
-
S. Delaune, S. Kremer, and M. D. Ryan.
Symbolic bisimulation for the applied pi calculus.
Journal of Computer Security, 18(2):317--377, March 2010.
doi:
10.3233/JCS-2010-0363.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bon10]
-
R. Bonnet.
Well-structured Petri-nets extensions with data.
Rapport de Master, Master Computer Science, EPFL, Lausanne,
Switzerland, March 2010.
[ BibTex |
Web page |
PDF ]
-
[tCS10]
-
B. ten Cate and L. Segoufin.
Transitive Closure Logic, Nested Tree Walking Automata, and
XPath.
Journal of the ACM, 57(3), March 2010.
doi:
10.1145/1706591.1706598.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Seg10]
-
L. Segoufin, editor.
Proceedings of the 13th International Conference on
Database Theory (ICDT'10), March 2010.
[ BibTex |
Web page ]
-
[ACK+10]
-
S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and
P. Senellart.
Aggregate queries for discrete and continuous
probabilistic XML.
In Proceedings of the 13th International Conference on
Database Theory (ICDT'10), pages 50--61, Lausanne, Switzerland, March
2010. ACM Press.
doi:
10.1145/1804669.1804679.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fig10a]
-
D. Figueira.
Forward-XPath and extended register automata on data-trees.
In Proceedings of the 13th International Conference on
Database Theory (ICDT'10), pages 230--240, Lausanne, Switzerland, March
2010. ACM Press.
doi:
10.1145/1804669.1804699.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DR10b]
-
L. Doyen and J.-F. Raskin.
Antichains Algorithms for Finite Automata.
In Proceedings of the 16th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'10),
volume 6015 of Lecture Notes in Computer Science, pages 2--22, Paphos,
Cyprus, March 2010. Springer.
doi:
10.1007/978-3-642-12002-2_2.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BCM10]
-
P. Bouyer, F. Chevalier, and N. Markey.
On the Expressiveness of TPTL and MTL.
Information and Computation, 208(2):97--116, February 2010.
doi:
10.1016/j.ic.2009.10.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AHL+10]
-
A. Antonik, M. Huth, K. G. Larsen, U. Nyman, and
A. Wąsowski.
Modal and mixed specifications: key decision problems and their
complexities.
Mathematical Structures in Computer Science, 10(1):75--103, February
2010.
doi:
10.1017/S0960129509990260.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GAMS10]
-
A. Galland, S. Abiteboul, A. Marian, and P. Senellart.
Corroborating information from disagreeing views.
In Proceedings of the 3rd International Conference on Web
Search and Web Data Mining (WSDM'10), pages 131--140, New York,
New York, USA, February 2010. ACM Press.
doi:
10.1145/1718487.1718504.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Sch10a]
-
S. Schmitz.
An Experimental Ambiguity Detection Tool.
Science of Computer Programming, 75(1-2):71--84, January 2010.
doi:
10.1016/j.scico.2009.07.002.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CLPV10]
-
R. Chadha, A. Legay, P. Prabhakar, and M. Viswanathan.
Complexity bounds for the verification of real-time software.
In Proceedings of the 11th International Conference on
Verification, Model Checking and Abstract Interpretation
(VMCAI'10), volume 5944 of Lecture Notes in Computer Science, pages
95--111, Madrid, Spain, January 2010. Springer.
doi:
10.1007/978-3-642-11319-2_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBC10b]
-
P. Bouyer, Th. Brihaye, and F. Chevalier.
O-Minimal Hybrid Reachability Games.
Logical Methods in Computer Science, 6(1:1), January 2010.
doi:
10.2168/LMCS-6(1:1)2010.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS10]
-
A. Finkel and A. Sangnier.
Mixing coverability and reachability to analyze VASS with one
zero-test.
In Proceedings of the 36th International Conference on Current
Trends in Theory and Practice of Computer Science (SOFSEM'10), volume 5901
of Lecture Notes in Computer Science, pages 394--406, Špindlerův
Mlýn, Czech Republic, January 2010. Springer.
doi:
10.1007/978-3-642-11266-9_33.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BKKL10b]
-
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker.
SMA---The Smyle Modeling Approach.
Computing and Informatics, 29(1):45--72, 2010.
[ BibTex |
Web page |
PDF ]
-
[ZBH10]
-
M. Zargayouna, F. Balbo, and S. Haddad.
Agents Secure Interaction in Data Driven Languages.
In Revised Selected Papers of the 2nd Workshop on
LAnguages, methodologies and Development tools for multi-agent systemS
(LADS'09), volume 6039 of Lecture Notes in Computer Science, pages 72--91,
Turin, Italy, 2010. Springer.
doi:
10.1007/978-3-642-13338-1_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CCZ10]
-
H. Comon-Lundh, V. Cortier, and E. Zălinescu.
Deciding security properties for cryptographic protocols.
Application to key cycles.
ACM Transactions on Computational Logic, 11(2), January 2010.
doi:
10.1145/1656242.1656244.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AF10b]
-
P. Arnoux and A. Finkel.
Using mental imagery processes for teaching and research in
mathematics and computer science.
International Journal of Mathematical Education in Science and
Technology, 41(2):229--242, January 2010.
doi:
10.1080/00207390903372429.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Ber10]
-
D. Berwanger.
Infinite Coordination Games.
In Logic and the Foundations of Game and Decision Theory (LOFT8),
volume 6006 of Lecture Notes in Artificial Intelligence, pages 1--19.
Springer, 2010.
doi:
10.1007/978-3-642-15164-4_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDH10c]
-
K. Chatterjee, L. Doyen, and Th. A. Henzinger.
Quantitative Languages.
ACM Transactions on Computational Logic, 11(4), 2010.
[ BibTex |
Web page |
PS |
PDF ]
-
[MLRS10]
-
N. Markey, S. Li, J.-F. Raskin, and M. Stoelinga.
Synthesizing controllers with bounded resources.
Deliverable QUASIMODO 3.4 (ICT-FP7-STREP-214755), January 2010.
[ BibTex ]
-
[LS10a]
-
L. Libkin and C. Sirangelo.
Disjoint pattern matching and implication in strings.
Information Processing Letters, 110(4):143--147, January 2010.
doi:
10.1016/j.ipl.2009.11.009.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DFGvD10]
-
S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen.
Model-checking CTL^* over Flat Presburger
Counter Systems.
Journal of Applied Non-Classical Logics, 20(4):313--344, 2010.
doi:
10.3166/jancl.20.313-344.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDMP09]
-
F. Chevalier, D. D'Souza, R. M. Matteplackel, and
P. Prabhakar.
Automata and logics over finitely varying functions.
Annals of Pure and Applied Logics, 161(3):324--336, December 2009.
doi:
10.1016/j.apal.2009.07.007.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Mer09]
-
A. Mercier.
Contributions à l'analyse automatique des protocoles
cryptographiques en présence de propriétés algébriques :
protocoles de groupe, équivalence statique.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2009.
[ BibTex |
Web page |
PDF ]
-
[Bur09a]
-
S. Bursuc.
Contraintes de déductibilité dans une algèbre
quotient: réduction de modèles et applications à la
sécurité.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2009.
[ BibTex |
Web page |
PDF ]
-
[Gou09a]
-
J. Goubault-Larrecq.
Logic Wins!.
In Proceedings of the 13th Asian Computing Science
Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science,
pages 1--16, Seoul, Korea, December 2009. Springer.
doi:
10.1007/978-3-642-10622-4_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DJLL09]
-
S. Demri, M. Jurdziński, O. Lachish, and R. Lazić.
The covering and boundedness problems for branching vector
addition systems.
In Proceedings of the 29th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'09),
volume 4 of Leibniz International Proceedings in Informatics, pages 181--192,
Kanpur, India, December 2009. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2009.2317.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKP09]
-
S. Delaune, S. Kremer, and O. Pereira.
Simulation based security in the applied pi calculus.
In Proceedings of the 29th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'09),
volume 4 of Leibniz International Proceedings in Informatics, pages 169--180,
Kanpur, India, December 2009. Leibniz-Zentrum für Informatik.
doi:
10.4230/LIPIcs.FSTTCS.2009.2316.
[ BibTex |
DOI |
Web page |
PDF ]
-
[VLC09]
-
J. Villard, É. Lozes, and C. Calcagno.
Proving Copyless Message Passing.
In Proceedings of the 7th Asian Symposium on Programming
Languages and Systems (APLAS'09), volume 5904 of Lecture Notes in
Computer Science, pages 194--209, Seoul, Korea, December 2009. Springer.
doi:
10.1007/978-3-642-10672-9_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBC09]
-
P. Bouyer, Th. Brihaye, and F. Chevalier.
Weighted O-Minimal Hybrid Systems.
Annals of Pure and Applied Logics, 161(3):268--288, December 2009.
doi:
10.1016/j.apal.2009.07.014.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KMT09a]
-
S. Kremer, A. Mercier, and R. Treinen.
Reducing Equational Theories for the Decision of Static
Equivalence.
In Proceedings of the 13th Asian Computing Science
Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science,
pages 94--108, Seoul, Korea, December 2009. Springer.
doi:
10.1007/978-3-642-10622-4_8.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BDC09]
-
S. Bursuc, S. Delaune, and H. Comon-Lundh.
Deducibility constraints.
In Proceedings of the 13th Asian Computing Science
Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science,
pages 24--38, Seoul, Korea, December 2009. Springer.
doi:
10.1007/978-3-642-10622-4_3.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BDL09]
-
R. Brochenin, S. Demri, and É. Lozes.
Reasoning about sequences of memory states.
Annals of Pure and Applied Logics, 161(3):305--323, December 2009.
doi:
10.1016/j.apal.2009.07.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DG09a]
-
S. Demri and R. Gascon.
The Effects of Bounding Syntactic Resources on Presburger
LTL.
Journal of Logic and Computation, 19(6):1541--1575, December 2009.
doi:
10.1093/logcom/exp037.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ASV09b]
-
S. Abiteboul, L. Segoufin, and V. Vianu.
Static Analysis of Active XML Systems.
ACM Transactions on Database Systems, 34(4), December 2009.
doi:
10.1145/1620585.1620590.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Haa09]
-
S. Haar.
Qualitative Diagnosability of Labeled Petri Nets Revisited.
In Proceedings of the Joint 48th IEEE Conference on Decision
and Control (CDC'09) and 28th Chinese Control Conference
(CCC'09), pages 1248--1253, Shanghai, China, December 2009. IEEE Control
System Society.
doi:
10.1109/CDC.2009.5400917.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bou09a]
-
F. Bouchy.
Logiques et modèles pour la vérification de systèmes
infinis.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2009.
[ BibTex |
Web page |
PDF ]
-
[Szn09]
-
N. Sznajder.
Synthèse de systèmes distribués ouverts.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2009.
[ BibTex |
Web page |
PDF ]
-
[SRKK09]
-
B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh.
Election verifiability in electronic voting protocols
(Preliminary version).
In Proceedings of the 4th Benelux Workshop on Information and
System Security (WISSEC'09), Louvain-la-Neuve, Belgium, November 2009.
[ BibTex |
Web page |
PDF ]
-
[BFS09a]
-
F. Bouchy, A. Finkel, and P. San Pietro.
Dense-choice Counter Machines Revisited.
In Proceedings of the 11th International Workshops on
Verification of Infinite State Systems (INFINITY'09), volume 10 of
Electronic Proceedings in Theoretical Computer Science, pages 3--22, Bologna,
Italy, November 2009.
doi:
10.4204/EPTCS.10.1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AF09a]
-
É. André and L. Fribourg.
