Publications : LSV

[SZ19]
S. Schmitz and G. Zetzsche. Coverability Is Undecidable in One-Dimensional Pushdown Vector Addition Systems with Resets. In Proceedings of the 13th Workshop on Reachability Problems in Computational Models (RP'19), Lecture Notes in Computer Science, Brussels, Belgium, September 2019. Springer.
BibTex | Web page | PDF ]
[GMG19]
P. Gastin, A. Manuel, and R. Govind. Logics for Reversible Regular Languages and Semigroups with Involution. In Proceedings of the 23th International Conference on Developments in Language Theory (DLT'19), volume 11647 of Lecture Notes in Computer Science, pages 182--191, Warsaw, Poland, August 2019. Springer.
doi: 10.1007/978-3-030-24886-4_13.
BibTex | DOI | Web page | PDF ]
[DG19]
M. Droste and P. Gastin. Aperiodic Weighted Automata and Weighted First-Order Logic. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'19), Leibniz International Proceedings in Informatics, Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik. To appear.
BibTex | Web page ]
[BT19]
P. Bouyer and N. Thomasset. Nash equilibria in games over graphs equipped with a communication mechanism. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'19), Leibniz International Proceedings in Informatics, Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik. To appear.
BibTex ]
[BBM19]
N. Bertrand, P. Bouyer, and A. Majumdar. Reconfiguration and message losses in parameterized broadcast networks. In Proceedings of the 30th International Conference on Concurrency Theory (CONCUR'19), Leibniz International Proceedings in Informatics, Amsterdam, The Netherlands, August 2019. Leibniz-Zentrum für Informatik. To appear.
BibTex ]
[FP19]
A. Finkel and M. Praveen. Verification of Flat FIFO Systems. In Proceedings of the 30th International Conference on Concurrency Theory (CONCUR'19), Leibniz International Proceedings in Informatics, Amsterdam, The Netherlands, August 2019. Leibniz-Zentrum für Informatik. To appear.
BibTex ]
[Kou19b]
A. Koutsos. Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19), Hoboken, NJ, USA, July 2019. IEEE Computer Society Press. To appear.
BibTex | PDF ]
[GMS19]
P. Gastin, S. Mukherjee, and B. Srivathsan. Fast algorithms for handling diagonal constraints in timed automata. In Proceedings of the 31st International Conference on Computer Aided Verification (CAV'19), volume 11561 of Lecture Notes in Computer Science, pages 41--59, New York, USA, July 2019. Springer.
BibTex | Web page ]
[BKM+19]
P. Bouyer, O. Kupferman, N. Markey, B. Maubert, A. Murano, and G. Perelli. Reasoning about Quality and Fuzziness of Strategic Behaviours. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19). IJCAI organization, July 2019. To appear.
BibTex | Web page | PDF ]
[Sch19]
S. Schmitz. The Parametric Complexity of Lossy Counter Machines. In Proceedings of the 46th International Colloquium on Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz International Proceedings in Informatics, pages 129:1--129:15, Patras, Greece, July 2019. Leibniz-Zentrum für Informatik.
BibTex | Web page | PDF ]
[For19]
M. Fortin. FO = FO3 for linear orders with monotone binary relations. In Proceedings of the 46th International Colloquium on Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz International Proceedings in Informatics, pages 116:1--116:13, Patras, Greece, July 2019. Leibniz-Zentrum für Informatik.
BibTex | Web page | PDF ]
[BGJ+19]
G. Barthe, B. Grégoire, C. Jacomme, S. Kremer, and P.-Y. Strub. Symbolic methods in computational cryptography proofs. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19), Hoboken, NJ, USA, July 2019. IEEE Computer Society Press. To appear.
BibTex ]
[BLS19]
D. Baelde, A. Lick, and S. Schmitz. Decidable XPath Fragments in the Real World. In Proceedings of the 38th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'19), pages 285--302, Amsterdam, Netherlands, June-July 2019. ACM Press.
doi: 10.1145/3294052.3319685.
BibTex | DOI | Web page ]
[BGH19]
F. Blanqui, G. Genestier, and O. Hermant. Dependency Pairs Termination in Dependent Type Theory Modulo Rewriting. In Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz International Proceedings in Informatics, pages 9:1--9:21, Dortmund, Germany, June 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2019.9.
BibTex | DOI | Web page | PDF ]
[DD19]
A. Díaz-Caro and G. Dowek. Proof Normalisation in a Logic Identifying Isomorphic Propositions. In Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz International Proceedings in Informatics, pages 14:1--14:23, Dortmund, Germany, June 2019. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSCD.2019.14.
BibTex | DOI | Web page | PDF ]
[Gas19]
P. Gastin. Modular Descriptions of Regular Functions. In Proceedings of the 8th International Conference on Algebraic Informatics (CAI'19), volume 11545 of Lecture Notes in Computer Science, pages 3--9, Nis, Serbia, June 2019. Springer. Invited talk.
BibTex | DOI ]
[Kou19a]
A. Koutsos. The 5G-AKA Authentication Protocol Privacy. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, June 2019. IEEE Press. To appear.
BibTex | PDF ]
[BCC19]
M. Boltenhagen, T. Chatain, and J. Carmona. Generalized Alignment-Based Trace Clustering of Process Behavior. In Proceedings of the 40th International Conference on Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, pages 237--257, Aachen, Germany, June 2019. Springer.
doi: 10.1007/978-3-030-21571-2_14.
BibTex | DOI | Web page | PDF ]
[BD19b]
F. Belardinelli and S. Demri. Resource-bounded ATL: the Quest for Tractable Fragments. In Proceedings of the 18th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS'19), pages 206--214, Montreal, Canada, June 2019. ACM Press.
BibTex | Web page | PDF ]
[DFM19]
S. Demri, R. Fervari, and A. Mansutti. Axiomatising logics with separating conjunctions and modalities. In Proceedings of the 16th European Conference on Logics in Artificial Intelligence (JELIA'19), volume 11468 of Lecture Notes in Artificial Intelligence, Rende, Italy, June 2019. Springer. to appear.
BibTex | Web page | PDF ]
[FHK19]
A. Finkel, S. Haddad, and I. Khmelnitsky. Coverability and Termination in Recursive Petri Nets. In Proceedings of the 40th International Conference on Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, pages 429--448, Aachen, Germany, June 2019. Springer.
doi: 10.1007/978-3-030-21571-2_23.
BibTex | DOI | Web page | PDF ]
[Gou19b]
J. Goubault-Larrecq. A Probabilistic and Non-Deterministic Call-by-Push-Value Language. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), Vancouver, Canada, June 2019. IEEE Press. To appear.
BibTex ]
[AGJK19]
S. Akshay, P. Gastin, V. Jugé, and S. N. Krishna. Timed systems through the lens of logic. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), Vancouver, Canada, June 2019. IEEE Press. To appear.
BibTex ]
[BD19a]
B. Bednarczyk and S. Demri. Why propositional quantification makes modal logics on trees robustly hard ? In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press.
doi: 10.1109/LICS.2019.8785656.
BibTex | DOI | PDF ]
[CD19]
K. Chatterjee and L. Doyen. Graph Planning with Expected Finite Horizon. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), Vancouver, Canada, June 2019. IEEE Press. To appear.
BibTex ]
[LS19b]
J. Leroux and S. Schmitz. Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), Vancouver, Canada, June 2019. IEEE Press. To appear.
BibTex | Web page ]
[JS19]
P. Jančar and S. Schmitz. Bisimulation Equivalence of First-Order Grammars is ACKERMANN-Complete. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), Vancouver, Canada, June 2019. IEEE Press. To appear.
BibTex | Web page ]
[MFNS19]
J. Maier, M. Függer, T. Nowak, and U. Schmid. Transistor-Level Analysis of Dynamic Delay Models. In Proceedings of the 25th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'19), Hirosaki, Japan, May 2019. IEEE Computer Society. To appear.
BibTex ]
[KS19]
P. Karandikar and Ph. Schnoebelen. The height of piecewise-testable languages and the complexity of the logic of subwords. Logical Methods in Computer Science, 15(2):6:1--6:27, April 2019.
BibTex | Web page | PDF ]
[BBR19]
B. Bollig, P. Bouyer, and F. Reiter. Identifiers in Registers - Describing Network Algorithms with Logic. In Proceedings of the 22nd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'19), Lecture Notes in Computer Science, Prague, Czech Republic, April 2019. Springer. To appear.
BibTex | Web page | PDF ]
[DSS19]
M. Džamonja, S. Schmitz, and Ph. Schnoebelen. On ordinal invariants in well quasi orders and finite antichain orders. In Well-quasi orders in computation, logic, language and reasoning, Trends in Logic. Springer, 2019. To appear.
BibTex | Web page | PDF ]
[CLS19]
S. Colin, R. Lepigre, and G. Scherer. Unboxing Mutually Recursive Type Definitions. In Actes des 30èmes Journées Francophones sur les Langages Applicatifs (JFLA'19), Lamoura, France, January 2019. To appear.
BibTex | PDF ]
[AFMS19]
É. André, L. Fribourg, J.-M. Mota, and R. Soulat. Verification of an industrial asynchronous leader election algorithm using abstractions and parametric model checking. In Proceedings of the 20th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'19), Lecture Notes in Computer Science, Cascais/Lisbon, Portugal, January 2019. Springer. To appear.
BibTex | PDF ]
[HKP19]
S. Haar, J. Kolcák, and L. Paulevé. Combining Refinement of Parametric Models with Goal-Oriented Reduction of Dynamics. In Proceedings of the 20th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'19), Lecture Notes in Computer Science, Cascais/Lisbon, Portugal, January 2019. Springer. To appear.
BibTex | Web page | PDF ]
[KŠHP19]
J. Kolcák, D. Šafránek, S. Haar, and L. Paulevé. Parameter Space Abstraction and Unfolding Semantics of Discrete Regulatory Networks. Theoretical Computer Science, 765:120--144, 2019.
doi: 10.1016/j.tcs.2018.03.009.
BibTex | DOI | Web page | PDF ]
[DF19]
S. Demri and R. Fervari. The power of modal separation logics. Journal of Logic and Computation, 2019. To appear.
BibTex ]
[CHK+19]
Th. Chatain, S. Haar, J. Kolcák, L. Paulevé, and A. Thakkar. Concurrency in Boolean networks. Natural Computing, 2019. To appear.
BibTex | Web page | PDF ]
[Gou19a]
J. Goubault-Larrecq. Formal Ball Monads. Topology and its Applications, 2019. To appear.
doi: 10.1016/j.topol.2019.06.044.