An Inverse Method for Policy-Iteration Based Algorithms.
In Proceedings of the 11th International Workshops on
Verification of Infinite State Systems (INFINITY'09), volume 10 of
Electronic Proceedings in Theoretical Computer Science, pages 44--61,
Bologna, Italy, November 2009.
doi:
10.4204/EPTCS.10.4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HMY09]
-
S. Haddad, L. Mokdad, and S. Youcef.
Bornes du temps de réponse des services Web composites.
In Actes du 7ème Colloque sur la Modélisation des
Systèmes Réactifs (MSR'09), volume 43 of Journal Européen
des Systèmes Automatisés, pages 969--983, Nantes, France, November
2009. Hermès.
[ BibTex |
Web page |
PDF ]
-
[ACD+09a]
-
É. André, Th. Chatain, O. De Smet,
L. Fribourg, and S. Ruel.
Synthèse de contraintes temporisées pour une
architecture d'automatisation en réseau.
In Actes du 7ème Colloque sur la Modélisation des
Systèmes Réactifs (MSR'09), volume 43 of Journal Européen
des Systèmes Automatisés, pages 1049--1064, Nantes, France, November
2009. Hermès.
[ BibTex |
Web page |
PDF ]
-
[Ste09b]
-
G. Steel.
Towards a Formal Analysis of the SeVeCoM API.
In Proceedings of the 7th Conference on Embedded Security in
Cars (ESCAR'09), Düsseldorf, Germany, November 2009.
[ BibTex |
Web page |
PDF ]
-
[LCE+09]
-
LIAFA, CRIL, EDF, LSV, and Verimag.
Projet RNTL Averiles -- Fourniture F2.2 : Algorithmes de
vérification -- Rapport final, November 2009.
25 pages.
[ BibTex |
Web page |
PDF ]
-
[FLS09a]
-
A. Finkel, É. Lozes, and A. Sangnier.
Towards Model Checking Pointer Systems.
In Revised Selected Papers of the International Conference
on Infinity in Logic & Computation (ILC'07), volume 5489 of
Lecture Notes in Artificial Intelligence, pages 56--82, Cape Town, South
Africa, October 2009. Springer-Verlag.
doi:
10.1007/978-3-642-03092-5_6.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[AKSS09]
-
S. Abiteboul, B. Kimelfeld, Y. Sagiv, and P. Senellart.
On the expressiveness of probabilistic XML models.
The VLDB Journal, 18(5):1041--1064, October 2009.
doi:
10.1007/s00778-009-0146-1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CM09]
-
F. Cassez and N. Markey.
Control of Timed Systems.
In Communicating Embedded Systems -- Software and Design, chapter 3,
pages 83--120. Wiley-ISTE, October 2009.
[ BibTex |
Web page ]
-
[DH09]
-
S. Donatelli and S. Haddad.
Quantitative Verification of Markov Chains.
In Communicating Embedded Systems -- Software and Design, chapter 5,
pages 139--163. Wiley-ISTE, October 2009.
[ BibTex |
Web page ]
-
[Cha09]
-
N. Chamseddine.
Analyse quantitative parametrée d'automates temporisés
probabilistes.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2009.
[ BibTex |
Web page |
PDF ]
-
[CCD09]
-
V. Cheval, H. Comon-Lundh, and S. Delaune.
A decision procedure for proving observational equivalence.
In Preliminary Proceedings of the 7th International Workshop
on Security Issues in Coordination Models, Languages and Systems
(SecCo'09), Bologna, Italy, October 2009.
[ BibTex |
Web page |
PDF ]
-
[Dim09]
-
J. Dimino.
Les systèmes à canaux non-fiables vus comme des
transducteurs.
Rapport de stage de M1, Master Parisien de Recherche en
Informatique, Paris, France, October 2009.
[ BibTex |
Web page |
PDF ]
-
[FLS09b]
-
R. Focardi, F. L. Luccio, and G. Steel.
Blunting Differential Attacks on PIN Processing APIs.
In Proceedings of the 14th Nordic Workshop on Secure IT
Systems (NordSec'09), volume 5838 of Lecture Notes in Computer Science,
pages 88--103, Oslo, Norway, October 2009. Springer.
doi:
10.1007/978-3-642-04766-4_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCHK09]
-
Y. Boichut, R. Courbis, P.-C. Héam, and
O. Kouchnarenko.
Handling Non-left Linear Rules when Completing Tree Automata.
International Journal of Foundations of Computer Science,
20(5):837--849, October 2009.
doi:
10.1142/S0129054109006917.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACEF09]
-
É. André, Th. Chatain, E. Encrenaz, and
L. Fribourg.
An Inverse Method for Parametric Timed Automata.
International Journal of Foundations of Computer Science,
20(5):819--836, October 2009.
doi:
10.1142/S0129054109006905.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DHL09]
-
F. Dadeau, P.-C. Héam, and J. Levrey.
On the Use of Uniform Random Generation of Automata for
Testing.
In Proceedings of the 5th Workshop on Model-Based Testing
(MBT'09), volume 253 of Electronic Notes in Theoretical Computer Science,
pages 37--51, York, UK, October 2009. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2009.09.050.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS09a]
-
M. Benedikt and L. Segoufin.
Regular tree languages definable in FO and in
FO_mod.
ACM Transactions on Computational Logic, 11(1), October 2009.
doi:
10.1145/1614431.1614435.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DBB+09]
-
A. David, G. Behrmann, P. Bulychev, J. Byg,
Th. Chatain, K. G. Larsen, P. Pettersson, J. I. Rasmussen, J. Srba, W. Yi,
K. Y. Joergensen, D. Lime, M. Magnin, O. H. Roux, and L.-M. Traonouez.
Tools for Model-Checking Timed Systems.
In Communicating Embedded Systems -- Software and Design, chapter 6,
pages 165--225. Wiley-ISTE, October 2009.
[ BibTex |
Web page ]
-
[ASV09a]
-
S. Abiteboul, L. Segoufin, and V. Vianu.
Modeling and Verifying Active XML Artifacts.
IEEE Data Engineering Bulletin, 32(3):10--15, September 2009.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Che09]
-
V. Cheval.
Algorithme de décision de l'équivalence symbolique de
systèmes de contraintes.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2009.
[ BibTex |
Web page |
PDF ]
-
[Bre09]
-
R. Brenguier.
Calcul des équilibres de Nash dans les jeux temporisés.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2009.
[ BibTex |
Web page |
PS |
PDF ]
-
[BCH+09]
-
C. Boutrous-Saab, D. Coulibaly, S. Haddad, T. Melliti,
P. Moreaux, and S. Rampacek.
An Integrated Framework for Web Services Orchestration.
International Journal of Web Services Research, 6(4):1--29, September
2009.
[ BibTex |
Web page |
PDF ]
-
[AFS09]
-
É. André, L. Fribourg, and J. Sproston.
An Extension of the Inverse Method to Probabilistic Timed
Automata.
In Proceedings of the 9th International Workshop on Automated
Verification of Critical Systems (AVoCS'09), volume 23 of Electronic
Communications of the EASST, Swansea, UK, September 2009. European
Association of Software Science and Technology.
[ BibTex |
Web page |
PDF ]
-
[CDL09]
-
Th. Chatain, A. David, and K. G. Larsen.
Playing Games with Timed Games.
In Proceedings of the 3rd IFAC Conference on Analysis and
Design of Hybrid Systems (ADHS'09), Zaragoza, Spain, September 2009.
[ BibTex |
Web page |
PDF ]
-
[BHK09]
-
Y. Boichut, P.-C. Héam, and O. Kouchnarenko.
How to Tackle Integer Weighted Automata Positivity.
In Proceedings of the 3rd Workshop on Reachability Problems
in Computational Models (RP'09), volume 5797 of Lecture Notes in
Computer Science, pages 79--92, Palaiseau, France, September 2009. Springer.
doi:
10.1007/978-3-642-04420-5_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCDL09]
-
P. Bulychev, Th. Chatain, A. David, and K. G.
Larsen.
Checking simulation relation between timed game automata.
In Proceedings of the 7th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813
of Lecture Notes in Computer Science, pages 73--87, Budapest, Hungary,
September 2009. Springer.
doi:
10.1007/978-3-642-04368-0_8.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HP09]
-
S. Haddad and N. Pekergin.
Using Stochastic Comparison for Efficient Model Checking of
Uncertain Markov Chains.
In Proceedings of the 6th International Conference on
Quantitative Evaluation of Systems (QEST'09), pages 177--186,
Budapest, Hungary, September 2009. IEEE Computer Society Press.
doi:
10.1109/QEST.2009.42.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CFLS09]
-
M. Centenaro, R. Focardi, F. L. Luccio, and G. Steel.
Type-based Analysis of PIN Processing APIs.
In Proceedings of the 14th European Symposium on Research in
Computer Security (ESORICS'09), volume 5789 of Lecture Notes in
Computer Science, pages 53--68, Saint Malo, France, September 2009. Springer.
doi:
10.1007/978-3-642-04444-1_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CS09]
-
V. Cortier and G. Steel.
A generic security API for symmetric key management on
cryptographic devices.
In Proceedings of the 14th European Symposium on Research in
Computer Security (ESORICS'09), volume 5789 of Lecture Notes in
Computer Science, pages 605--620, Saint Malo, France, September 2009.
Springer.
doi:
10.1007/978-3-642-04444-1_37.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CAM09]
-
B. Cautis, S. Abiteboul, and T. Milo.
Reasoning about XML update constraints.
Journal of Computer and System Sciences, 75(6):336--358, September
2009.
doi:
10.1016/j.jcss.2009.02.001.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHR09a]
-
A. Bouillard, S. Haar, and S. Rosario.
Critical paths in the Partial Order Unfolding of a Stochastic
Petri Net.
In Proceedings of the 7th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813
of Lecture Notes in Computer Science, pages 43--57, Budapest, Hungary,
September 2009. Springer.
doi:
10.1007/978-3-642-04368-0_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDMR09]
-
P. Bouyer, M. Duflot, N. Markey, and G. Renault.
Measuring Permissivity in Finite Games.
In Proceedings of the 20th International Conference on
Concurrency Theory (CONCUR'09), volume 5710 of Lecture Notes in
Computer Science, pages 196--210, Bologna, Italy, September 2009. Springer.
doi:
10.1007/978-3-642-04081-8_14.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CC09]
-
S. Ciobâcă and V. Cortier.
Algorithmes pour l'équivalence statique.
Deliverable AVOTE 2.1 (ANR-07-SESU-002), September 2009.
17 pages.
[ BibTex |
Web page |
PDF ]
-
[BK09]
-
M. Boreale and S. Kremer, editors.
Proceedings of the 7th International Workshop on
Security Issues in Concurrency (SecCo'09), volume 7 of Electronic
Proceedings in Theoretical Computer Science, Bologna, Italy, August 2009.
doi:
10.4204/EPTCS.7.
[ BibTex |
DOI |
Web page ]
-
[FS09a]
-
D. Figueira and L. Segoufin.
Future-looking logics on data words and trees.
In Proceedings of the 34th International Symposium on
Mathematical Foundations of Computer Science (MFCS'09), volume 5734
of Lecture Notes in Computer Science, pages 331--343, Novy Smokovec,
Slovakia, August 2009. Springer.
doi:
10.1007/978-3-642-03816-7_29.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[KAS09]
-
G. Keighren, D. Aspinall, and G. Steel.
Towards a Type System for Security APIs.