BibTex | DOI | Web page ]
[HBD19]
L. Hirschi, D. Baelde, and S. Delaune. A method for unbounded verification of privacy-type properties. Journal of Computer Security, 27(3):277--342, 2019.
doi: 10.3233/JCS-171070.
BibTex | DOI | Web page | PDF ]
[GBM19]
P. Gardy, P. Bouyer, and N. Markey. Dependences in Strategy Logic. Theory of Computing Systems, 2019. To appear.
BibTex | Web page | PDF ]
[MSP+19]
H. Mandon, C. Su, J. Pang, S. Paul, S. Haar, and L. Paulevé. Algorithms for the Sequential Reprogramming of Boolean Networks. IEEE/ACM Transaction on Computational Biology and Bioinformatics, 2019. To appear.
BibTex | Web page | PDF ]
[HS19]
S. Halfon and Ph. Schnoebelen. On shuffle products, acyclic automata and piecewise-testable languages. Information Processing Letters, 145:68--73, 2019.
doi: 10.1016/j.ipl.2019.01.012.
BibTex | DOI ]
[LS19a]
R. Lazić and S. Schmitz. The Ideal View on Rackoff's Coverability Technique. Information and Computation, 2019. To appear.
BibTex | Web page ]
[LPR18]
S. Le Roux, A. Pauly, and M. Randour. Extending finite-memory determinacy to Boolean combinations of winning conditions. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), Leibniz International Proceedings in Informatics, pages 38:1--38:20, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.38.
BibTex | DOI | Web page | PDF ]
[Man18]
A. Mansutti. Extending propositional separation logic for robustness properties. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), Leibniz International Proceedings in Informatics, pages 42:1--42:23, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.42.
BibTex | DOI | Web page | PDF ]
[BHH18]
B. Bérard, S. Haar, and L. Hélouët. Hyper Partial Order Logic. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), Leibniz International Proceedings in Informatics, pages 20:1--20:21, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.20.
BibTex | DOI | Web page | PDF ]
[FLS18]
A. Finkel, J. Leroux, and G. Sutre. Reachability for Two-Counter Machines with One Test and One Reset. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), Leibniz International Proceedings in Informatics, pages 31:1--31:14, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.31.
BibTex | DOI | Web page | PDF ]
[BLS18b]
D. Baelde, A. Lick, and S. Schmitz. A Hypersequent Calculus with Clusters for Tense Logic over Ordinals. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), Leibniz International Proceedings in Informatics, pages 15:1--15:19, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2018.15.
BibTex | DOI | Web page | PDF ]
[Dal18]
A. Dallon. Verification of indistinguishability properties in cryptographic protocols -- Small attacks and efficient decision with SAT-Equiv. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2018.
BibTex | Web page | PDF ]
[Dup18]
Y. Duplouy. Applying Formal Methods to Autonomous Vehicle Control. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2018.
BibTex | Web page ]
[BJM18]
P. Bouyer, S. Jaziri, and N. Markey. Efficient Timed Diagnosis Using Automata with Timed Domains. In Proceedings of the 18th Workshop on Runtime Verification (RV'18), volume 11237 of Lecture Notes in Computer Science, pages 205--221, Limassol, Cyprus, November 2018. Springer.
doi: 10.1007/978-3-030-03769-7_12.
BibTex | DOI | Web page | PDF ]
[Dem18a]
S. Demri. On temporal and separation logics. In Proceedings of the 25th International Symposium on Temporal Representation and Reasoning (TIME'18), Leibniz International Proceedings in Informatics, pages 1:1--1:4, Warsaw, Poland, October 2018. Leibniz-Zentrum für Informatik.
BibTex | Web page ]
[CHK+18]
Th. Chatain, S. Haar, J. Kolcák, A. Thakkar, and L. Paulevé. Concurrency in Boolean networks. Research Report hal-01893106, HAL, October 2018. 33 pages.
BibTex | Web page | PDF ]
[BFG+18a]
G. Barthe, X. Fan, J. Gancher, B. Grégoire, C. Jacomme, and E. Shi. Symbolic Proofs for Lattice-Based Cryptography. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18), pages 538--555, Toronto, Canada, October 2018. ACM Press.
BibTex | Web page | PDF ]
[FN18]
M. Függer and Th. Nowak. Fast Multidimensional Asymptotic and Approximate Consensus. In Proceedings of the 32nd International Symposium on Distributed Computing (DISC'18), Leibniz International Proceedings in Informatics, pages 27:1--27:15, New Orleans, USA, October 2018. Leibniz-Zentrum für Informatik.
BibTex | Web page ]
[BLS18c]
B. Bollig, M. Lehaut, and N. Sznajder. Round-Bounded Control of Parameterized Systems. In Proceedings of the 16th International Symposium on Automated Technology for Verification and Analysis (ATVA'18), volume 11138 of Lecture Notes in Computer Science, pages 370--386, Los Angeles, California, USA, October 2018. Springer.
doi: 10.1007/978-3-030-01090-4_22.
BibTex | DOI | Web page ]
[BBBC18]
N. Bertrand, P. Bouyer, T. Brihaye, and P. Carlier. When are Stochastic Transition Systems Tameable? Journal of Logic and Algebraic Methods in Programming, 99:41--96, October 2018.
doi: 10.1016/j.jlamp.2018.03.004.
BibTex | DOI | Web page | PDF ]
[BGMR18]
P. Bouyer, M. González, N. Markey, and M. Randour. Multi-weighted Markov Decision Processes with Reachability Objectives. In Proceedings of the 9th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'18), volume 277 of Electronic Proceedings in Theoretical Computer Science, pages 250--264, Saarbrücken, Germany, September 2018.
doi: 10.4204/EPTCS.277.18.
BibTex | DOI | Web page | PDF ]
[BDH18]
D. Baelde, S. Delaune, and L. Hirschi. POR for Security Protocol Equivalences - Beyond Action-Determinism. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 385--405, Barcelona, Spain, September 2018. Springer.
doi: 10.1007/978-3-319-99073-6_19.
BibTex | DOI | Web page ]
[CDD18]
V. Cortier, A. Dallon, and S. Delaune. Efficiently Deciding Equivalence for Standard Primitives and Phases. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 491--511, Barcelona, Spain, September 2018. Springer.
doi: 10.1007/978-3-319-99073-6_24.
BibTex | DOI | Web page | PDF ]
[Hil18]
M. Hilaire. Complexity of the reachability problem for parametric timed automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2018.
BibTex ]
[Lef18]
E. Lefaucheux. Controlling Information in Probabilistic Systems. Thèse de doctorat, Université Rennes 1, Rennes, France, September 2018.
BibTex | Web page | PDF ]
[Gro18]
N. Grosshans. The limits of Nečiporuk's method and the power of programs over monoids taken from small varieties of finite monoids. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, September 2018.
BibTex | Web page | PDF ]
[BBJ18]
B. Bérard, P. Bouyer, and V. Jugé. Finite bisimulations for dynamical systems with overlapping trajectories. In Proceedings of the 27th Annual EACSL Conference on Computer Science Logic (CSL'18), Leibniz International Proceedings in Informatics, Birmingham, UK, September 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2018.26.
BibTex | DOI | Web page | PDF ]
[GMS18]
P. Gastin, S. Mukherjee, and B. Srivathsan. Reachability in timed automata with diagonal constraints. In Proceedings of the 29th International Conference on Concurrency Theory (CONCUR'18), volume 118 of Leibniz International Proceedings in Informatics, pages 28:1--28:17, Beijing, China, September 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2018.28.
BibTex | DOI | Web page | PDF ]
[BFG18c]
B. Bollig, M. Fortin, and P. Gastin. It Is Easy to Be Wise After the Event: Communicating Finite-State Machines Capture First-Order Logic with ”Happened Before”. In Proceedings of the 29th International Conference on Concurrency Theory (CONCUR'18), volume 118 of Leibniz International Proceedings in Informatics, pages 7:1--7:17, Beijing, China, September 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2018.7.
BibTex | DOI | Web page | PDF ]
[GL18]
J. Goubault-Larrecq and J.-P. Lachance. On the Complexity of Monitoring Orchids Signatures, and Recurrence Equations. Formal Methods in System Design, 53(1):6--32, August 2018. Special issue of RV'16, to appear.
doi: 10.1007/s10703-017-0303-x.
BibTex | DOI | Web page ]
[Bur18a]
G. Burel. Linking Focusing and Resolution with Selection. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'18), volume 117 of Leibniz International Proceedings in Informatics, pages 9:1--9:14, Liverpool, UK, August 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2018.9.
BibTex | DOI | Web page | PDF ]
[CHP18b]
Th. Chatain, S. Haar, and L. Paulevé. Most Permissive Semantics of Boolean Networks. Research Report 1808.10240, Computing Research Repository, August 2018. 15 pages.
BibTex | Web page | PDF ]
[BLS18a]
D. Baelde, A. Lick, and S. Schmitz. A Hypersequent Calculus with Clusters for Linear Frames. In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'18), pages 36--55, Bern, Switzerland, August 2018. College Publications.
BibTex | Web page ]
[DF18]
S. Demri and R. Fervari. On the complexity of modal separation logics. In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'18), pages 179--198, Bern, Switzerland, August 2018. College Publications.
BibTex | Web page | PDF ]
[FFL18]
S. Friedrichs, M. Függer, and C. Lenzen. Metastability-Containing Circuits. IEEE Transactions on Computers, 67(8):1167--1183, August 2018.
doi: 10.1109/TC.2018.2808185.
BibTex | DOI | Web page ]
[BMR+18]
P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and S. Laursen. Average-energy games. Acta Informatica, 55(2):91--127, July 2018.
doi: 10.1007/s00236-016-0274-1.
BibTex | DOI | Web page | PDF ]
[HM18]
S. Haddad and B. Monmege. Interval iteration algorithm for MDPs and IMDPs. Theoretical Computer Science, 735:111--131, July 2018.
doi: 10.1016/j.tcs.2016.12.003.
BibTex | DOI | Web page ]
[LR18a]
R. Lepigre and C. Raffalli. Abstract Representation of Binders in OCaml using the Bindlib Library. In Proceedings of the 13th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'18), pages 42--56, Oxford, UK, July 2018. ACM Press.
doi: 10.4204/EPTCS.274.4.
BibTex | DOI | Web page | PDF ]
[FNS18]
M. Függer, Th. Nowak, and M. Schwarz. Tight Bounds for Asymptotic and Approximate Consensus. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC'18), pages 325--334, Egham, UK, July 2018. ACM Press.
doi: 10.1145/3212734.3212762.