In Revised Selected Papers of the Joint Workshop on
Automated Reasoning for Security Protocol Analysis and Issues in
the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in
Computer Science, pages 173--192, York, UK, August 2009. Springer.
doi:
10.1007/978-3-642-03459-6_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS09b]
-
S. Fröschle and G. Steel.
Analysing PKCS#11 Key Management APIs with Unbounded Fresh
Data.
In Revised Selected Papers of the Joint Workshop on
Automated Reasoning for Security Protocol Analysis and Issues in
the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in
Computer Science, pages 92--106, York, UK, August 2009. Springer.
doi:
10.1007/978-3-642-03459-6_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LA09]
-
D. Longuet and M. Aiguier.
Integration Testing from Structured First-Order Specifications
via Deduction Modulo.
In Proceedings of the 6th International Colloquium on
Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture
Notes in Computer Science, pages 261--276, Kuala Lumpur, Malaysia, August
2009. Springer.
doi:
10.1007/978-3-642-03466-4_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[And09b]
-
É. André.
IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds
of Timed Automata.
In Proceedings of the 6th International Colloquium on
Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture
Notes in Computer Science, pages 336--342, Kuala Lumpur, Malaysia, August
2009. Springer.
doi:
10.1007/978-3-642-03466-4_22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDK09c]
-
S. Ciobâcă, S. Delaune, and S. Kremer.
Computing knowledge in security protocols under convergent
equational theories.
In Proceedings of the 22nd International Conference on
Automated Deduction (CADE'09), volume 5663 of Lecture Notes in Computer
Science, pages 355--370, Montreal, Canada, August 2009. Springer.
doi:
10.1007/978-3-642-02959-2_27.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KP09]
-
S. Kremer and P. Panangaden, editors.
Proceedings of the 6th International Workshop on
Security Issues in Concurrency (SecCo'08), volume 242 of
Electronic Notes in Theoretical Computer Science, Toronto, Canada, August
2009. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2009.07.077.
[ BibTex |
DOI |
Web page ]
-
[EF09]
-
E. Encrenaz and A. Finkel.
Automatic verification of counter systems with ranking
functions.
In Joint Proceedings of the 8th, 9th and 10th International
Workshops on Verification of Infinite State Systems
(INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical
Computer Science, pages 85--103. Elsevier Science Publishers, July 2009.
doi:
10.1016/j.entcs.2009.05.032.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DKR09]
-
S. Delaune, S. Kremer, and M. D. Ryan.
Verifying Privacy-type Properties of Electronic Voting
Protocols.
Journal of Computer Security, 17(4):435--487, July 2009.
doi:
10.3233/JCS-2009-0340.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BFS09b]
-
F. Bouchy, A. Finkel, and A. Sangnier.
Reachability in Timed Counter Systems.
In Joint Proceedings of the 8th, 9th and 10th International
Workshops on Verification of Infinite State Systems
(INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical
Computer Science, pages 167--178. Elsevier Science Publishers, July 2009.
doi:
10.1016/j.entcs.2009.05.038.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HV09a]
-
P. Habermehl and T. Vojnar, editors.
Joint Proceedings of the 8th, 9th and 10th International
Workshops on Verification of Infinite State Systems
(INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical
Computer Science. Elsevier Science Publishers, July 2009.
doi:
10.1016/j.entcs.2009.05.026.
[ BibTex |
DOI ]
-
[And09a]
-
É. André.
Everything You Always Wanted to Know About IMITATOR (But Were
Afraid to Ask).
Research Report LSV-09-20, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2009.
11 pages.
[ BibTex |
Web page |
PDF ]
-
[AF09b]
-
C. Areces and D. Figueira.
Which Semantics for Neighbourhood Semantics?
In Proceedings of the 21st International Joint Conference on
Artificial Intelligence (IJCAI'09), pages 671--676, Pasadena,
California, USA, July 2009. AAAI Press.
[ BibTex |
Web page |
PS |
PDF ]
-
[BHS09]
-
B. Bérard, S. Haddad, and M. Sassolas.
Verification on Interrupt Timed Automata.
Research Report LSV-09-16, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2009.
16 pages.
[ BibTex |
Web page |
PDF ]
-
[HN09]
-
P.-C. Héam and C. Nicaud.
Seed: an Easy-to-Use Random Generator of Recursive Data
Structures for Testing.
Research Report LSV-09-15, Laboratoire Spécification et
Vérification, ENS Cachan, France, July 2009.
16 pages.
[ BibTex |
Web page |
PDF ]
-
[CDK09b]
-
S. Ciobâcă, S. Delaune, and S. Kremer.
Computing knowledge in security protocols under convergent
equational theories.
In Preliminary Proceedings of the 4th International Workshop
on Security and Rewriting Techniques (SecReT'09), pages 47--58, Port
Jefferson, New York, USA, July 2009.
[ BibTex |
Web page |
PDF ]
-
[ACD09b]
-
M. Arnaud, V. Cortier, and S. Delaune.
Modeling and Verifying Ad Hoc Routing Protocol.
In Preliminary Proceedings of the 4th International Workshop
on Security and Rewriting Techniques (SecReT'09), pages 33--46, Port
Jefferson, New York, USA, July 2009.
[ BibTex |
Web page |
PS |
PDF ]
-
[KMT09b]
-
S. Kremer, A. Mercier, and R. Treinen.
Reducing Equational Theories for the Decision of Static
Equivalence (Preliminary Version).
In Preliminary Proceedings of the 4th International Workshop
on Security and Rewriting Techniques (SecReT'09), Port Jefferson,
New York, USA, July 2009.
[ BibTex |
Web page |
PS |
PDF ]
-
[AFGM09]
-
C. Areces, D. Figueira, D. Gorín, and S. Mera.
Tableaux and Model Checking for Memory Logics.
In Proceedings of the 18th International Workshop on Theorem
Proving with Analytic Tableaux and Related Methods (TABLEAUX'09),
volume 5607 of Lecture Notes in Artificial Intelligence, pages 47--61, Oslo,
Norway, July 2009. Springer.
doi:
10.1007/978-3-642-02716-1_5.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CHK09]
-
R. Courbis, P.-C. Héam, and O. Kouchnarenko.
TAGED Approximations for Veriying Temporal Patterns.
In Proceedings of the 14th International Conference on
Implementation and Application of Automata (CIAA'09), volume 5642 of
Lecture Notes in Computer Science, pages 135--144, Sydney, Australia, July
2009. Springer-Verlag.
doi:
10.1007/978-3-642-02979-0_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HNS09]
-
P.-C. Héam, C. Nicaud, and S. Schmitz.
Random Generation of Deterministic Tree (Walking) Automata.
In Proceedings of the 14th International Conference on
Implementation and Application of Automata (CIAA'09), volume 5642 of
Lecture Notes in Computer Science, pages 115--124, Sydney, Australia, July
2009. Springer-Verlag.
doi:
10.1007/978-3-642-02979-0_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[PS09]
-
Th. Place and L. Segoufin.
A decidable characterization of Locally Testable Tree
Languages.
In Proceedings of the 36th International Colloquium on
Automata, Languages and Programming (ICALP'09), volume 5556 of
Lecture Notes in Computer Science, pages 285--296, Rhodes, Greece, July 2009.
Springer.
doi:
10.1007/978-3-642-02930-1_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FG09b]
-
A. Finkel and J. Goubault-Larrecq.
Forward Analysis for WSTS, Part II: Complete WSTS.
In Proceedings of the 36th International Colloquium on
Automata, Languages and Programming (ICALP'09), volume 5556 of
Lecture Notes in Computer Science, pages 188--199, Rhodes, Greece, July 2009.
Springer.
doi:
10.1007/978-3-642-02930-1_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBBB09]
-
C. Baier, N. Bertrand, P. Bouyer, and Th. Brihaye.
When are Timed Automata Determinizable?
In Proceedings of the 36th International Colloquium on
Automata, Languages and Programming (ICALP'09), volume 5556 of
Lecture Notes in Computer Science, pages 43--54, Rhodes, Greece, July 2009.
Springer.
doi:
10.1007/978-3-642-02930-1_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BF09]
-
P. Bouyer and V. Forejt.
Reachability in Stochastic Timed Games.
In Proceedings of the 36th International Colloquium on
Automata, Languages and Programming (ICALP'09), volume 5556 of
Lecture Notes in Computer Science, pages 103--114, Rhodes, Greece, July 2009.
Springer.
doi:
10.1007/978-3-642-02930-1_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD09a]
-
V. Cortier and S. Delaune.
A method for proving observational equivalence.
In Proceedings of the 22nd IEEE Computer Security
Foundations Symposium (CSF'09), pages 266--276, Port Jefferson, New
York, USA, July 2009. IEEE Computer Society Press.
doi:
10.1109/CSF.2009.9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHKL09]
-
B. Bollig, P. Habermehl, C. Kern, and M. Leucker.
Angluin-Style Learning of NFA.
In Proceedings of the 21st International Joint Conference on
Artificial Intelligence (IJCAI'09), pages 1004--1009, Pasadena,
California, USA, July 2009. AAAI Press.
[ BibTex |
Web page |
PDF ]
-
[Ste09a]
-
G. Steel.
Computational Soundness for APIs.
In Proceedings of the 5th Workshop on Formal and
Computational Cryptography (FCC'09), Port Jefferson, New York, USA,
July 2009.
[ BibTex |
Web page |
PDF ]
-
[LS09]
-
L. Libkin and C. Sirangelo.
Open and closed world assumptions in data exchange.
In Proceedings of the 22nd International Workshop Description
Logic (DL'09), volume 477 of CEUR Workshop Proceedings, pages 1--6,
Oxford, UK, July 2009. RWTH Aachen, Germany.
[ BibTex |
Web page |
PDF ]
-
[BYBJ09]
-
N. Ben Youssef, A. Bouhoula, and F. Jacquemard.
Automatic Verification of Conformance of Firewall Configurations
to Security Policies.
In Proceedings of the 14th IEEE Symposium on Computers and
Communications (ISCC'09), pages 526 -- 531, Sousse, Tunisia, July 2009.
IEEE Computer Society Press.
doi:
10.1109/ISCC.2009.5202309.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LVN09]
-
F. Laroussinie, F. Vaandrager, and M. Neuhäußer.
Extended timed automata for scheduling.
Deliverable QUASIMODO 3.5 (ICT-FP7-STREP-214755), July 2009.
[ BibTex ]
-
[MBD+09]
-
N. Markey, J. Berendsen, A. David, T. Han, H. Hermanns, K. G.
Larsen, and M. Neuhäußer.
Symbolic data structures and analysis of models with multiple
quantitative aspects.
Deliverable QUASIMODO 2.2 (ICT-FP7-STREP-214755), July 2009.
[ BibTex ]
-
[ABGM09]
-
S. Abiteboul, P. Bourhis, A. Galland, and B. Marinoiu.
The AXML Artifact Model.
In Proceedings of the 16th International Symposium on
Temporal Representation and Reasoning (TIME'09), pages 11--17,
Brixen-Bressanone, Italy, July 2009. IEEE Computer Society Press.
[ BibTex |
Web page |
PDF ]
-
[AP09]
-
S. Abiteboul and N. Polyzotis.
Searching Shared Content in Communities with the Data Ring.
IEEE Data Engineering Bulletin, 32(2):44--51, June 2009.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AEF09]
-
É. André, E. Encrenaz, and L. Fribourg.
Synthesizing Parametric Constraints on Various Case Studies
Using IMITATOR.
Research Report LSV-09-13, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2009.
18 pages.
[ BibTex |
Web page |
PDF ]
-
[ABC09]
-
M. Abadi, B. Blanchet, and H. Comon-Lundh.
Models and Proofs of Protocol Security: A Progress Report.
In Proceedings of the 21st International Conference on
Computer Aided Verification (CAV'09), volume 5643 of Lecture Notes in
Computer Science, pages 35--49, Grenoble, France, June-July 2009. Springer.
doi:
10.1007/978-3-642-02658-4_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BRBH09]
-
A. Bouillard, S. Rosario, A. Benveniste, and S. Haar.
Monotonicity in Service Orchestrations.
In Proceedings of the 30th International Conference on
Applications and Theory of Petri Nets (PETRI NETS'09), volume 5606
of Lecture Notes in Computer Science, pages 263--282, Paris, France, June
2009. Springer.
doi:
10.1007/978-3-642-02424-5_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HKP+09]
-
S. Haddad, F. Kordon, L. Petrucci, J.-F. Pradat-Peyre, and
N. Trèves.
Efficient State-Based Analysis by Introducing Bags in Petri
Nets Color Domains.
In Proceedings of the 28th American Control Conference
(ACC'09), pages 5018--5025, Saint Louis, Missouri, USA, June 2009.
doi:
10.1109/ACC.2009.5160020.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BG09]
-
B. Bollig and P. Gastin.
Weighted versus Probabilistic Logics.
In Proceedings of the 13th International Conference on
Developments in Language Theory (DLT'09), volume 5583 of Lecture
Notes in Computer Science, pages 18--38, Stuttgart, Germany, June-July 2009.
Springer.
doi:
10.1007/978-3-642-02737-6_2.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGM09]
-
S. Abiteboul, G. Gottlob, and M. Manna.
Distributed XML Design.
In Proceedings of the 28th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'09), pages 247--258, Providence, Rhode Island, USA,
June-July 2009. ACM Press.
doi:
10.1145/1559795.1559833.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABM09b]
-
S. Abiteboul, P. Bourhis, and B. Marinoiu.
Satisfiability and relevance for queries over active documents.
In Proceedings of the 28th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'09), pages 87--96, Providence, Rhode Island, USA, June-July
2009. ACM Press.
doi:
10.1145/1559795.1559810.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLPS09]
-
P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo.
XML with Incomplete Information: Models, Properties, and Query
Answering.
In Proceedings of the 28th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'09), pages 237--246, Providence, Rhode Island, USA,
June-July 2009. ACM Press.
doi:
10.1145/1559795.1559832.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Fig09]
-
D. Figueira.
Satisfiability of Downward XPath with Data Equality Tests.
In Proceedings of the 28th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'09), pages 197--206, Providence, Rhode Island, USA,
June-July 2009. ACM Press.
doi:
10.1145/1559795.1559827.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CDK09a]
-
R. Chadha, S. Delaune, and S. Kremer.
Epistemic Logic for the Applied Pi Calculus.
In Proceedings of IFIP International Conference on Formal
Techniques for Distributed Systems (FMOODS/FORTE'09), volume 5522 of
Lecture Notes in Computer Science, pages 182--197, Lisbon, Portugal, June
2009. Springer.
doi:
10.1007/978-3-642-02138-1_12.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BC09a]
-
S. Bursuc and H. Comon-Lundh.
Protocol security and algebraic properties: decision results for
a bounded number of sessions.
In Proceedings of the 20th International Conference on
Rewriting Techniques and Applications (RTA'09), volume 5595 of
Lecture Notes in Computer Science, pages 133--147, Brasília, Brazil,
June-July 2009. Springer.
doi:
10.1007/978-3-642-02348-4_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GJ09]
-
G. Godoy and F. Jacquemard.
Unique Normalization for Shallow TRS.
In Proceedings of the 20th International Conference on
Rewriting Techniques and Applications (RTA'09), volume 5595 of
Lecture Notes in Computer Science, pages 63--77, Brasília, Brazil,
June-July 2009. Springer.
doi:
10.1007/978-3-642-02348-4_5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCD09a]
-
M. Baudet, V. Cortier, and S. Delaune.
YAPA: A generic tool for computing intruder knowledge.
In Proceedings of the 20th International Conference on
Rewriting Techniques and Applications (RTA'09), volume 5595 of
Lecture Notes in Computer Science, pages 148--163, Brasília, Brazil,
June-July 2009. Springer.
doi:
10.1007/978-3-642-02348-4_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GSZ09]
-
P. Gastin, N. Sznajder, and M. Zeitoun.
Distributed synthesis for well-connected architectures.
Formal Methods in System Design, 34(3):215--237, June 2009.
doi:
10.1007/s10703-008-0064-7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFCH09]
-
M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and
S. Haddad.
Parametric NdRFT for the derivation of optimal repair
strategies.
In Proceedings of the 39th Annual IEEEashIFIP
International Conference on Dependable Systems and Networks
(DSN'09), pages 399--408, Estoril, Portugal, June-July 2009. IEEE
Computer Society Press.
doi:
10.1109/DSN.2009.5270312.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AC09]
-
R. Affeldt and H. Comon-Lundh.
Verification of Security Protocols with a Bounded Number of
Sessions Based on Resolution for Rigid Variables.
In Formal to Practical Security, volume 5458 of Lecture Notes
in Computer Science, pages 1--20. Springer, May 2009.
doi:
10.1007/978-3-642-02002-5_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou09b]
-
J. Goubault-Larrecq.
On a Generalization of a Result by Valk and Jantzen.
Research Report LSV-09-09, Laboratoire Spécification et
Vérification, ENS Cachan, France, May 2009.
18 pages.
[ BibTex |
Web page |
PDF ]
-
[BMSS09]
-
M. Bojańczyk, A. Muscholl, Th. Schwentick, and
L. Segoufin.
Two-variable logic on data trees and applications to XML
reasoning.
Journal of the ACM, 56(3), May 2009.
doi:
10.1145/1516512.1516515.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GGJ09]
-
A. Gascón, G. Godoy, and F. Jacquemard.
Closure of Tree Automata Languages under Innermost Rewriting.
In Proceedings of the 8th International Workshop on Reduction
Strategies in Rewriting and Programming (WRS'08), volume 237 of
Electronic Notes in Theoretical Computer Science, pages 23--38, Castle of
Hagenberg, Austria, April 2009. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2009.03.033.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bur09b]
-
E. Bursztein.
Extending Anticipation Games with Location, Penalty and
Timeline.
In Revised Selected Papers of the 5th International
Workshop on Formal Aspects in Security and Trust (FAST'08),
volume 5491 of Lecture Notes in Computer Science, pages 272--286, Malaga,
Spain, April 2009. Springer.
doi:
10.1007/978-3-642-01465-9_18.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DL09]
-
S. Demri and R. Lazić.
LTL with the freeze quantifier and register automata.
ACM Transactions on Computational Logic, 10(3), April 2009.
doi:
10.1145/1507244.1507246.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EFSH09]
-
A. El Fallah Seghrouchni and S. Haddad.
Interopérabilité des systèmes multi-agents à
l'aide des services web.
In Technologies des systèmes multi-agents et applications
industrielles, chapter 3, pages 77--99. Hermès, April 2009.
[ BibTex |
Web page ]
-
[JKV09]
-
F. Jacquemard, F. Klay, and C. Vacher.
Rigid Tree Automata.
In Proceedings of the 3rd International Conference on
Language and Automata Theory and Applications (LATA'09), volume
5457 of Lecture Notes in Computer Science, pages 446--457, Tarragona, Spain,
April 2009. Springer.
doi:
10.1007/978-3-642-00982-2_38.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCK09]
-
M. Baudet, V. Cortier, and S. Kremer.
Computationally Sound Implementations of Equational Theories
against Passive Adversaries.
Information and Computation, 207(4):496--520, April 2009.
doi:
10.1016/j.ic.2008.12.005.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bou09c]
-
P. Bouyer.
Model-Checking Timed Temporal Logics.
In Proceedings of the 4th Workshop on Methods for Modalities
(M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science,
pages 323--341, Cachan, France, March 2009. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2009.02.044.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AD09]
-
C. Areces and S. Demri, editors.
Proceedings of the 5th International Workshop on Methods
for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical
Computer Science, Cachan, France, March 2009. Elsevier Science Publishers.
doi:
10.1016/j.entcs.2009.02.025.
[ BibTex |
DOI |
Web page ]
-
[ABM09a]
-
S. Abiteboul, P. Bourhis, and B. Marinoiu.
Efficient maintenance techniques for views over active
documents.
In Advances in Database Technology --- Proceedings of the
12th International Conference on Extending Database Technology
(EDBT'09), ACM International Conference Proceeding Series, pages
1076--1087, Saint Petersburg, Russia, March 2009. Springer.
doi:
10.1145/1516360.1516483.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGMP09]
-
S. Abiteboul, O. Greenshpan, T. Milo, and N. Polyzotis.
MatchUp: Autocompletion for Mashups.
In Proceedings of the 25th International Conference on Data
Engineering (ICDE'09), pages 1479--1482, Shanghai, China, March-April
2009. IEEE Computer Society Press.
doi:
10.1109/ICDE.2009.47.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CGM+09]
-
Th. Chatain, P. Gastin, A. Muscholl, N. Sznajder,
I. Walukiewicz, and M. Zeitoun.
Distributed control for restricted specifications.
Deliverable DOTS 2.2 (ANR-06-SETI-003), March 2009.
[ BibTex ]
-
[BLLM09]
-
P. Bouyer, F. Laroussinie, D. Lime, and N. Markey.
Synthesis of timed controllers.
Deliverable DOTS 1.2a (ANR-06-SETI-003), March 2009.
[ BibTex ]
-
[DHS09]
-
S. Donatelli, S. Haddad, and J. Sproston.
Model Checking Timed and Stochastic Properties with
CSLTA.
IEEE Transactions on Software Engineering, 35(2):224--240,
March-April 2009.
doi:
10.1109/TSE.2008.108.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCD+09b]
-
D. Berwanger, K. Chatterjee, M. De Wulf, L. Doyen, and
Th. A. Henzinger.
Alpaga: A Tool for Solving Parity Games with Imperfect
Information.
In Proceedings of the 15th International Conference on Tools
and Algorithms for Construction and Analysis of Systems (TACAS'09),
volume 5505 of Lecture Notes in Computer Science, pages 58--61, York, UK,
March 2009. Springer.
doi:
10.1007/978-3-642-00768-2_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBL09]
-
K. Bansal, R. Brochenin, and É. Lozes.
Beyond Shapes: Lists with Ordered Data.
In Proceedings of the 12th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages
425--439, York, UK, March 2009. Springer.
doi:
10.1007/978-3-642-00596-1_30.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BH09]
-
B. Bérard and S. Haddad.
Interrupt Timed Automata.
In Proceedings of the 12th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages
197--211, York, UK, March 2009. Springer.
doi:
10.1007/978-3-642-00596-1_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGH09]
-
B. Bollig, M.-L. Grindei, and P. Habermehl.
Realizability of Concurrent Recursive Programs.
In Proceedings of the 12th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages
410--424, York, UK, March 2009. Springer.
doi:
10.1007/978-3-642-00596-1_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS09b]
-
M. Benedikt and L. Segoufin.
Towards a Characterization of Order-Invariant Queries over Tame
Structures.
Journal of Symbolic Logic, 74(1):168--186, March 2009.
doi:
10.2178/jsl/1231082307.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CEFX09]
-
R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and
W. Xu.
Timed Verification of the Generic Architecture of a Memory
Circuit Using Parametric Timed Automata.