BibTex | DOI | Web page ]
[BBF+18a]
G. Bacci, P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and P.-A. Reynier. Optimal and Robust Controller Synthesis Using Energy Timed Automata with Uncertainty. In Proceedings of the 22nd International Symposium on Formal Methods (FM'18), Lecture Notes in Computer Science, pages 203--221, Oxford, UK, July 2018. Springer. Best paper award.
doi: 10.1007/978-3-319-95582-7_12.
BibTex | DOI | Web page | PDF ]
[JK18]
C. Jacomme and S. Kremer. An extensive formal analysis of multi-factor authentication protocols. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18), pages 1--15, Oxford, UK, July 2018. IEEE Computer Society Press.
doi: 10.1109/CSF.2018.00008.
BibTex | DOI | Web page | PDF ]
[DGK18]
V. Dave, P. Gastin, and S. N. Krishna. Regular Transducer Expressions for Regular Transformations. In Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'18), pages 315--324, Oxford, UK, July 2018. ACM Press.
doi: 10.1145/3209108.3209182.
BibTex | DOI | Web page | PDF ]
[LFV18]
A. Le Coënt, L. Fribourg, and J. Vacher. Control Synthesis for Stochastic Switched Systems using the Tamed Euler Method. In Proceedings of the 6th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'18), volume 51 of IFAC-PapersOnLine, pages 259--264, Oxford, UK, July 2018. Elsevier Science Publishers.
doi: 10.1016/j.ifacol.2018.08.044.
BibTex | DOI | Web page | PDF ]
[FHLM18]
É. Fabre, L. Hélouët, E. Lefaucheux, and H. Marchand. Diagnosability of Repairable Faults. Discrete Event Dynamic Systems: Theory and Applications, 28(2):183--213, June 2018.
doi: 10.1007/s10626-017-0255-8.
BibTex | DOI | PDF ]
[Hal18]
S. Halfon. On Effective Representations of Well Quasi-Orderings. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, June 2018.
BibTex | Web page | PDF ]
[CGR18]
O. Carton, B. Guillon, and F. Reiter. Counter Machines and Distributed Automata. In Proceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875 of Lecture Notes in Computer Science, pages 13--28, Ghent, Belgium, June 2018. Springer.
doi: 10.1007/978-3-319-92675-9_2.
BibTex | DOI | PDF ]
[CHP18a]
Th. Chatain, S. Haar, and L. Paulevé. Boolean Networks: Beyond Generalized Asynchronicity. In Proceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875 of Lecture Notes in Computer Science, pages 29--42, Ghent, Belgium, June 2018. Springer.
doi: 10.1007/978-3-319-92675-9_3.
BibTex | DOI | Web page ]
[LGS18]
E. Lefaucheux, A. Giua, and C. Seatzu. Basis Coverability Graph for Partially Observable Petri Nets with Application to Diagnosability Analysis. In Proceedings of the 39th International Conference on Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877 of Lecture Notes in Computer Science, pages 164--183, Bratislava, Slovakia, June 2018. Springer.
BibTex | PDF ]
[BBDH18]
B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad. Integrating Simulink Models into the Model Checker Cosmos. In Proceedings of the 39th International Conference on Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877 of Lecture Notes in Computer Science, pages 363--373, Bratislava, Slovakia, June 2018. Springer.
doi: 10.1007/978-3-319-91268-4_19.
BibTex | DOI | Web page | PDF ]
[SGF18b]
A. Saoud, A. Girard, and L. Fribourg. On the Composition of Discrete and Continuous-time Assume-Guarantee Contracts for Invariance. In Proceedings of the 16th European Control Conference (ECC'18), pages 435--440, Limassol, Cyprus, June 2018. IEEE Press.
doi: 10.23919/ECC.2018.8550622.
BibTex | DOI | Web page | PDF ]
[AGK18]
S. Akshay, P. Gastin, and S. N. Krishna. Analyzing Timed Systems Using Tree Automata. Logical Methods in Computer Science, 14(2):1--35, May 2018.
doi: 10.23638/LMCS-14(2:8)2018.
BibTex | DOI | Web page | PDF ]
[FKLW18]
M. Függer, A. Kinali, C. Lenzen, and B. Wiederhake. Fast All-Digital Clock Frequency Adaptation Circuit for Voltage Droop Tolerance. In Proceedings of the 24th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'18), pages 68--77, Vienna, Austria, May 2018. IEEE Computer Society.
doi: 10.1109/ASYNC.2018.00025.
BibTex | DOI | Web page ]
[JMS18]
L. Jezequel, A. Madalinski, and S. Schwoon. Distributed computation of vector clocks in Petri nets unfolding for test selection. In Proceedings of the 14th Workshop on Discrete Event Systems (WODES'18), volume 51(7) of IFAC-PapersOnLine, pages 106--111, Sorrento Coast, Italy, May-June 2018. Elsevier Science Publishers.
BibTex | PDF ]
[ABG18]
C. Aiswarya, B. Bollig, and P. Gastin. An Automata-Theoretic Approach to the Verification of Distributed Algorithms. Information and Computation, 259:305--327, April 2018.
doi: 10.1016/j.ic.2017.05.006.
BibTex | DOI | PDF ]
[Gil18]
F. Gilbert. Extending higher-order logic with predicate subtyping. Thèse de doctorat, Université Paris 7, Paris, France, April 2018.
BibTex | PDF ]
[Bur18b]
G. Burel. Linking Focusing and Resolution with Selection. Research Report hal-01670476, HAL Research Report, April 2018.
BibTex | Web page | PDF ]
[SGF18a]
A. Saoud, A. Girard, and L. Fribourg. Contract based Design of Symbolic Controllers for Vehicle Platooning. In Proceedings of the 21st ACM International Conference on Hybrid Systems: Computation and Control (HSCC'18), pages 277--278, Porto, Portugal, April 2018. ACM Press. Poster.
doi: 10.1145/3178126.3187001.
BibTex | DOI | PDF ]
[Bla18]
F. Blanqui. Size-based termination of higher-order rewriting. Journal of Functional Programming, 28, April 2018.
doi: 10.1017/S0956796818000072.
BibTex | DOI | Web page | PDF ]
[JKS18]
C. Jacomme, S. Kremer, and G. Scerri. Symbolic Models for Isolated Execution Environments. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pages 530--545, Paris, France, April 2018. IEEE Press.
doi: 10.1109/EuroSP.2017.16.
BibTex | DOI | Web page ]
[Had18]
S. Haddad. Memoryless determinacy of finite parity games: Another simple proof. Information Processing Letters, 132:19--21, April 2018.
doi: 10.1016/j.ipl.2017.11.012.
BibTex | DOI | PDF ]
[CCD+18]
Th. Chatain, M. Comlan, D. Delfieu, L. Jezequel, and O. H. Roux. Pomsets and Unfolding of Reset Petri Nets. In Proceedings of the 12th International Conference on Language and Automata Theory and Applications (LATA'18), volume 10792 of Lecture Notes in Computer Science, pages 258--270, Bar-Ilan, Israel, April 2018. Springer.
doi: 10.1007/978-3-319-77313-1_20.
BibTex | DOI | Web page ]
[DLM18]
S. Demri, É. Lozes, and A. Mansutti. The Effects of Adding Reachability Predicates in Propositional Separation Logic. In Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages 476--493, Thessaloniki, Greece, April 2018. Springer.
BibTex | PDF ]
[Bou18]
P. Bouyer. Games on graphs with a public signal monitoring. In Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages 530--547, Thessaloniki, Greece, April 2018. Springer.
doi: 10.1007/978-3-319-89366-2_29.
BibTex | DOI | Web page | PDF ]
[FMN+18]
M. Függer, J. Maier, R. Najvirt, Th. Nowak, and U. Schmid. A Faithful Binary Circuit Model with Adversarial Noise. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'18), pages 1327--1332, Dresden, Germany, March 2018. IEEE Computer Society Press.
doi: 10.23919/DATE.2018.8342219.
BibTex | DOI | Web page | PDF ]
[BBF+18b]
B. Barbot, M. Beccuti, G. Franceschinis, S. Haddad, and C. Picaronny. Bounds Computation for Symmetric Nets. Research Report hal-01726011, HAL-Inria, March 2018.
BibTex | Web page | PDF ]
[GBM18]
P. Gardy, P. Bouyer, and N. Markey. Dependences in Strategy Logic. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 34:1--34:15, Caen, France, February 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2018.34.
BibTex | DOI | Web page | PDF ]
[BFG18b]
B. Bollig, M. Fortin, and P. Gastin. Communicating Finite-State Machines and Two-Variable Logic. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 17:1--17:14, Caen, France, February 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2018.17.
BibTex | DOI | Web page | PDF ]
[GKLZ18]
M. Ganardi, D. König, M. Lohrey, and G. Zetzsche. Knapsack problems for wreath products. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 32:1--32:13, Caen, France, February 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2018.32.
BibTex | DOI | Web page | PDF ]
[Bv18]
D. Berwanger and M. van den Bogaard. Consensus Game Acceptors and Iterated Transductions. International Journal of Foundations of Computer Science, 29(02):165--185, February 2018.
doi: 10.1142/S0129054118400026.
BibTex | DOI | Web page | PDF ]
[GM18]
P. Gastin and B. Monmege. A unifying survey on weighted logics and weighted automata. Soft Computing, 22(4):1047--1065, February 2018.
doi: 10.1007/s00500-015-1952-6.
BibTex | DOI | Web page | PDF ]
[BFL+18]
P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, J. Ouaknine, and J. Worrell. Model Checking Real-Time Systems. In Handbook of Model Checking, pages 1001--1046. Springer, 2018.
doi: 10.1007/978-3-319-10575-8_29.
BibTex | DOI | Web page | PDF ]
[BFM18]
M. Blondin, A. Finkel, and P. McKenzie. Handling Infinitely Branching Well-structured Transition Systems. Information and Computation, 258:28--49, 2018.
doi: 10.1016/j.ic.2017.11.001.
BibTex | DOI ]
[BGH18]
B. Bollig, M.-L. Grindei, and P. Habermehl. Realizability of Concurrent Recursive Programs. Formal Methods in System Design, 2018. To appear.
BibTex ]
[LR18b]
R. Lepigre and C. Raffalli. Practical Subtyping for Curry-Style Languages. ACM Transactions on Programming Languages and Systems, 41(1):5:1--5:58, 2018.
doi: 10.1145/3285955.
BibTex | DOI | PDF ]
[Lep18]
R. Lepigre. PML_2: Integrated Program Verification in ML. In Proceedings of the 23rd International Conference on Types for Proofs and Programs (TYPES'17, volume 104 of Leibniz International Proceedings in Informatics, pages 4:1--4:27, Budapest, Hungary, 2018. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.TYPES.2017.4.
BibTex | DOI | Web page | PDF ]
[Dem18b]
S. Demri. Reasoning about reversal-bounded counter machines. In Ewa Orlowska on Relational Methods in Logic and Computer Science, volume 17 of Outstanding Contributions to Logic, pages 441--479. Springer, 2018.
BibTex | Web page | PDF ]
[BLMP18]
V. Brattka, S. Le Roux, J. S. Miller, and A. Pauly. Connected Choice and Brouwer's Fixed Point Theorem. Journal of Mathematical Logic, 2018. To appear.
BibTex ]
[CYFFMF18]
R. Chane-Yack-Fa, M. Frappier, A. Mammar, and A. Finkel. Parameterized Verification of Monotone Information Systems. Formal Aspects of Computing, 30(3-4):463--489, 2018.
doi: 10.1007/s00165-018-0460-8.
BibTex | DOI | Web page ]
[Zet18]
G. Zetzsche. The Emptiness Problem for Valence Automata over Graph Monoids. Information and Computation, 2018. To appear.
BibTex ]
[LZ18]
M. Lohrey and G. Zetzsche. Knapsack in Graph Groups. Theory of Computing Systems, 62(1):192--246, January 2018.
doi: 10.1007/s00224-017-9808-3.
BibTex | DOI ]
[BHL18]
N. Bertrand, S. Haddad, and E. Lefaucheux. A Tale of Two Diagnoses in Probabilistic Systems. Information and Computation, 2018. To appear.
BibTex | PDF ]
[Gou18]
J. Goubault-Larrecq. A semantics for nabla. Mathematical Structures in Computer Science, pages 1--25, 2018. To appear.
doi: 10.1017/S0960129518000063.
BibTex | DOI | Web page ]
[BHSS18]
B. Bérard, S. Haar, S. Schmitz, and S. Schwoon. The Complexity of Diagnosability and Opacity Verification for Petri Nets. Fundamenta Informaticae, 161(4):317--349, 2018.
doi: 10.3233/FI-2018-1706.
BibTex | DOI | Web page ]
[LFM+18]
A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and L. Chamoin. Compositional synthesis of state-dependent switching control. Theoretical Computer Science, 750:53--68, 2018.
doi: 10.1016/j.tcs.2018.01.021.
BibTex | DOI | Web page | PDF ]
[LACF18]
A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, and L. Fribourg. An improved algorithm for the control synthesis of nonlinear sampled switched systems. Formal Methods in System Design, 53(3):363--383, 2018.
doi: 10.1007/s10703-017-0305-8.
BibTex | DOI | Web page | PDF ]
[ABDL18]
N. Alechina, N. Bulling, S. Demri, and B. Logan. On the Complexity of Resource-Bounded Logics. Theoretical Computer Science, 750:69--100, 2018.
doi: 10.1016/j.tcs.2018.01.019.
BibTex | DOI | PDF ]
[HGLJX18]
W. K. Ho, J. Goubault-Larrecq, A. Jung, and X. Xi. The Ho-Zhao Problem. Logical Methods in Computer Science, 14(1):1--19, January 2018.
doi: 10.23638/LMCS-14(1:7)2018.
BibTex | DOI | Web page | PDF ]
[CMvR+17]
W. Czerwiński, W. Martens, L. van Rooijen, M. Zeitoun, and G. Zetzsche. A Characterization for Decidable Separability by Piecewise Testable Languages. Discrete Mathematics & Theoretical Computer Science, 19(4), December 2017.
doi: 10.23638/DMTCS-19-4-1.
BibTex | DOI | Web page | PDF ]
[HKZ17]
M. Huschenbett, D. Kuske, and G. Zetzsche. The Monoid of Queue Actions. Semigroup Forum, 95(3):475--508, December 2017.
doi: 10.1007/s00233-016-9835-4.
BibTex | DOI ]
[BHL17a]
B. Bérard, S. Haddad, and E. Lefaucheux. Probabilistic Disclosure: Maximisation vs. Minimisation. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 13:1--13:14, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2017.13.
BibTex | DOI | Web page | PDF ]
[BFG17]
M. Blondin, A. Finkel, and J. Goubault-Larrecq. Forward Analysis for WSTS, Part III: Karp-Miller Trees. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 16:1--16:15, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2017.16.
BibTex | DOI | Web page | PDF ]
[DLL17]
S. Demri, É. Lozes, and D. Lugiez. On Symbolic Heaps Modulo Permission Theories. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 25:1--25:14, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2017.25.
BibTex | DOI | Web page | PDF ]
[CHKP17]
K. Chatzikokolakis, S. Haddad, A. Kassem, and C. Palamidessi. Trading Optimality for Performance in Location Privacy. In Proceedings of the 11th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'17), pages 221--222, Venice, Italy, December 2017.
doi: 10.1145/3150928.3150962.
BibTex | DOI | Web page | PDF ]
[Thi17]
F. Thiré. Exporting an Arithmetic Library from Dedukti to HOL. Research Report hal-01668250, HAL Research Report, December 2017.
BibTex | Web page | PDF ]
[Car17]
P. Carlier. Verification of Stochastic Timed Automata. Thèse de doctorat, Ecole Normale Supérieure de Cachan (ENS Paris-Saclay) and Université de Mons, December 2017.
BibTex | Web page | PDF ]
[FS17]
D. Figueira and L. Segoufin. Bottom-up automata on data trees and vertical XPath. Logical Methods in Computer Science, 13(4:5), November 2017.
doi: 10.23638/LMCS-13(4:5)2017.
BibTex | DOI ]
[Sch17a]
S. Schmitz. Algorithmic Complexity of Well-Quasi-Orders. Mémoire d'habilitation, École Normale Supérieure Paris-Saclay, France, November 2017.
BibTex | Web page ]
[GN17]
J. Goubault-Larrecq and K. M. Ng. A Few Notes on Formal Balls. Logical Methods in Computer Science, 13(4):1--34, November 2017. Special Issue of the Domains XII Workshop.
doi: 10.23638/LMCS-13(4:18)2017.
BibTex | DOI | Web page | PDF ]
[CCvD17]
Th. Chatain, J. Carmona, and B. van Dongen. Alignment-Based Trace Clustering. In Proceedings of the 36th International Conference on Conceptual Modeling (ER'17), volume 10650 of Lecture Notes in Computer Science, pages 295--308, Valencia, Spain, November 2017. Springer. To appear.
doi: 10.1007/978-3-319-69904-2_24.
BibTex | DOI | Web page | PDF ]
[BHL17b]
N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnostic et contrôle de la dégradation des systèmes probabilistes. In Actes du 11ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'17), Marseille, France, November 2017. HAL.
BibTex | PDF ]
[DGG17]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. Directed homology theories and Eilenberg-Steenrod axioms. Applied Categorical Structures, 25(5):775--807, October 2017.
doi: doi:10.1007/s10485-016-9438-y.
BibTex | DOI | Web page | PDF ]
[CDD17b]
V. Cortier, A. Dallon, and S. Delaune. A typing result for trace inclusion (for pair and symmetric encryption only). Research Report hal-01615265, HAL, October 2017.
BibTex | Web page | PDF ]
[FNS17]
M. Függer, Th. Nowak, and M. Schwarz. Brief Announcement: Lower Bounds for Asymptotic Consensus in Dynamic Networks. In Proceedings of the 31st International Symposium on Distributed Computing (DISC'17), Leibniz International Proceedings in Informatics, pages 51:1--51:3, Vienna, Austria, October 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.DISC.2017.51.
BibTex | DOI | Web page | PDF ]
[Gou17a]
J. Goubault-Larrecq. Isomorphism theorems between models of mixed choice. Mathematical Structures in Computer Science, 27(6):1032--1067, September 2017.
doi: 10.1017/S0960129515000547.
BibTex | DOI | Web page | PDF ]
[Gil17b]
F. Gilbert. Proof Certificates in PVS. In Proceedings of the 8th International Conference on Interactive Theorem Proving (ITP'17), volume 10499 of Lecture Notes in Computer Science, pages 262--268, Brasília, Brazil, September 2017. Springer.
doi: 10.1007/978-3-319-66107-0_17.
BibTex | DOI | Web page | PDF ]
[Bur17]
G. Bury. mSAT: An OCaml SAT Solver. In OCaml Users and Developers Workshop, Oxford, UK, September 2017. Poster.
BibTex | Web page | PDF ]
[BFM17]
M. Blondin, A. Finkel, and P. McKenzie. Well Behaved Transition Systems. Logical Methods in Computer Science, 13(3):1--19, September 2017.
doi: 10.23638/LMCS-13(3:24)2017.
BibTex | DOI | Web page ]
[MHP17]
H. Mandon, S. Haar, and L. Paulevé. Temporal Reprogramming of Boolean Networks. In Proceedings of the 15th Conference on Computational Methods in System Biology (CMSB'17), volume 10545 of Lecture Notes in Bioinformatics, pages 179--195, Darmstadt, Germany, September 2017. Springer-Verlag.
doi: 10.1007/978-3-319-67471-1_11.
BibTex | DOI | PDF ]
[Doy17]
L. Doyen. The Multiple Dimensions of Mean-Payoff Games. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 1--8, London, UK, September 2017. Springer.
doi: 10.1007/978-3-319-67089-8_1.
BibTex | DOI | Web page | PDF ]
[Fri17]
L. Fribourg. Euler's Method Applied to the Control of Switched Systems. In Proceedings of the 15th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419, pages 3--21, Berlin, Germany, September 2017. Springer.
doi: 10.1007/978-3-319-65765-3_1.
BibTex | DOI | Web page | PDF ]
[BLL17]
F. Bruse, M. Lange, and É. Lozes. Space-Efficient Fragments of Higher-Order Fixpoint Logic. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 26--41, London, UK, September 2017. Springer.
doi: 10.1007/978-3-319-67089-8_3.
BibTex | DOI | Web page ]
[LAC+17]
A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, L. Fribourg, F. De Vuyst, and L. Chamoin. Distributed Control Synthesis Using Euler's Method. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 118--131, London, UK, September 2017. Springer.
doi: 10.1007/978-3-319-67089-8_9.
BibTex | DOI | Web page | PDF ]
[Dub17]
J. Dubut. Directed homotopic and homologic theories for geometric models of true concurrency. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2017.
BibTex | Web page | PDF ]
[GBB+17]
M. González, O. Beaude, P. Bouyer, S. Lasaulce, and N. Markey. Stratégies d'ordonnancement de consommation d'énergie en présence d'information imparfaite de prévision. In Actes du XXVIème colloque GRETSI, Juan-les-Pins, France, September 2017.