Formal Methods in System Design, 34(1):59--81, February 2009.
doi:
10.1007/s10703-008-0061-x.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CD09b]
-
V. Cortier and S. Delaune.
Safely Composing Security Protocols.
Formal Methods in System Design, 34(1):1--36, February 2009.
doi:
10.1007/s10703-008-0059-4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BC09b]
-
S. Bursuc and H. Comon-Lundh.
Protocols, insecurity decision and combination of equational
theories.
Research Report LSV-09-02, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2009.
43 pages.
[ BibTex |
Web page |
PDF ]
-
[FG09a]
-
A. Finkel and J. Goubault-Larrecq.
Forward Analysis for WSTS, Part I: Completions.
In Proceedings of the 26th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'09), volume 3 of Leibniz
International Proceedings in Informatics, pages 433--444, Freiburg, Germany,
February 2009. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page |
PDF ]
-
[DG09c]
-
M. Droste and P. Gastin.
Weighted automata and weighted logics.
In Handbook of Weighted Automata, EATCS Monographs in Theoretical
Computer Science, chapter 5, pages 175--211. Springer, 2009.
[ BibTex |
Web page |
PDF ]
-
[DG09b]
-
V. Diekert and P. Gastin.
Local safety and local liveness for distributed systems.
In Perspectives in Concurrency Theory, IARCS-Universities, pages
86--106. Universities Press, January 2009.
[ BibTex |
Web page |
PDF ]
-
[HI09]
-
S. Haddad and J.-M. Ilié.
Symmetry and Temporal Logic.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 435--460. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[HV09c]
-
S. Haddad and F. Vernadat.
Verification of Specific Properties.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 349--414. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[HM09c]
-
S. Haddad and P. Moreaux.
Tensor Methods and Stochastic Petri Nets.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 321--346. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[HM09b]
-
S. Haddad and P. Moreaux.
Stochastic Well-formed Petri Nets.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 303--320. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[HM09a]
-
S. Haddad and P. Moreaux.
Stochastic Petri Nets.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 269--302. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[Had09]
-
S. Haddad.
Decidability and Complexity of Petri Net Problems.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 87--122. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[HV09b]
-
S. Haddad and F. Vernadat.
Analysis Methods for Petri Nets.
In Petri Nets: Fundamental Models, Verification and Applications,
pages 41--86. Wiley-ISTE, 2009.
[ BibTex |
Web page ]
-
[BHR09b]
-
P. Bouyer, S. Haddad, and P.-A. Reynier.
Undecidability Results for Timed Automata with Silent
Transitions.
Fundamenta Informaticae, 92(1-2):1--25, 2009.
[ BibTex |
Web page |
PS |
PDF ]
-
[BKL+09]
-
P. Bouyer, J.-P. Katoen, R. Langerak, F. Laroussinie,
N. Markey, and J.-F. Raskin.
Transfer of correctness from models to implementation.
Deliverable QUASIMODO 3.1 (ICT-FP7-STREP-214755), January 2009.
[ BibTex ]
-
[Bou09b]
-
P. Bouyer.
From Qualitative to Quantitative Analysis of Timed Systems.
Mémoire d'habilitation, Université Paris 7, Paris, France,
January 2009.
[ BibTex |
Web page |
PDF ]
-
[GMNK09]
-
P. Gastin, M. Mukund, and K. Narayan Kumar.
Reachability and boundedness in time-constrained MSC graphs.
In Perspectives in Concurrency Theory, IARCS-Universities, pages
157--183. Universities Press, January 2009.
[ BibTex |
Web page |
PDF ]
-
[BP09]
-
P. Bouyer and A. Petit.
On extensions of timed automata.
In Perspectives in Concurrency Theory, IARCS-Universities, pages
35--63. Universities Press, January 2009.
[ BibTex ]
-
[CGS09]
-
Th. Chatain, P. Gastin, and N. Sznajder.
Natural Specifications Yield Decidability for Distributed
Synthesis of Asynchronous Systems.
In Proceedings of the 35th International Conference on Current
Trends in Theory and Practice of Computer Science (SOFSEM'09), volume 5404
of Lecture Notes in Computer Science, pages 141--152, Špindlerův
Mlýn, Czech Republic, January 2009. Springer.
doi:
10.1007/978-3-540-95891-8_16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDLM09]
-
Th. Brihaye, A. Da Costa, F. Laroussinie, and
N. Markey.
ATL with Strategy Contexts and Bounded Memory.
In Proceedings of the Symposium on Logical Foundations of
Computer Science (LFCS'09), volume 5407 of Lecture Notes in Computer
Science, pages 92--106, Deerfield Beach, Florida, USA, January 2009.
Springer.
doi:
10.1007/978-3-540-92687-0_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Com08a]
-
H. Comon-Lundh.
About models of security protocols.
In Proceedings of the 28th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'08),
volume 2 of Leibniz International Proceedings in Informatics, Bangalore,
India, December 2008. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page |
PDF ]
-
[Ore08]
-
G. Oreiby.
Logiques temporelles pour le contrôle temporisé.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, December 2008.
[ BibTex |
Web page |
PDF ]
-
[GLN08]
-
J. Goubault-Larrecq, S. Lasota, and D. Nowak.
Logical Relations for Monadic Types.
Mathematical Structures in Computer Science, 18(6):1169--1217,
December 2008.
81 pages.
doi:
10.1017/S0960129508007172.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bol08]
-
B. Bollig.
On the Expressive Power of 2-Stack Visibly Pushdown
Automata.
Logical Methods in Computer Science, 4(4:16), December 2008.
doi:
10.2168/LMCS-4(4:16)2008.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DG08a]
-
S. Demri and R. Gascon.
Verification of Qualitative
Z constraints.
Theoretical Computer Science, 409(1):24--40, December 2008.
doi:
10.1016/j.tcs.2008.07.023.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DDMR08]
-
M. De Wulf, L. Doyen, N. Markey, and J.-F. Raskin.
Robust Safety of Timed Automata.
Formal Methods in System Design, 33(1-3):45--84, December 2008.
doi:
10.1007/s10703-008-0056-7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ACEF08]
-
É. André, Th. Chatain, E. Encrenaz, and
L. Fribourg.
An Inverse Method for Parametric Timed Automata.
In Proceedings of the 2nd Workshop on Reachability Problems
in Computational Models (RP'08), volume 223 of Electronic Notes in
Theoretical Computer Science, pages 29--46, Liverpool, UK, December 2008.
Elsevier Science Publishers.
doi:
10.1016/j.entcs.2008.12.029.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bur08a]
-
E. Bursztein.
Anticipation games. Théorie des jeux appliqués à la
sécurité réseau.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2008.
[ BibTex |
Web page |
PDF ]
-
[San08]
-
A. Sangnier.
Vérification de systèmes avec compteurs et pointeurs.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2008.
[ BibTex |
Web page |
PS |
PDF ]
-
[Ara08]
-
M. Arapinis.
Sécurité des protocoles cryptographiques :
décidabilité et résultats de réduction.
Thèse de doctorat, Université Paris 12, Créteil, France,
November 2008.
[ BibTex |
Web page |
PDF ]
-
[ADK08]
-
M. Arapinis, S. Delaune, and S. Kremer.
From One Session to Many: Dynamic Tags for Security Protocols.
In Proceedings of the 15th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'08),
volume 5330 of Lecture Notes in Artificial Intelligence, pages 128--142,
Doha, Qatar, November 2008. Springer.
doi:
10.1007/978-3-540-89439-1_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AGM08]
-
S. Abiteboul, O. Greenshpan, and T. Milo.
Modeling the mashup space.
In Proceedings of the 10th ACM International Workshop on
Web Information and Data Management (WIDM'08), pages 87--94, Napa
Valley, California, USA, October 2008. ACM Press.
doi:
10.1145/1458502.1458517.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DH08]
-
S. Donatelli and S. Haddad.
Vérification quantitative de chaînes de Markov.
In Approches formelles des systèmes embarqués communicants,
chapter 6, pages 177--198. Hermès, October 2008.
[ BibTex |
Web page ]
-
[CM08]
-
F. Cassez and N. Markey.
Contrôle des systèmes temporisés.
In Approches formelles des systèmes embarqués communicants,
chapter 4, pages 105--144. Hermès, October 2008.
[ BibTex |
Web page ]
-
[CC08]
-
H. Comon-Lundh and V. Cortier.
Computational Soundness of Observational Equivalence.
In Proceedings of the 15th ACM Conference on Computer and
Communications Security (CCS'08), pages 109--118, Alexandria, Virginia,
USA, October 2008. ACM Press.
doi:
10.1145/1455770.1455786.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCFH08]
-
M. Beccuti, D. Codetta-Raiteri, G. Franceschinis, and
S. Haddad.
Non Deterministic Repairable Fault Trees for Computing Optimal
Repair Strategy.
In Proceedings of the 3rd International Conference on
Performance Evaluation Methodologies and Tools (VALUETOOLS'08),
Athens, Greece, October 2008. Institute for Computer Sciences,
Social-Informatics and Telecommunications Engineering.
doi:
10.4108/ICST.VALUETOOLS2008.4411.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bur08c]
-
E. Bursztein.
NetQi: A Model Checker for Anticipation Game.
In Proceedings of the 6th International Symposium on
Automated Technology for Verification and Analysis (ATVA'08),
volume 5311 of Lecture Notes in Computer Science, pages 246--251, Seoul,
Korea, October 2008. Springer.
doi:
10.1007/978-3-540-88387-6_22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFLP08]
-
S. Bardin, A. Finkel, J. Leroux, and L. Petrucci.
FAST: Acceleration from theory to practice.
International Journal on Software Tools for Technology Transfer,
10(5):401--424, October 2008.
doi:
10.1007/s10009-008-0064-3.
[ BibTex |
DOI |
Web page ]
-
[RBHJ08]
-
S. Rosario, A. Benveniste, S. Haar, and C. Jard.
Probabilistic QoS and Soft Contracts for Transaction-Based
Web Services Orchestrations.
IEEE Transactions on Services Computing, 1(4):187--200,
October-December 2008.
doi:
10.1109/TSC.2008.17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHK08]
-
Y. Boichut, P.-C. Héam, and O. Kouchnarenko.
Approximation-based Tree Regular Model-Checking.
Nordic Journal of Computing, 14(3):216--241, October 2008.
[ BibTex |
Web page |
PDF ]
-
[Cio08]
-
S. Ciobâcă.
Verification of anonymity properties in e-voting protocols.
Rapport de Master, Master Parisien de Recherche en
Informatique, Paris, France, September 2008.
[ BibTex |
Web page |
PDF ]
-
[L+08b]
-
F. Laroussinie et al.
Projet DOTS (ANR-06-SETI-003) : Rapport à 18 mois,
September 2008.
5 pages.
[ BibTex ]
-
[CLLM08]
-
F. Cassez, F. Laroussinie, D. Lime, and N. Markey.
Quantitative Objectives in Timed Games.
Deliverable DOTS 1.1 (ANR-06-SETI-003), September 2008.
[ BibTex ]
-
[BBC+08]
-
B. Bollig, P. Bouyer, F. Cassez, Th. Chatain,
P. Gastin, S. Haddad, and C. Jard.
Model for distributed timed systems.
Deliverable DOTS 3.1 (ANR-06-SETI-003), September 2008.
[ BibTex ]
-
[BBJ+08]
-
P. Bouyer, Th. Brihaye, M. Jurdziński,
R. Lazić, and M. Rutkowski.
Average-Price and Reachability-Price Games on Hybrid Automata
with Strong Resets.