BibTex | Web page | PDF ]
[CP17]
Th. Chatain and L. Paulevé. Goal-Driven Unfolding of Petri Nets. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 18:1--18:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.18.
BibTex | DOI | Web page | PDF ]
[BHJ17]
P. Bouyer, S. Haddad, and V. Jugé. Unbounded product-form Petri nets. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 31:1--31:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.31.
BibTex | DOI | Web page | PDF ]
[AGKS17]
S. Akshay, P. Gastin, S. N. Krishna, and I. Sarkar. Towards an Efficient Tree Automata based technique for Timed Systems. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 39:1--39:15, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.39.
BibTex | DOI | Web page | PDF ]
[BQS17]
B. Bollig, K. Quaas, and A. Sangnier. The Complexity of Flat Freeze LTL. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 33:1--33:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2017.33.
BibTex | DOI | Web page | PDF ]
[BJM17]
P. Bouyer, S. Jaziri, and N. Markey. On the Determinization of Timed Systems. In Proceedings of the 15th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419, pages 25--41, Berlin, Germany, September 2017. Springer.
doi: 10.1007/978-3-319-65765-3_2.
BibTex | DOI | Web page ]
[Sub17]
C. L. Subramaniam. Cubical Type Theory in Dedukti. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2017.
BibTex ]
[Gen17]
G. Genestier. Termination checking in the λΠ-calculus modulo theory. Rapport de Master, Université Paris 7, Paris, France, September 2017.
BibTex | Web page | PDF ]
[Def17]
A. Defourné. Proof Tactics in Dedukti. Rapport de Master, Inria Saclay, September 2017.
BibTex | Web page | PDF ]
[Dow17a]
G. Dowek. Analyzing Individual Proofs as the Basis of Interoperability between Proof Systems. In Proceedings of the 5th Workshop on Proof eXchange for Theorem Proving (PxTP'17), volume 262 of Electronic Proceedings in Theoretical Computer Science, pages 3--12, Brasília, Brazil, September 2017.
doi: 10.4204/EPTCS.262.1.
BibTex | DOI | Web page | PDF ]
[Rie17]
M. Riesner. Regularity of deterministic pushdown automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2017.
BibTex ]
[Sch17b]
Ph. Schnoebelen. Ideal-Based Algorithms for the Symbolic Verification of Well-Structured Systems (Invited Talk). In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'17), volume 83 of Leibniz International Proceedings in Informatics, pages 85:1--85:4, Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2017.85.
BibTex | DOI | Web page | PDF ]
[CDH17]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. The Cost of Exactness in Quantitative Reachability. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pages 367--381. Springer, August 2017.
doi: 10.1007/978-3-319-63121-9_18.
BibTex | DOI | PDF ]
[BDGK17]
D. Baelde, S. Delaune, I. Gazeau, and S. Kremer. Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 234--248, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.22.
BibTex | DOI | Web page | PDF ]
[CDD17a]
V. Cortier, A. Dallon, and S. Delaune. SAT-Equiv: An Efficient Tool for Equivalence Properties. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 481--494, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.15.
BibTex | DOI | Web page | PDF ]
[GMS17]
N. Grosshans, P. McKenzie, and L. Segoufin. The power of programs over monoids in DA. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'17), volume 83 of Leibniz International Proceedings in Informatics, pages 2:1--2:20, Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2017.2.
BibTex | DOI | Web page | PDF ]
[CK17]
H. Comon and A. Koutsos. Formal Computational Unlinkability Proofs of RFID Protocols. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 100--114, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.9.
BibTex | DOI | Web page | PDF ]
[CGKM17]
S. Calzavara, I. Grishchenko, A. Koutsos, and M. Maffei. A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 22--36, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press.
doi: 10.1109/CSF.2017.19.
BibTex | DOI | Web page | PDF ]
[BLM+17]
P. Bouyer, F. Laroussinie, N. Markey, J. Ouaknine, and J. Worrell. Timed temporal logics. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pages 211--230. Springer, August 2017.
doi: 10.1007/978-3-319-65764-6_11.
BibTex | DOI | Web page | PDF ]
[Seg17]
L. Segoufin. A survey on guarded negation. SIGLOG News, 4(3):12--26, July 2017.
doi: 10.1145/3129173.3129178.
BibTex | DOI ]
[FL17]
A. Finkel and É. Lozes. Synchronizability of Communicating Finite State Machines is not Decidable. In Proceedings of the 44th International Colloquium on Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz International Proceedings in Informatics, pages 122:1--122:14, Warsaw, Poland, July 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2017.122.
BibTex | DOI | Web page | PDF ]
[Dow17c]
G. Dowek. Models and termination of proof reduction in the λΠ-calculus modulo theory. In Proceedings of the 44th International Colloquium on Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz International Proceedings in Informatics, pages 109:1--109:14, Warsaw, Poland, July 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2017.109.
BibTex | DOI | Web page | PDF ]
[FMW17]
M. Fortin, A. Muscholl, and I. Walukiewicz. Model-checking linear-time properties of parametrized asynchronous shared-memory pushdown systems. In Proceedings of the 29th International Conference on Computer Aided Verification (CAV'17), volume 10427 of Lecture Notes in Computer Science, pages 155--175, Heidelberg, Germany, July 2017. Springer.
doi: 10.1007/978-3-319-63390-9_9.
BibTex | DOI | Web page ]
[BR17]
D. Berwanger and R. Ramanujam. Deviator Detection under Imperfect Monitoring. In Proceedings of the 5th International Workshop on Strategic Reasoning (SR'17), Liverpool, UK, July 2017.
BibTex | Web page | PDF ]
[BFRR17]
V. Bruyère, E. Filiot, M. Randour, and J.-F. Raskin. Meet Your Expectations With Guarantees: Beyond Worst-Case Synthesis in Quantitative Games. Information and Computation, 254(2):259--295, June 2017. To appear.
doi: 10.1016/j.ic.2016.10.011.
BibTex | DOI ]
[BMV17b]
P. Bouyer, N. Markey, and S. Vester. Nash Equilibria in Symmetric Graph Games with Partial Observation. Information and Computation, 254(2):238--258, June 2017.
doi: 10.1016/j.ic.2016.10.010.
BibTex | DOI | Web page | PDF ]
[KGH+17]
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, B. Berthomieu, G. Ciardo, M. Colange, S. Dal Zilio, E. Amparore, M. Beccuti, T. Liebke, J. Meijer, A. Miner, C. Rohr, J. Srba, Y. Thierry-Mieg, J. van de Pol, and K. Wolf. Complete Results for the 2017 Edition of the Model Checking Contest, June 2017.
BibTex | Web page ]
[Dou17a]
A. Doumane. Constructive completeness for the linear-time μ-calculus. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--12, Reykjavik, Iceland, June 2017. IEEE Press.
doi: 10.1109/LICS.2017.8005075.
BibTex | DOI ]
[Dou17b]
A. Doumane. On the infinitary proof theory of logics with fixed points. Thèse de doctorat, Université Paris-Diderot, Paris, France, June 2017.
BibTex | Web page | PDF ]
[Gar17]
P. Gardy. Semantics of Strategy Logic. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2017.
BibTex | Web page | PDF ]
[Had17]
S. Haddad. Memoryless Determinacy of Finite Parity Games: Another Simple Proof. Research Report hal-01541508, HAL-inria, June 2017. 7 pages.
BibTex | Web page | PDF ]
[KV17]
A. Koutsos and V. Vianu. Process-centric views of data-driven business artifacts. Journal of Computer and System Sciences, 86(1):82--107, June 2017.
doi: 10.1016/j.jcss.2016.11.012.
BibTex | DOI | Web page | PDF ]
[HSZ17]
S. Halfon, Ph. Schnoebelen, and G. Zetzsche. Decidability, complexity, and expressiveness of first-order logic over the subword ordering. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--12, Reykjavik, Iceland, June 2017. IEEE Press.
doi: 10.1109/LICS.2017.8005141.
BibTex | DOI | Web page ]
[CJLS17]
Th. Colcombet, M. Jurdziński, R. Lazić, and S. Schmitz. Perfect Half Space Games. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--11, Reykjavik, Iceland, June 2017. IEEE Press.
doi: 10.1109/LICS.2017.8005105.
BibTex | DOI | Web page ]
[vCCT17]
B. van Dongen, J. Carmona, Th. Chatain, and F. Taymouri. Aligning Modeled and Observed Behavior: A Compromise Between Complexity and Quality. In Proceedings of the 29th International Conference on Advanced Information Systems Engineering (CAiSE'17), volume 10253 of Lecture Notes in Computer Science, pages 94--109, Essen, Germany, June 2017. Springer.
doi: 10.1007/978-3-319-59536-8_7.
BibTex | DOI | PDF ]
[BHSS17]
B. Bérard, S. Haar, S. Schmitz, and S. Schwoon. The Complexity of Diagnosability and Opacity Verification for Petri Nets. In Proceedings of the 38th International Conference on Applications and Theory of Petri Nets (PETRI NETS'17), volume 10258 of Lecture Notes in Computer Science, pages 200--220, Zaragoza, Spain, June 2017. Springer.
doi: 10.1007/978-3-319-57861-3_13.
BibTex | DOI | Web page ]
[BM17]
D. Berwanger and A. B. Mathew. Infinite games with finite knowledge gaps. Information and Computation, 254:217--237, June 2017.
doi: 10.1016/j.ic.2016.10.009.
BibTex | DOI | Web page | PDF ]
[BMv17a]
D. Berwanger, A. B. Mathew, and M. van den Bogaard. Hierarchical information and the synthesis of distributed strategies. Acta Informatica, June 2017.
doi: 10.1007/s00236-017-0306-5.
BibTex | DOI | Web page | PDF ]
[JS17]
J.-P. Jouannaud and P.-Y. Strub. Coq without Type Casts: A Complete Proof of Coq Modulo Theory. In Proceedings of the 21st International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'17), volume 46 of EPiC Series in Computing, pages 474--489, Maun, Botswana, May 2017. EasyChair.
BibTex | Web page | PDF ]
[TFL17]
G. Tarawneh, M. Függer, and C. Lenzen. Metastability Tolerant Computing. In Proceedings of the 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'17), pages 25--32, San Diego, California, USA, May 2017. IEEE Computer Society.
doi: 10.1109/ASYNC.2017.9.
BibTex | DOI | Web page | PDF ]
[FKLP17]
M. Függer, A. Kinali, C. Lenzen, and T. Polzer. Metastability-Aware Memory-Efficient Time-to-Digital Converter. In Proceedings of the 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'17), pages 49--56, San Diego, California, USA, May 2017. IEEE Computer Society.
doi: 10.1109/ASYNC.2017.12.
BibTex | DOI | Web page | PDF ]
[OBH17]
P. O'Hanlon, R. Borgaonkar, and L. Hirschi. Mobile subscriber WiFi privacy. In Proceedings of Mobile Security Technologies (MoST'17), held as part of the IEEE Computer Society Security and Privacy Workshops, San Jose, CA, USA, May 2017.
BibTex | PDF ]
[BJ17]
P. Bouyer and V. Jugé. Dynamic Complexity of the Dyck Reachability. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 265--280, Uppsala, Sweden, April 2017. Springer.
doi: 10.1007/978-3-662-54458-7_16.
BibTex | DOI | Web page | PDF ]
[BHM+17]
P. Bouyer, P. Hofman, N. Markey, M. Randour, and M. Zimmermann. Bounding Average-energy Games. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 179--195, Uppsala, Sweden, April 2017. Springer.
doi: 10.1007/978-3-662-54458-7_11.
BibTex | DOI | Web page | PDF ]
[ZKL17]
G. Zetzsche, D. Kuske, and M. Lohrey. On Boolean closed full trios and rational Kripke frames. Theory of Computing Systems, 60(3):438--472, April 2017.
doi: 10.1007/s00224-016-9694-0.
BibTex | DOI ]
[Gil17a]
F. Gilbert. Automated Constructivization of Proofs. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 480--495, Uppsala, Sweden, April 2017. Springer.
doi: 10.1007/978-3-662-54458-7_28.
BibTex | DOI | Web page | PDF ]
[LDCF17]
A. Le Coënt, F. De Vuyst, L. Chamoin, and L. Fribourg. Control Synthesis of Nonlinear Sampled Switched Systems using Euler's Method. In Proceedings of the 3rd International Workshop on Symbolic and Numerical Methods for Reachability Analysis (SNR'17), volume 247 of Electronic Proceedings in Theoretical Computer Science, pages 18--33, Uppsala, Sweden, April 2017.
doi: 10.4204/EPTCS.247.2.
BibTex | DOI | Web page | PDF ]
[Hir17]
L. Hirschi. Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2017.
BibTex | Web page | PDF ]
[BGHH17]
S. Böhm, S. Göller, S. Halfon, and P. Hofman. On Büchi one-counter automata. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 14:1--14:13, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2017.14.
BibTex | DOI | Web page | PDF ]
[CG17]
A. Carayol and S. Göller. On long words avoiding Zimin patterns. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 19:1--19:13, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2017.19.
BibTex | DOI | Web page | PDF ]
[LZ17]
M. Lohrey and G. Zetzsche. The Complexity of Knapsack in Graph Groups. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 52:1--52:14, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2017.52.
BibTex | DOI ]
[Mon17]
D. Montoya. Une base de connaissance personnelle intégrant les données d'un utilisateur et une chronologie de ses activités. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, March 2017.
BibTex | Web page | PDF ]
[SV17]
L. Segoufin and A. Vigny. Constant Delay Enumeration for FO Queries over Databases with Local Bounded Expansion. In Proceedings of the 18th International Conference on Database Theory (ICDT'17), volume 68 of Leibniz International Proceedings in Informatics, pages 20:1--20:16, Venice, Italy, March 2017. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICDT.2017.20.
BibTex | DOI | Web page | PDF ]
[Sta17]
D. Stan. Randomized Strategies in Concurrent Games. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2017.
BibTex | Web page | PDF ]
[BBDH17]
B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad. Statistical Model-Checking for Autonomous Vehicle Safety Validation. In SIA Simulation Numérique, Montigny-le-Bretonneux, France, March 2017.
BibTex | Web page | PDF ]
[CFNS17]
B. Charron-Bost, M. Függer, Th. Nowak, and M. Schwarz. New transience bounds for max-plus linear systems. Discrete Applied Mathematics, 219:83--99, March 2017.
doi: 10.1016/j.dam.2016.11.003.
BibTex | DOI | Web page | PDF ]
[Dow17b]
G. Dowek. Lineal: A linear-algebraic Lambda-calculus. Logical Methods in Computer Science, 13(1):1--33, March 2017.
doi: 10.23638/LMCS-13(1:8)2017.
BibTex | DOI | Web page | PDF ]
[Jug17]
V. Jugé. The Relaxation Normal Form of Braids is Regular. International Journal of Algebra and Computation, 27(1):61--106, February 2017.
doi: 10.1142/S0218196717500059.
BibTex | DOI | Web page ]
[BMJ17]
P. Bouyer, N. Markey, and V. Jugé. Courcelle's Theorem Made Dynamic. Research Report 1702.05183, Computing Research Repository, February 2017. 14 pages.
BibTex | Web page | PDF ]
[HHMS17]
S. Haar, S. Haddad, T. Melliti, and S. Schwoon. Optimal constructions for active diagnosis. Journal of Computer and System Sciences, 83(1):101--120, 2017.
doi: 10.1016/j.jcss.2016.04.007.
BibTex | DOI | PDF ]
[BKM17]
B. Bollig, D. Kuske, and R. Mennicke. The Complexity of Model Checking Multi-Stack Systems. Theory of Computing Systems, 60(4):695--736, 2017.
doi: 10.1007/s00224-016-9700-6.
BibTex | DOI | Web page ]
[BMPS17]
P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber-Caissier. Timed automata abstraction of switched dynamical systems using control funnels. Real-Time Systems, 53(3):327--353, 2017.
doi: 10.1007/s11241-016-9262-3.
BibTex | DOI | Web page | PDF ]
[DGLWM17]
S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Mery. Separation Logic with One Quantified Variable. Theory of Computing Systems, 61(2):371--461, 2017.
doi: 10.1007/s00224-016-9713-1.
BibTex | DOI | Web page | PDF ]
[Gou17b]
J. Goubault-Larrecq. A Non-Hausdorff Minimax Theorem. Minimax Theory and its Applications, 3(1):73--80, 2017.
BibTex ]
[DDS17]
S. Demri, A. Dhar, and A. Sangnier. Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic. Theoretical Computer Science, 735:2--23, 2017.
BibTex | PDF ]
[CDFR17]
K. Chatterjee, L. Doyen, E. Filiot, and J. Raskin. Doomsday equilibria for omega-regular games. Information and Computation, 254:296--315, 2017.
doi: 10.1016/j.ic.2016.10.012.
BibTex | DOI | PDF ]
[BCMW17]
D. Baelde, A. Carayol, R. Matthes, and I. Walukiewicz. Preface: Special Issue of Fixed Points in Computer Science (FICS'13). Fundamenta Informaticae, 150(3-4):i--ii, 2017.
doi: 10.3233/FI-2017-1468.
BibTex | DOI | Web page ]
[BDH17]
D. Baelde, S. Delaune, and L. Hirschi. A Reduced Semantics for Deciding Trace Equivalence. Logical Methods in Computer Science, 13(2:8):1--48, 2017.
doi: 10.23638/LMCS-13(2:8)2017.
BibTex | DOI | Web page | PDF ]
[BFHH17]
M. Blondin, A. Finkel, C. Haase, and S. Haddad. The Logical View on Continuous Petri Nets. ACM Transactions on Computational Logic, 18(3):24:1--24:28, 2017.
doi: 10.1145/3105908.
BibTex | DOI | Web page | PDF ]
[HPV17]
S. Haar, S. Perchy, and F. Valencia. D-SPACES: Implementing Declarative Semantics for Spatially Structured Information. In Proceedings of the 11th International Conference on Semantic Computing (ICSC'17), volume 11 of IEEE ICSC, pages 227--233, San Diego, CA, USA, January 2017. IEEE Press.
doi: 10.1109/ICSC.2017.34.
BibTex | DOI | Web page | PDF ]
[GHP+17]
M. Guzmán, S. Haar, S. Perchy, C. Rueda, and F. Valencia. Belief, Knowledge, Lies and Other Utterances in an Algebra for Space and Extrusion. Journal of Logic and Algebraic Methods in Programming, 86(1):107--133, January 2017.
doi: 10.1016/j.jlamp.2016.09.001.
BibTex | DOI | Web page | PDF ]
[ABH17]
M. F. Atig, B. Bollig, and P. Habermehl. Emptiness of ordered multi-pushdown automata is 2ETIME-complete. International Journal of Foundations of Computer Science, 28(8):945--975, 2017.
doi: 10.1142/S0129054117500332.
BibTex | DOI | Web page | PDF ]
[DKW17]
S. Demri, D. Kapur, and C. Weidenbach. Special Issue of Selected Extended Papers of IJCAR 2014. Journal of Automated Reasoning, 58(1), 2017.
BibTex | Web page ]
[ACR17]
É. André, Th. Chatain, and C. Rodríguez. Preserving Partial-Order Runs in Parametric Time Petri Nets. ACM Transactions in Embedded Computing Systems, 16(2):43:1--43:26, 2017.
doi: 10.1145/3012283.
BibTex | DOI | PDF ]
[AM17]
P. Arrighi and S. Martiel. Quantum causal graph dynamics. Physical Review D, 96(2), 2017.
BibTex | PDF ]
[AD17]
S. Abiteboul and G. Dowek. Le temps des algorithmes. Editions Le Pommier, 2017.
BibTex | Web page ]
[CCD17]
V. Cheval, H. Comon-Lundh, and S. Delaune. A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255:94--125, 2017.
doi: 10.1016/j.ic.2017.05.004.
BibTex | DOI | Web page ]
[DD17]
A. Díaz-Caro and G. Dowek. Typing Quantum Superpositions and Measurement. In Proceedings of the 6th International Conference on Theory and Practice of Natural Computing (TPNC'17), volume 10687 of Lecture Notes in Computer Science, pages 281--293, Prague, Czech Republic, 2017. Springer.
doi: 10.1007/978-3-319-71069-3_22.
BibTex | DOI | Web page ]
[Dow17d]
G. Dowek. Rules and derivations in an elementary logic course. IfCoLoG Journal of Logics and their Applications, 4(1):21--32, 2017. Special Issue: Tools for Teaching Logic.
BibTex | PDF ]
[BKM16]
M. Blondin, A. Krebs, and P. McKenzie. The Complexity of Intersecting Finite Automata Having Few Final States. Computational Complexity, 25(4):775--814, December 2016. To appear.
doi: 10.1007/s00037-014-0089-9.
BibTex | DOI | Web page | PDF ]
[The16]
S. Theissing. Supervision in Multi-Modal Transportation System. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2016.