In Proceedings of the 6th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215
of Lecture Notes in Computer Science, pages 63--77, Saint-Malo, France,
September 2008. Springer.
doi:
10.1007/978-3-540-85778-5_6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BFL+08b]
-
P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and
J. Srba.
Infinite Runs in Weighted Timed Automata with Energy
Constraints.
In Proceedings of the 6th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215
of Lecture Notes in Computer Science, pages 33--47, Saint-Malo, France,
September 2008. Springer.
doi:
10.1007/978-3-540-85778-5_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABH08]
-
M. F. Atig, B. Bollig, and P. Habermehl.
Emptiness of multi-pushdown automata is 2ETIME-complete.
In Proceedings of the 12th International Conference on
Developments in Language Theory (DLT'08), volume 5257 of Lecture
Notes in Computer Science, pages 121--133, Kyoto, Japan, September 2008.
Springer.
doi:
10.1007/978-3-540-85780-8_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CDF+08]
-
N. Chamseddine, M. Duflot, L. Fribourg, C. Picaronny, and
J. Sproston.
Computing Expected Absorption Times for Parametric Determinate
Probabilistic Timed Automata.
In Proceedings of the 5th International Conference on
Quantitative Evaluation of Systems (QEST'08), pages 254--263,
Saint Malo, France, September 2008. IEEE Computer Society Press.
doi:
10.1109/QEST.2008.34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Pla08]
-
Th. Place.
Characterization of Logics Over Ranked Tree Languages.
In Proceedings of the 17th Annual EACSL Conference on
Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in
Computer Science, pages 401--415, Bertinoro, Italy, September 2008. Springer.
doi:
10.1007/978-3-540-87531-4_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BDL08]
-
R. Brochenin, S. Demri, and É. Lozes.
On the Almighty Wand.
In Proceedings of the 17th Annual EACSL Conference on
Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in
Computer Science, pages 323--338, Bertinoro, Italy, September 2008. Springer.
doi:
10.1007/978-3-540-87531-4_24.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBBM08]
-
N. Bertrand, P. Bouyer, Th. Brihaye, and
N. Markey.
Quantitative Model-Checking of One-Clock Timed Automata under
Probabilistic Semantics.
In Proceedings of the 5th International Conference on
Quantitative Evaluation of Systems (QEST'08), pages 55--64,
Saint Malo, France, September 2008. IEEE Computer Society Press.
doi:
10.1109/QEST.2008.19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BCH+08]
-
B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H.
Roux.
When are Timed Automata Weakly Timed Bisimilar to Time Petri
Nets?
Theoretical Computer Science, 403(2-3):202--220, September 2008.
doi:
10.1016/j.tcs.2008.03.030.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BK08]
-
B. Bollig and D. Kuske.
Muller Message-Passing Automata and Logics.
Information and Computation, 206(9-10):1084--1094, September-October
2008.
doi:
10.1016/j.ic.2008.03.010.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[LHS08]
-
É. Lozes, D. Hirschkoff, and D. Sangiorgi.
Separability in the Ambient Logic.
Logical Methods in Computer Science, 4(3:4), September 2008.
doi:
10.2168/LMCS-4(3:4)2008.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[AAC+08]
-
S. Abiteboul, T. Allard, Ph. Chatalic, G. Gardarin,
A. Ghitescu, F. Goasdoué, I. Manolescu, B. Nguyen, M. Ouazara, A. Somani,
N. Travers, G. Vasile, and S. Zoupanos.
WebContent: efficient P2P warehousing of web data.
In Proceedings of the 34th International Conference on Very
Large Data Bases (VLDB'08), volume 1 of Proceedings of the VLDB
Endowment, pages 1428--1431, Auckland, New Zealand, August 2008. ACM Press.
[ BibTex |
Web page |
PDF ]
-
[ABM08]
-
S. Abiteboul, O. Benjelloun, and T. Milo.
The Active XML project: an overview.
The VLDB Journal, 17(5):1019--1040, August 2008.
doi:
10.1007/s00778-007-0049-y.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Mar08]
-
N. Markey.
Infinite Runs In Weighted Times Games with Energy Constraints.
Invited talk, Workshop Automata and Verification (AV'08), Mons,
Belgium, August 2008.
[ BibTex ]
-
[Bou08b]
-
P. Bouyer.
Probabilities in Timed Automata.
Invited talk, Workshop Automata and Verification (AV'08), Mons,
Belgium, August 2008.
[ BibTex ]
-
[Sch08]
-
Ph. Schnoebelen.
The complexity of lossy channel systems.
Invited talk, Workshop Automata and Verification (AV'08), Mons,
Belgium, August 2008.
[ BibTex ]
-
[Com08b]
-
H. Comon-Lundh.
Challenges in the Automated Verification of Security Protocols.
In Proceedings of the 4th International Joint Conference on
Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in
Artificial Intelligence, pages 396--409, Sydney, Australia, August 2008.
Springer-Verlag.
doi:
10.1007/978-3-540-71070-7_34.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CS08a]
-
P. Chambart and Ph. Schnoebelen.
Mixing Lossy and Perfect Fifo Channels.
In Proceedings of the 19th International Conference on
Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in
Computer Science, pages 340--355, Toronto, Canada, August 2008. Springer.
doi:
10.1007/978-3-540-85361-9_28.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BCHK08]
-
P. Baldan, Th. Chatain, S. Haar, and B. König.
Unfolding-based Diagnosis of Systems with an Evolving Topology.
In Proceedings of the 19th International Conference on
Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in
Computer Science, pages 203--217, Toronto, Canada, August 2008. Springer.
doi:
10.1007/978-3-540-85361-9_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKKL08]
-
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker.
Smyle: A Tool for Synthesizing Distributed Models
from Scenarios by Learning.
In Proceedings of the 19th International Conference on
Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in
Computer Science, pages 162--166, Toronto, Canada, August 2008. Springer.
doi:
10.1007/978-3-540-85361-9_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LV08]
-
É. Lozes and J. Villard.
A Spatial Equational Logic for the Applied
π-Calculus.
In Proceedings of the 19th International Conference on
Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in
Computer Science, pages 387--401, Toronto, Canada, August 2008. Springer.
doi:
10.1007/978-3-540-85361-9_31.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABG+08]
-
S. Akshay, B. Bollig, P. Gastin, M. Mukund, and
K. Narayan Kumar.
Distributed Timed Automata with Independently Evolving Clocks.
In Proceedings of the 19th International Conference on
Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in
Computer Science, pages 82--97, Toronto, Canada, August 2008. Springer.
doi:
10.1007/978-3-540-85361-9_10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FS08]
-
A. Finkel and A. Sangnier.
Reversal-bounded Counter Machines Revisited.
In Proceedings of the 33rd International Symposium on
Mathematical Foundations of Computer Science (MFCS'08), volume 5162
of Lecture Notes in Computer Science, pages 323--334, Toruń, Poland,
August 2008. Springer.
doi:
10.1007/978-3-540-85238-4_26.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BJ08]
-
A. Bouhoula and F. Jacquemard.
Automated Induction with Constrained Tree Automata.
In Proceedings of the 4th International Joint Conference on
Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in
Artificial Intelligence, pages 539--553, Sydney, Australia, August 2008.
Springer-Verlag.
doi:
10.1007/978-3-540-71070-7_44.
[ BibTex |
DOI |
Web page |
PDF ]
-
[KMT08]
-
S. Kremer, A. Mercier, and R. Treinen.
Proving Group Protocols Secure Against Eavesdroppers.
In Proceedings of the 4th International Joint Conference on
Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in
Artificial Intelligence, pages 116--131, Sydney, Australia, August 2008.
Springer-Verlag.
doi:
10.1007/978-3-540-71070-7_9.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AMZ08b]
-
S. Abiteboul, I. Manolescu, and S. Zoupanos.
OptimAX: Optimizing Distributed ActiveXML Applications.
In Proceedings of the 8th International Conference on Web
Engineering (ICWE'08), pages 299--310, Yorktown Heights, New York, USA,
July 2008. IEEE Computer Society Press.
doi:
10.1109/ICWE.2008.11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JR08]
-
F. Jacquemard and M. Rusinowitch.
Closure of Hedge-Automata Languages by Hedge Rewriting.
In Proceedings of the 19th International Conference on
Rewriting Techniques and Applications (RTA'08), volume 5117 of
Lecture Notes in Computer Science, pages 157--171, Hagenberg, Austria, July
2008. Springer.
doi:
10.1007/978-3-540-70590-1_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHH+08b]
-
A. Bouajjani, P. Habermehl, L. Holík, T. Touili, and
T. Vojnar.
Antichain-based Universality and Inclusion Testing over
Nondeterministic Finite Tree Automata.
In Proceedings of the 13th International Conference on
Implementation and Application of Automata (CIAA'08), volume 5148 of
Lecture Notes in Computer Science, pages 57--67, San Francisco, California,
USA, July 2008. Springer-Verlag.
doi:
10.1007/978-3-540-70844-5_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AFFM08]
-
C. Areces, D. Figueira, S. Figueira, and S. Mera.
Expressive Power and Decidability for Memory Logics.
In Proceedings of the 15th Workshop on Logic, Language,
Information and Computation (WoLLIC'08), volume 5110 of Lecture Notes
in Computer Science, pages 56--68, Edinburgh, Scotland, UK, July 2008.
Springer.
doi:
10.1007/978-3-540-69937-8_7.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BS08]
-
M. Bojańczyk and L. Segoufin.
Tree languages defined in first-order logic with one quantifier
alternation.
In Proceedings of the 35th International Colloquium on
Automata, Languages and Programming (ICALP'08) -- Part II, volume
5126 of Lecture Notes in Computer Science, pages 233--245, Reykjavik,
Iceland, July 2008. Springer.
doi:
10.1007/978-3-540-70583-3_20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMOW08]
-
P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell.
On Expressiveness and Complexity in Real-time Model Checking.
In Proceedings of the 35th International Colloquium on
Automata, Languages and Programming (ICALP'08) -- Part II, volume
5126 of Lecture Notes in Computer Science, pages 124--135, Reykjavik,
Iceland, July 2008. Springer.
doi:
10.1007/978-3-540-70583-3_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[HMY08]
-
S. Haddad, L. Mokdad, and S. Youcef.
Response Time Analysis of Composite Web Services.
In Proceedings of the 6th Symposium on Communication Systems,
Networks and Digital Signal Processing (CSNDSP'08), pages 506--510,
Graz, Austria, July 2008. IEEE Computer Society Press.
[ BibTex |
Web page |
PDF ]
-
[Gou08a]
-
J. Goubault-Larrecq.
A Cone-Theoretic Krein-Milman Theorem.
Research Report LSV-08-18, Laboratoire Spécification et
Vérification, ENS Cachan, France, June 2008.
8 pages.
[ BibTex |
Web page |
PDF ]
-
[CJP08]
-
H. Comon-Lundh, F. Jacquemard, and N. Perrin.
Visibly Tree Automata with Memory and Constraints.
Logical Methods in Computer Science, 4(2:8), June 2008.
doi:
10.2168/LMCS-4(2:8)2008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DJ08]
-
S. Demri and Ch. S. Jensen, editors.
Proceedings of the 15th International Symposium on
Temporal Representation and Reasoning (TIME'08), Montréal,
Canada, June 2008. IEEE Computer Society Press.
[ BibTex ]
-
[tCS08]
-
B. ten Cate and L. Segoufin.
XPath, Transitive Closure Logic, and Nested Tree Walking
Automata.