BibTex | Web page | PDF ]
[Bol16]
B. Bollig. One-Counter Automata with Counter Observability. In Proceedings of the 36th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'16), volume 65 of Leibniz International Proceedings in Informatics, pages 20:1--20:14, Chennai, India, December 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2016.20.
BibTex | DOI | Web page ]
[Gou16d]
J. Goubault-Larrecq. A semantics for . Invited talk, Dale Miller Festschrift, Paris Diderot University, Paris, December 2016.
BibTex ]
[AD16b]
P. Arrighi and G. Dowek. What is the Planck constant the magnitude of? preprint, December 2016.
BibTex | Web page | PDF ]
[Hal16a]
P. Halmagrand. Automated Deduction and Proof Certification for the B Method. Thèse de doctorat, Conservatoire National Des Arts et Métiers, Paris, December 2016.
BibTex | Web page ]
[BGMS16b]
P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin. Nondeterminism and An Abstract Formulation of Nečiporuk's Lower Bound Method. ACM Transactions on Computation Theory, 9(1):5:1--5:34, December 2016.
doi: 10.1145/3013516.
BibTex | DOI ]
[Van16]
M. Van den Bogaard. Motifs de Flot d'Information dans les Jeux à Information Imparfaite. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2016.
BibTex | Web page | PDF ]
[MPTAS16]
D. Montoya, T. Pellissier Tanon, S. Abiteboul, and F. Suchanek. Thymeflow, A Personal Knowledge Base with Spatio-temporal Data. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16), pages 2477--2480, Indianapolis, Indiana, USA, October 2016. ACM.
doi: 10.1145/2983323.2983337.
BibTex | DOI | PDF ]
[Moh16]
S. Mohamed. Une méthode topologique pour la recherche d'ensembles invariants de systèmes continus et à commutation. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2016.
BibTex | Web page | PDF ]
[Cau16b]
R. Cauderlier. Object-Oriented Mechanisms for Interoperability between Proof Systems. Thèse de doctorat, Conservatoire National Des Arts et Métiers, Paris, October 2016.
BibTex | Web page | PDF ]
[DGL16]
S. Demri, V. Goranko, and M. Lange. Temporal Logics in Computer Science, volume 58 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, October 2016.
BibTex | Web page ]
[Hal16b]
P. Halmagrand. Soundly Proving B Method Formulae Using Typed Sequent Calculus. In Proceedings of the 13th International Colloquium on Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture Notes in Computer Science, pages 196--213, Taipei, Taiwan, October 2016. Springer.
doi: 10.1007/978-3-319-46750-4_12.
BibTex | DOI | Web page | PDF ]
[vDCC16a]
B. van Dongen, J. Carmona, and Th. Chatain. Alignment-based Quality Metrics in Conformance Checking. In Proceedings of the 7th Int. Workshop on Enterprise Modelling and Information Systems Architectures (EMISA'16), volume 1701 of CEUR Workshop Proceedings, pages 87--90, Vienna, Austria, October 2016. CEUR-WS.org.
BibTex | DOI | Web page | PDF ]
[MHP16]
H. Mandon, S. Haar, and L. Paulevé. Relationship between the Reprogramming Determinants of Boolean Networks and their Interaction Graph. In Proceedings of the 5th International Workshop on Hybrid Systems Biology, Lecture Notes in Computer Science, pages 113--127, Grenoble France, October 2016. Springer.
doi: 10.1007/978-3-319-47151-8_8.
BibTex | DOI | Web page | PDF ]
[BMJ16]
P. Bouyer, N. Markey, and V. Jugé. Dynamic Complexity of Parity Games with Bounded Tree-Width. Research Report 1610.00571, Computing Research Repository, October 2016. 33 pages.
BibTex | Web page | PDF ]
[CD16a]
R. Cauderlier and C. Dubois. ML Pattern-Matching, Recursion, and Rewriting: From FoCaLiZe to Dedukti. In Proceedings of the 13th International Colloquium on Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture Notes in Computer Science, pages 459--468, Taipei, Taiwan, October 2016. Springer.
BibTex | Web page | PDF ]
[Haa16]
S. Haar. Cyclic Ordering through Partial Orders. Journal of Multiple-Valued Logic and Soft Computing, 27(2-3):209--228, September 2016.
BibTex | Web page | PDF ]
[Jac16]
C. Jacomme. Automated applications of Cryptographic Assumptions. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2016.
BibTex | PDF ]
[HHK+16a]
M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and É. Lozes. Multi-Buffer Simulations for Trace Language Inclusion. In Proceedings of the 7th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'16), volume 226 of Electronic Proceedings in Theoretical Computer Science, pages 213--227, Catania, Italy, September 2016.
doi: 10.4204/EPTCS.226.15.
BibTex | DOI | Web page | PDF ]
[GL16]
J. Goubault-Larrecq and J. Lachance. On the Complexity of Monitoring Orchids Signatures. In Proceedings of the 16th Conference on Runtime Verification (RV'16), volume 10012 of Lecture Notes in Computer Science, pages 169--164, Madrid, Spain, September 2016. Springer.
doi: 10.1007/978-3-319-46982-9_11.
BibTex | DOI ]
[KŠHP16]
J. Kolcák, D. Šafránek, S. Haar, and L. Paulevé. Unfolding of Parametric Logical Regulatory Networks. In Proceedings of The Seventh International Workshop on Static Analysis and Systems Biology (SASB 2016), Electronic Notes in Theoretical Computer Science, Edinburgh, UK, September 2016. Elsevier Science Publishers. To appear.
BibTex | Web page | PDF ]
[BDM16]
L. Beklemishev, S. Demri, and A. Maté, editors. Proceedings of the 11th Conference on Advances in Modal Logic (AiML'16), Budapest, Hungary, September 2016. College Publications.
BibTex | Web page ]
[BMS16]
P. Bouyer, N. Markey, and D. Stan. Stochastic Equilibria under Imprecise Deviations in Terminal-Reward Concurrent Games. In Proceedings of the 7th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'16), volume 226 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Catania, Italy, September 2016.
doi: 10.4204/EPTCS.226.5.
BibTex | DOI | Web page | PDF ]
[Fin16]
A. Finkel. The Ideal Theory for WSTS. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 1--22, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_1.
BibTex | DOI | Web page | PDF ]
[ABDL16]
N. Alechina, N. Bulling, S. Demri, and B. Logan. On the Complexity of Resource-Bounded Logics. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 36--50, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_3.
BibTex | DOI | Web page | PDF ]
[LFS16]
A. Le Coënt, L. Fribourg, and R. Soulat. Compositional analysis of Boolean networks using local fixed-point iterations. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 134--147, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_10.
BibTex | DOI | Web page | PDF ]
[LFM+16]
A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and L. Chamoin. Distributed Synthesis of State-Dependent Switching Control. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 119--133, Aalborg, Denmark, September 2016. Springer.
doi: 10.1007/978-3-319-45994-3_9.
BibTex | DOI | Web page | PDF ]
[vDCC16b]
B. F. van Dongen, J. Carmona, and Th. Chatain. A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments. In Proceedings of the 14th International Conference on Business Process Management (BPM'16), volume 9850 of Lecture Notes in Computer Science, pages 39--56, Rio de Janeiro, Brazil, September 2016. Springer.
doi: 10.1007/978-3-319-45348-4_3.
BibTex | DOI | Web page | PDF ]
[KS16]
P. Karandikar and Ph. Schnoebelen. The height of piecewise-testable languages with applications in logical complexity. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 37:1--37:22, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.37.
BibTex | DOI | Web page | PDF ]
[GGL16]
M. Ganardi, S. Göller, and M. Lohrey. On the Parallel Complexity of Bisimulation over Finite Systems. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 12:1--12:17, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.12.
BibTex | DOI ]
[DGG16b]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. The Directed Homotopy Hypothesis. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 9:1--9:16, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.9.
BibTex | DOI | Web page | PDF ]
[DBS16]
A. Doumane, D. Baelde, and A. Saurin. Infinitary proof theory: the multiplicative additive case. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 42:1--42:17, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.42.
BibTex | DOI ]
[BLS16]
D. Baelde, S. Lunel, and S. Schmitz. A Sequent Calculus for a Modal Logic on Finite Data Trees. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 32:1--32:16, Marseille, France, September 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2016.32.
BibTex | DOI | Web page ]
[Leh16]
M. Lehaut. PDL on infinite alphabet. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 19 pages.
BibTex | Web page | PDF ]
[BGMS16a]
P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin. Nondeterminism and an abstract formulation of Neciporuk's lower bound method. Research Report 1608.01932, Computing Research Repository, August 2016. 34 pages.
BibTex | Web page | PDF ]
[Lic16]
A. Lick. Systèmes de preuves pour logiques modales. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 20 pages.
BibTex | Web page | PDF ]
[BFM16]
M. Blondin, A. Finkel, and P. McKenzie. Well Behaved Transition Systems. Research Report 1608.02636, Computing Research Repository, August 2016. 18 pages.
BibTex | Web page | PDF ]
[FM16]
M. Fränzle and N. Markey, editors. Proceedings of the 14th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'16), volume 9884 of Lecture Notes in Computer Science, Québec City, Canada, August 2016. Springer.
doi: 10.1007/978-3-319-44878-7.
BibTex | DOI | Web page ]
[HT16b]
S. Haar and S. Theissing. Decoupling Passenger Flows for Improved Load Prediction. In Proceedings of the 13th International Conference on Quantitative Evaluation of Systems (QEST'16), volume 9826 of Lecture Notes in Computer Science, pages 364--379, Québec City, Canada, August 2016. Springer.
doi: 10.1007/978-3-319-43425-4_24.
BibTex | DOI | Web page | PDF ]
[Bou16]
P. Bouyer. Optimal Reachability in Weighted Timed Automata and Games. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 3:1--3:3, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2016.3.
BibTex | DOI | Web page | PDF ]
[ABK+16]
S. Akshay, P. Bouyer, S. N. Krishna, L. Manasa, and A. Trivedi. Stochastic Timed Games Revisited. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 8:1--8:14, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2016.8.
BibTex | DOI | Web page | PDF ]
[NPR16]
R. Niskanen, I. Potapov, and J. Reichert. Undecidability of Two-dimensional Robot Games. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 73:1--73:13, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.MFCS.2016.73.
BibTex | DOI | Web page | PDF ]
[DGG16a]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. Bisimulations and unfolding in P-accessible categorical models. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 25:1--25:14, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.25.
BibTex | DOI | Web page | PDF ]
[AGK16]
S. Akshay, P. Gastin, and S. N. Krishna. Analyzing Timed Systems Using Tree Automata. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 27:1--27:14, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.27.