In Proceedings of the 27th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'08), pages 251--260, Vancouver, Canada, June 2008. ACM
Press.
doi:
10.1145/1376916.1376952.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ASV08]
-
S. Abiteboul, L. Segoufin, and V. Vianu.
Static Analysis of Active XML Systems.
In Proceedings of the 27th Annual ACM
SIGACT-SIGMOD-SIGART Symposium on Principles of Database
Systems (PODS'08), pages 221--230, Vancouver, Canada, June 2008. ACM
Press.
doi:
10.1145/1376916.1376948.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BLM08]
-
P. Bouyer, K. G. Larsen, and N. Markey.
Model Checking One-clock Priced Timed Automata.
Logical Methods in Computer Science, 4(2:9), June 2008.
doi:
10.2168/LMCS-4(2:9)2008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Gou08d]
-
J. Goubault-Larrecq.
Towards Producing Formally Checkable Security Proofs,
Automatically.
In Proceedings of the 21st IEEE Computer Security
Foundations Symposium (CSF'08), pages 224--238, Pittsburgh,
Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi:
10.1109/CSF.2008.21.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKR08]
-
S. Delaune, S. Kremer, and M. D. Ryan.
Composition of Password-based Protocols.
In Proceedings of the 21st IEEE Computer Security
Foundations Symposium (CSF'08), pages 239--251, Pittsburgh,
Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi:
10.1109/CSF.2008.6.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DKS08a]
-
S. Delaune, S. Kremer, and G. Steel.
Formal Analysis of PKCS#11.
In Proceedings of the 21st IEEE Computer Security
Foundations Symposium (CSF'08), pages 331--344, Pittsburgh,
Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi:
10.1109/CSF.2008.16.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BSS08]
-
M. Bojańczyk, L. Segoufin, and H. Straubing.
Piecewise Testable Tree Languages.
In Proceedings of the 23rd Annual IEEE Symposium on Logic
in Computer Science (LICS'08), pages 442--451, Pittsburgh,
Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi:
10.1109/LICS.2008.46.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CS08c]
-
P. Chambart and Ph. Schnoebelen.
The Ordinal Recursive Complexity of Lossy Channel Systems.
In Proceedings of the 23rd Annual IEEE Symposium on Logic
in Computer Science (LICS'08), pages 205--216, Pittsburgh,
Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi:
10.1109/LICS.2008.47.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBB+08]
-
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and
M. Größer.
Almost-Sure Model Checking of Infinite Paths in One-Clock Timed
Automata.
In Proceedings of the 23rd Annual IEEE Symposium on Logic
in Computer Science (LICS'08), pages 217--226, Pittsburgh,
Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi:
10.1109/LICS.2008.25.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DRS08]
-
S. Delaune, M. D. Ryan, and B. Smyth.
Automatic verification of privacy properties in the applied
pi-calculus.
In Proceedings of the 2nd Joint iTrust and PST Conferences
on Privacy, Trust Management and Security (IFIPTM'08), volume 263 of
IFIP Conference Proceedings, pages 263--278, Trondheim, Norway, June 2008.
Springer.
[ BibTex |
Web page |
PS |
PDF ]
-
[BFL08a]
-
F. Bouchy, A. Finkel, and J. Leroux.
Decomposition of Decidable First-Order Logics over Integers and
Reals.
In Proceedings of the 15th International Symposium on
Temporal Representation and Reasoning (TIME'08), pages 147--155,
Montréal, Canada, June 2008. IEEE Computer Society Press.
doi:
10.1109/TIME.2008.22.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BGMR08]
-
Th. Brihaye, M. Ghannem, N. Markey, and L. Rieg.
Good friends are hard to find!
In Proceedings of the 15th International Symposium on
Temporal Representation and Reasoning (TIME'08), pages 32--40,
Montréal, Canada, June 2008. IEEE Computer Society Press.
doi:
10.1109/TIME.2008.10.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DGK08]
-
V. Diekert, P. Gastin, and M. Kufleitner.
A Survey on Small Fragments of First-Order Logic over Finite
Words.
International Journal of Foundations of Computer Science,
19(3):513--548, June 2008.
doi:
10.1142/S0129054108005802.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DG08c]
-
M. Droste and P. Gastin.
On aperiodic and star-free formal power series in partially
commuting variables.
Theory of Computing Systems, 42(4):608--631, May 2008.
doi:
10.1007/s00224-007-9064-z.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[LMO08]
-
F. Laroussinie, N. Markey, and G. Oreiby.
On the Expressiveness and Complexity of ATL.
Logical Methods in Computer Science, 4(2:7), May 2008.
doi:
10.2168/LMCS-4(2:7)2008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BHH+08a]
-
B. Bérard, S. Haddad, L. M. Hillah, F. Kordon, and
Y. Thierry-Mieg.
Collision Avoidance in Intelligent Transport Systems: Towards an
Application of Control Theory.
In Proceedings of the 9th Workshop on Discrete Event
Systems (WODES'08), pages 346--351, Gothenburg, Sweden, May 2008.
doi:
10.1109/WODES.2008.4605970.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Bur08e]
-
E. Bursztein.
Probabilistic Protocol Identification for Hard to Classify
Protocol.
In Proceedings of the 2nd International Workshop on
Information Security Theory and Practices (WISTP'08), volume 5019
of Lecture Notes in Computer Science, pages 49--63, Sevilla, Spain, May 2008.
Springer.
Best paper award.
doi:
10.1007/978-3-540-79966-5_4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[JRV08]
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron.
Tree automata with equality constraints modulo equational
theories.
Journal of Logic and Algebraic Programming, 75(2):182--208, April
2008.
doi:
10.1016/j.jlap.2007.10.006.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AMP+08]
-
S. Abiteboul, I. Manolescu, N. Polyzotis, N. Preda, and
C. Sun.
XML processing in DHT networks.
In Proceedings of the 24th International Conference on Data
Engineering (ICDE'08), pages 606--615, Cancun, Mexico, April 2008. IEEE
Computer Society Press.
doi:
10.1109/ICDE.2008.4497469.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AMZ08a]
-
S. Abiteboul, I. Manolescu, and S. Zoupanos.
OptimAX: efficient support for data-intensive mash-ups.
In Proceedings of the 24th International Conference on Data
Engineering (ICDE'08), pages 1564--1567, Cancun, Mexico, April 2008.
IEEE Computer Society Press.
doi:
10.1109/ICDE.2008.4497622.
[ BibTex |
DOI |
Web page |
PDF ]
-
[AMB08]
-
S. Abiteboul, B. Marinoiu, and P. Bourhis.
Distributed Monitoring of Peer-to-Peer Systems.
In Proceedings of the 24th International Conference on Data
Engineering (ICDE'08), pages 1572--1575, Cancun, Mexico, April 2008.
IEEE Computer Society Press.
doi:
10.1109/ICDE.2008.4497624.
[ BibTex |
DOI |
Web page |
PDF ]
-
[EF08]
-
E. Encrenaz and L. Fribourg.
Time Separation of Events: An Inverse Method.
In Proceedings of the LIX Colloquium on Emerging Trends in
Concurrency Theory (LIX'06), volume 209 of Electronic Notes in
Theoretical Computer Science, pages 135--148, Palaiseau, France, April 2008.
Elsevier Science Publishers.
doi:
10.1016/j.entcs.2008.04.008.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLS08]
-
S. Demri, R. Lazić, and A. Sangnier.
Model checking freeze LTL over one-counter automata.
In Proceedings of the 11th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages
490--504, Budapest, Hungary, March-April 2008. Springer.
doi:
10.1007/978-3-540-78499-9_34.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[HIV08]
-
P. Habermehl, R. Iosif, and T. Vojnar.
What else is decidable about arrays?
In Proceedings of the 11th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages
474--489, Budapest, Hungary, March-April 2008. Springer.
doi:
10.1007/978-3-540-78499-9_33.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BMR08]
-
P. Bouyer, N. Markey, and P.-A. Reynier.
Robust Analysis of Timed Automata via Channel Machines.
In Proceedings of the 11th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages
157--171, Budapest, Hungary, March-April 2008. Springer.
doi:
10.1007/978-3-540-78499-9_12.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CS08b]
-
P. Chambart and Ph. Schnoebelen.
The ω-Regular Post Embedding Problem.
In Proceedings of the 11th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages
97--111, Budapest, Hungary, March-April 2008. Springer.
doi:
10.1007/978-3-540-78499-9_8.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Gou08c]
-
J. Goubault-Larrecq.
Simulation Hemi-Metrics Between Infinite-State Stochastic
Games.
In Proceedings of the 11th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages
50--65, Budapest, Hungary, March-April 2008. Springer.
doi:
10.1007/978-3-540-78499-9_5.
[ BibTex |
DOI |
Web page ]
-
[Gou08b]
-
J. Goubault-Larrecq.
Prevision Domains and Convex Powercones.
In Proceedings of the 11th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages
318--333, Budapest, Hungary, March-April 2008. Springer.
doi:
10.1007/978-3-540-78499-9_23.
[ BibTex |
DOI |
Web page ]
-
[L+08a]
-
F. Laroussinie et al.
Projet DOTS (ANR-06-SETI-003) : Rapport à 12 mois,
March 2008.
6 pages.
[ BibTex ]
-
[VLT08]
-
J. Villard, É. Lozes, and R. Treinen.
A Spatial Equational Logic for the Applied pi-calculus.
Research Report LSV-08-10, Laboratoire Spécification et
Vérification, ENS Cachan, France, March 2008.
44 pages.
[ BibTex |
Web page |
PDF ]
-
[GO08]
-
J. Goubault-Larrecq and J. Olivain.
A Smell of Orchids.
In Proceedings of the 8th Workshop on Runtime Verification
(RV'08), volume 5289 of Lecture Notes in Computer Science, pages 1--20,
Budapest, Hungary, March 2008. Springer.
doi:
10.1007/978-3-540-89247-2_1.
[ BibTex |
DOI |
Web page |
PDF ]
-
[FL08]
-
A. Finkel and J. Leroux.
Presburger Functions are Piecewise Linear.
Research Report LSV-08-08, Laboratoire Spécification et
Vérification, ENS Cachan, France, March 2008.
9 pages.
[ BibTex |
Web page |
PDF ]
-
[DKS08b]
-
S. Delaune, S. Kremer, and G. Steel.
Formal Analysis of PKCS#11.
In Proceedings of the 4th Taiwanese-French Conference on
Information Technology (TFIT'08), pages 267--278, Taipei, Taiwan, March
2008.
[ BibTex |
Web page |
PDF ]
-
[Bou08a]
-
P. Bouyer.
Model-Checking Timed Temporal Logics.
In Proceedings of the 4th Taiwanese-French Conference on
Information Technology (TFIT'08), pages 132--142, Taipei, Taiwan, March
2008.
[ BibTex |
Web page |
PDF ]
-
[BMO+08]
-
P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen,
and J. Worrell.
On Termination for Faulty Channel Machines.
In Proceedings of the 25th Annual Symposium on Theoretical
Aspects of Computer Science (STACS'08), volume 1 of Leibniz
International Proceedings in Informatics, pages 121--132, Bordeaux, France,
February 2008. Leibniz-Zentrum für Informatik.
[ BibTex |
Web page |
PS |
PDF ]
-
[DLLT08]
-
S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen.
Symbolic protocol analysis for monoidal equational theories.
Information and Computation, 206(2-4):312--351, February-April 2008.
doi:
10.1016/j.ic.2007.07.005.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBL08]
-
P. Bouyer, E. Brinksma, and K. G. Larsen.
Optimal Infinite Scheduling for Multi-Priced Timed Automata.
Formal Methods in System Design, 32(1):2--23, February 2008.
doi:
10.1007/s10703-007-0043-4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Bur08d]
-
E. Bursztein.
Network Administrator and Intruder Strategies.
Research Report LSV-08-02, Laboratoire Spécification et
Vérification, ENS Cachan, France, February 2008.
23 pages.
[ BibTex |
Web page |
PDF ]
-
[PPS+08]
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade,
D. Basin, S. Čapkun, and J.-P. Hubaux.
Secure Neighborhood Discovery: A Fundamental Element for Mobile
Ad Hoc Networking.
IEEE Communications Magazine, 46(2):132--139, February 2008.
doi:
10.1109/MCOM.2008.4473095.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BC08]
-
V. Bernat and H. Comon-Lundh.
Normal proofs in intruder theories.
In Revised Selected Papers of the 11th Asian Computing
Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer
Science, pages 151--166, Tokyo, Japan, January 2008. Springer.
doi:
10.1007/978-3-540-77505-8_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[LNY08]
-
S. Lasota, D. Nowak, and Z. Yu.
On completeness of logical relations for monadic types.
In Revised Selected Papers of the 11th Asian Computing
Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer
Science, pages 223--230, Tokyo, Japan, January 2008. Springer.
doi:
10.1007/978-3-540-77505-8_17.
[ BibTex |
DOI |
Web page |
PDF ]
-
[Kre08]
-
S. Kremer.
Computational soundness of equational theories (Tutorial).
In Revised Selected Papers from the 3rd Symposium on
Trustworthy Global Computing (TGC'07), volume 4912 of Lecture Notes
in Computer Science, pages 363--382, Sophia-Antipolis, France, 2008.
Springer.
doi:
10.1007/978-3-540-78663-4.
[ BibTex |
DOI |
Web page |
PDF ]
-
[TED08]
-
S. Taktak, E. Encrenaz, and J.-L. Desbarbieux.
A tool for automatic detection of deadlocks in wormhole networks
on chip.
ACM Transactions on Design Automation of Electronic Systems, 13(1),
January 2008.
doi:
10.1145/1297666.1297672.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BHR08]
-
P. Bouyer, S. Haddad, and P.-A. Reynier.
Timed Petri Nets and Timed Automata: On the Discriminating
Power of Zeno Sequences.
Information and Computation, 206(1):73--107, January 2008.
doi:
10.1016/j.ic.2007.10.004.
[ BibTex |
DOI |
Web page |
PDF ]
-
[SAG08]
-
P. Senellart, S. Abiteboul, and R. Gilleron.
Understanding the Hidden Web.
ERCIM News, 72:32--33, January 2008.
[ BibTex |
Web page ]
-
[CKR08]
-
L. Chen, S. Kremer, and M. D. Ryan, editors.
Formal Protocol Verification Applied, volume 07421 of Dagstuhl
Seminar Proceedings, Dagstuhl, Germany, 2008.
[ BibTex |
Web page ]
-
[HM08]
-
S. Haddad and P. Moreaux.
Verification of Probabilistic Systems Methods and Tools.
In Modeling and Verification of Real-Time Systems, pages 289--318.
ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008.
[ BibTex |
Web page ]
-
[BL08]
-
P. Bouyer and F. Laroussinie.
Model Checking Timed Automata.
In Modeling and Verification of Real-Time Systems, pages 111--140.
ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008.
[ BibTex |
Web page |
PDF ]
-
[Bur08b]
-
E. Bursztein.
NetAnalyzer v0.7.5, January 2008.
Written in C and Perl (about 25000 lines).
[ BibTex ]
-
[DG08b]
-
V. Diekert and P. Gastin.
First-order definable languages.
In Logic and Automata: History and Perspectives, volume 2 of Texts in
Logic and Games, pages 261--306. Amsterdam University Press, 2008.
[ BibTex |
Web page |
PDF ]
-
[BG07]
-
E. Bursztein and J. Goubault-Larrecq.
A Logical Framework for Evaluating Network Resilience Against
Faults and Attacks.
In Proceedings of the 12th Asian Computing Science
Conference (ASIAN'07), volume 4846 of Lecture Notes in Computer Science,
pages 212--227, Doha, Qatar, December 2007. Springer.
doi:
10.1007/978-3-540-76929-3_20.
[ BibTex |
DOI |
Web page |
PDF ]
-
[ABG07]
-
S. Akshay, B. Bollig, and P. Gastin.
Automata and Logics for Timed Message Sequence Charts.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 290--302, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_24.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CS07]
-
P. Chambart and Ph. Schnoebelen.
Post Embedding Problem is not Primitive Recursive, with
Applications to Channel Systems.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 265--276, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_22.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CDD07]
-
V. Cortier, J. Delaitre, and S. Delaune.
Safely Composing Security Protocols.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 352--363, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_29.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBB+07]
-
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and
M. Größer.
Probabilistic and Topological Semantics for Timed Automata.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 179--191, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_15.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BKM07]
-
B. Bollig, D. Kuske, and I. Meinecke.
Propositional Dynamic Logic for Message-Passing Systems.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 303--315, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_25.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DKR07]
-
S. Delaune, S. Kremer, and M. D. Ryan.
Symbolic Bisimulation for the Applied Pi-Calculus.
In Proceedings of the 27th Conference on Foundations of
Software Technology and Theoretical Computer Science (FSTTCS'07),
volume 4855 of Lecture Notes in Computer Science, pages 133--145, New Delhi,
India, December 2007. Springer.
doi:
10.1007/978-3-540-77050-3_11.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBS07]
-
C. Baier, N. Bertrand, and Ph. Schnoebelen.
Verifying nondeterministic probabilistic channel systems against
ω-regular linear-time properties.
ACM Transactions on Computational Logic, 9(1), December 2007.
doi:
10.1145/1297658.1297663.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Car07]
-
J.-L. Carré.
Réécriture, confluence.
Course notes, Préparation à l'agrégation, ENS Cachan,
France, December 2007.
[ BibTex ]
-
[Bur07a]
-
E. Bursztein.
NetQi v1rc1.
Available at http://www.netqi.org/, December 2007.
Written in C and Java (about 10000 lines).
[ BibTex |
Web page ]
-
[Gas07a]
-
R. Gascon.
Spécification et vérification de propriétés
quantitatives sur des automates à contraintes.
Thèse de doctorat, Laboratoire Spécification et
Vérification, ENS Cachan, France, November 2007.
[ BibTex |
Web page |
PS |
PDF ]
-
[GPT07]
-
J. Goubault-Larrecq, C. Palamidessi, and A. Troina.
A Probabilistic Applied Pi-Calculus.
In Proceedings of the 5th Asian Symposium on Programming
Languages and Systems (APLAS'07), volume 4807 of Lecture Notes in
Computer Science, pages 175--290, Singapore, November-December 2007.
Springer.
doi:
10.1007/978-3-540-76637-7_12.
[ BibTex |
DOI |
Web page |
PDF ]
-
[GK07]
-
P. Gastin and D. Kuske.
Uniform satisfiability in PSPACE for local temporal logics
over Mazurkiewicz traces.
Fundamenta Informaticae, 80(1-3):169--197, November 2007.
[ BibTex |
Web page |
PDF ]
-
[CDG+07]
-
H. Comon-Lundh, M. Dauchet, R. Gilleron, C. Löding,
F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi.
Tree Automata Techniques and Applications.
November 2007.
[ BibTex |
Web page ]
-
[Gas07b]
-
P. Gastin.
Algorithmique.
Course notes, Magistère STIC, ENS Cachan, France, November
2007.
[ BibTex ]
-
[Bur07b]
-
E. Bursztein.
Time has something to tell us about network address
translation.
In Proceedings of the 12th Nordic Workshop on Secure IT
Systems (NordSec'07), Reykjavik, Iceland, October 2007.
[ BibTex |
Web page |
PDF ]
-
[JR07]
-
F. Jacquemard and M. Rusinowitch.
Rewrite Closure of Hedge-Automata Languages.
Research Report LSV-07-31, Laboratoire Spécification et
Vérification, ENS Cachan, France, October 2007.
22 pages.
[ BibTex |
Web page |
PDF ]
-
[HIRV07]
-
P. Habermehl, R. Iosif, A. Rogalewicz, and T. Vojnar.
Proving Termination of Tree Manipulating Programs.
In Proceedings of the 5th International Symposium on
Automated Technology for Verification and Analysis (ATVA'07),
volume 4762 of Lecture Notes in Computer Science, pages 145--161, Tokyo,
Japan, October 2007. Springer.
doi:
10.1007/978-3-540-75596-8_12.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[DR07]
-
S. Demri and A. Rabinovich.
The complexity of temporal logic with until and since over
ordinals.
In Proceedings of the 14th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'07),
volume 4790 of Lecture Notes in Artificial Intelligence, pages 531--545,
Yerevan, Armenia, October 2007. Springer.
doi:
10.1007/978-3-540-75560-9_38.
[ BibTex |
DOI |
Web page |
PDF ]
-
[DLL07]
-
S. Delaune, H. Lin, and Ch. Lynch.
Protocol verification via rigidashflexible resolution.
In Proceedings of the 14th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'07),
volume 4790 of Lecture Notes in Artificial Intelligence, pages 242--256,
Yerevan, Armenia, October 2007. Springer.
doi:
10.1007/978-3-540-75560-9_19.
[ BibTex |
DOI |
Web page |
PDF ]
-
[CD07]
-
V. Cortier and S. Delaune.
Deciding Knowledge in Security Protocols for Monoidal Equational
Theories.
In Proceedings of the 14th International Conference on Logic
for Programming, Artificial Intelligence, and Reasoning (LPAR'07),
volume 4790 of Lecture Notes in Artificial Intelligence, pages 196--210,
Yerevan, Armenia, October 2007. Springer.
doi:
10.1007/978-3-540-75560-9_16.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[CDP07]
-
F. Chevalier, D. D'Souza, and P. Prabhakar.
Counter-free Input Determined Timed Automata.
In Proceedings of the 5th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763
of Lecture Notes in Computer Science, pages 82--97, Salzburg, Austria,
October 2007. Springer.
doi:
10.1007/978-3-540-75454-1_8.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[BM07b]
-
P. Bouyer and N. Markey.
Costs are Expensive!
In Proceedings of the 5th International Conference on Formal
Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763
of Lecture Notes in Computer Science, pages 53--68, Salzburg, Austria,
October 2007. Springer.
doi:
10.1007/978-3-540-75454-1_6.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Laf07d]
-
P. Lafourcade.
Rapport final d'activité à 11 mois,
contrat CNRS/DGA référence : 06 60 019 00 470 75 01
<< Utilisation et exploitation des théories équationnelles dans
l'analyse des protocoles cryptographiques >>.
Contract report, DGA, October 2007.
6 pages.
[ BibTex |
Web page |
PS ]
-
[BGP07]
-
B. Bérard, P. Gastin, and A. Petit.
Timed substitutions for regular signal-event languages.
Formal Methods in System Design, 31(2):101--134, October 2007.
doi:
10.1007/s10703-007-0034-5.
[ BibTex |
DOI |
Web page |
PDF ]
-
[BBBR07]
-
P. Bouyer, Th. Brihaye, V. Bruyère, and J.-F.
Raskin.
On the optimal reachability problem on weighted timed automata.
Formal Methods in System Design, 31(2):135--175, October 2007.
doi:
10.1007/s10703-007-0035-4.
[ BibTex |
DOI |
Web page |
PS |
PDF ]
-
[Pro07]
-
A. ProNoBis.
ProNoBis: Probability and Nondeterminism, Bisimulations and
Securi