BibTex | DOI | Web page | PDF ]
[BHL16b]
N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnosis in Infinite-State Probabilistic Systems. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 37:1--37:15, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.37.
BibTex | DOI | Web page | PDF ]
[DLM16]
A. David, F. Laroussinie, and N. Markey. On the expressiveness of QCTL. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 28:1--28:15, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2016.28.
BibTex | DOI | Web page | PDF ]
[DFP16]
S. Demri, D. Figueira, and M. Praveen. Reasoning about Data Repetitions with Counter Systems. Logical Methods in Computer Science, 12(3):1:1--1:55, August 2016.
doi: 10.2168/LMCS-12(3:1)2016.
BibTex | DOI | Web page | PDF ]
[Gou16a]
J. Goubault-Larrecq. A few things on Noetherian spaces. Invited talk (plenary speaker), Summer Topology Conference, Leicester, UK, August 2016.
BibTex ]
[Gou16b]
J. Goubault-Larrecq. An introduction to asymmetric topology and domain theory: why, what, and how. Invited talk, Galway Symposium, Leicester, UK, August 2016.
BibTex ]
[Thi16]
F. Thiré. Reverse engineering on arithmetic proofs. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 26 pages.
BibTex | Web page | PDF ]
[BDJ+16]
Th. Brihaye, B. Delahaye, L. Jezequel, N. Markey, and J. Srba, editors. Proceedings of the Cassting Workshop on Games for the Synthesis of Complex Systems (Cassting'16) and of the 3rd International Workshop on Synthesis of Complex Parameters (SynCoP'16), volume 220 of Electronic Proceedings in Theoretical Computer Science, Eindhoven, The Netherlands, July 2016.
doi: 10.4204/EPTCS.220.
BibTex | DOI | Web page ]
[HT16d]
S. Haar and S. Theissing. Predicting Traffic Load in Public Transportation Networks. In Proceedings of the 35th American Control Conference (ACC'16), pages 821--826, Boston, Massachusetts, USA, July 2016. IEEE Control System Society.
doi: 10.1109/ACC.2016.7525015.
BibTex | DOI | Web page | PDF ]
[BBBC16]
N. Bertrand, P. Bouyer, Th. Brihaye, and P. Carlier. Analysing Decisive Stochastic Processes. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 101:1--101:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.101.
BibTex | DOI | Web page | PDF ]
[CH16]
D. Chistikov and C. Haase. The Taming of the Semi-Linear Set. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 128:1--128:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.128.
BibTex | DOI | Web page | PDF ]
[Zet16]
G. Zetzsche. The complexity of downward closure comparisons. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 123:1--123:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.123.
BibTex | DOI | Web page | PDF ]
[CD16b]
K. Chatterjee and L. Doyen. Computation Tree Logic for Synchronization Properties. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 98:1--98:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.98.
BibTex | DOI | Web page | PDF ]
[GS16]
J. Goubault-Larrecq and S. Schmitz. Deciding Piecewise Testable Separability for Regular Tree Languages. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 97:1--97:15, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.97.
BibTex | DOI | Web page ]
[GHLT16]
S. Göller, C. Haase, R. Lazić, and P. Totzke. A Polynomial-Time Algorithm for Reachability in Branching VASS in Dimension One. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 105:1--105:13, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.105.
BibTex | DOI | Web page ]
[BCM16]
P. Bouyer, M. Colange, and N. Markey. Symbolic Optimal Reachability in Weighted Timed Automata. In Proceedings of the 28th International Conference on Computer Aided Verification (CAV'16) -- Part I, volume 9779 of Lecture Notes in Computer Science, pages 513--530, Toronto, Canada, July 2016. Springer.
doi: 10.1007/978-3-319-41528-4_28.
BibTex | DOI | Web page ]
[BMR+16]
P. Bouyer, N. Markey, M. Randour, A. Sangnier, and D. Stan. Reachability in Networks of Register Protocols under Stochastic Schedulers. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 106:1--106:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICALP.2016.106.
BibTex | DOI | Web page ]
[LS16a]
R. Lazić and S. Schmitz. The Complexity of Coverability in ν-Petri Nets. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 467--476, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2933593.
BibTex | DOI | Web page ]
[DBHS16]
A. Doumane, D. Baelde, L. Hirschi, and A. Saurin. Towards Completeness via Proof Search in the Linear Time μ-calculus. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 377--386, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2933598.
BibTex | DOI | Web page | PDF ]
[CG16]
Th. Colcombet and S. Göller. Games with bound guess actions. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 257--266, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934502.
BibTex | DOI | Web page | PDF ]
[CD16c]
K. Chatterjee and L. Doyen. Perfect-information Stochastic Games with Generalized Mean-Payoff Objectives. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 247--256, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934513.
BibTex | DOI | Web page ]
[DMZ16]
E. D'Osualdo, R. Meyer, and G. Zetzsche. First-order logic with reachability for infinite-state systems. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 457--466, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934552.
BibTex | DOI | Web page | PDF ]
[ACH+16]
M. F. Atig, D. Chistikov, P. Hofman, K. N. Kumar, P. Saivasan, and G. Zetzsche. Complexity of regular abstractions of one-counter languages. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 207--216, New York City, USA, July 2016. ACM Press.
doi: 10.1145/2933575.2934561.
BibTex | DOI | Web page | PDF ]
[CFS16]
P. Chambart, A. Finkel, and S. Schmitz. Forward Analysis and Model Checking for Trace Bounded WSTS. Theoretical Computer Science, 637:1--29, July 2016.
doi: 10.1016/j.tcs.2016.04.020.
BibTex | DOI | Web page ]
[AMP16]
P. Arrighi, S. Martiel, and S. Perdrix. Reversible Causal Graph Dynamics. In 8th Conference on Reversible Computation (RC'16), volume 9720 of Lecture Notes in Computer Science, pages 73--88, Bologna, Italy, July 2016. Springer.
doi: 10.1007/978-3-319-40578-0_5.
BibTex | DOI | Web page ]
[PHL16]
H. Ponce de León, S. Haar, and D. Longuet. Model-based Testing for Concurrent Systems: Unfolding-based Test Selection. International Journal on Software Tools for Technology Transfer, 18(3):305--318, June 2016.
doi: 10.1007/s10009-014-0353-y.
BibTex | DOI | Web page | PDF ]
[Sch16c]
S. Schmitz. Implicational Relevance Logic is 2-ExpTime-Complete. Journal of Symbolic Logic, 81(2):641--661, June 2016.
doi: 10.1017/jsl.2015.7.
BibTex | DOI | Web page | PDF ]
[DLV16]
A. Deutsch, Y. Li, and V. Vianu. Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS'16). In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS'16), pages 179--194, San Francisco, California, USA, June 2016. ACM Press.
doi: 10.1145/2902251.2902275.
BibTex | DOI ]
[Blo16]
M. Blondin. Algorithmique et complexité des systèmes à compteurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Université de Montréal, June 2016.
BibTex | Web page ]
[PS16]
T. Place and L. Segoufin. Decidable Characterization of FO2(<, +1) and locality of DA. Research Report 1606.03217, Computing Research Repository, June 2016. 8 pages.
BibTex | Web page | PDF ]
[DG16a]
S. Delaune and I. Gazeau. Combination issues. Deliverable VIP 4.2 (ANR-11-JS02-0006), June 2016. 5 pages.
BibTex | Web page | PDF ]
[DG16b]
S. Delaune and I. Gazeau. Results on the case studies. Deliverable VIP 2.2 (ANR-11-JS02-0006), June 2016. 8 pages.
BibTex | Web page | PDF ]
[BBCM16]
P. Bouyer, Th. Brihaye, P. Carlier, and Q. Menet. Compositional Design of Stochastic Timed Automata. In Proceedings of the 11th International Computer Science Symposium in Russia (CSR'16), volume 9691 of Lecture Notes in Computer Science, pages 117--130, St Petersburg, Russia, June 2016. Springer.
doi: 10.1007/978-3-319-34171-2_9.
BibTex | DOI | Web page | PDF ]
[CC16]
J. Carmona and Th. Chatain. Anti-Alignments in Conformance Checking -- The Dark Side of Process Models. In Proceedings of the 37th International Conference on Applications and Theory of Petri Nets (PETRI NETS'16), volume 9698 of Lecture Notes in Computer Science, pages 240--258, Torún, Poland, June 2016. Springer.
doi: 10.1007/978-3-319-39086-4_15.
BibTex | DOI | Web page | PDF ]
[KGH+16a]
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, G. Chiardo, A. Hamez, L. Jezequel, A. Miner, J. Meijer, E. Paviot-Adet, D. Racordon, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, G. Trinh, and K. Wolf. Complete Results for the 2016 Edition of the Model Checking Contest, June 2016.
BibTex | Web page ]
[Cau16a]
R. Cauderlier. A Rewrite System for Proof Constructivization. In Proceedings of the 11th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'16), pages 2:1--2:7, Porto, Portugal, June 2016. ACM Press.
doi: 10.1007/978-3-319-40578-0_5.
BibTex | DOI | Web page | PDF ]
[LBB+16]
A. Linard, B. Barbot, D. Buchs, M. Colange, C. Démoulins, L. Hillah, and A. Martin. Layered Data: A Modular Formal Definition without Formalisms. In Proceedings of the 10th International Workshop on Petri Nets and Software Engineering (PNSE'16), volume 1591 of CEUR Workshop Proceedings, pages 287--306, Torun, Poland, June 2016. CEUR-WS.org.
BibTex | Web page | PDF ]
[BCEZ16]
T. Brough, L. Ciobanu, M. Elder, and G. Zetzsche. Permutations of context-free, ET0L and indexed languages. Discrete Mathematics & Theoretical Computer Science, 17(3):167--178, May 2016.
BibTex | Web page | PDF ]
[HT16a]
S. Haar and S. Theissing. A Passenger-centric Multi-agent System Model for Multimodal Public Transportation. Research Report hal-01322956, HAL-inria, May 2016. 12 pages.
BibTex | Web page | PDF ]
[FHLM16]
É. Fabre, L. Hélouët, E. Lefaucheux, and H. Marchand. Diagnosability of Repairable Faults. In Proceedings of the 13th Workshop on Discrete Event Systems (WODES'16), pages 230--236, Xi'an, China, May-June 2016. IEEE Control System Society.
doi: 10.1109/WODES.2016.7497853.
BibTex | DOI | Web page | PDF ]
[GR16]
G. Grefenstette and K. Rafes. Transforming Wikipedia into an Ontology-based Information Retrieval Search Engine for Local Experts using a Third-Party Taxonomy. In Proceedings of the Joint 2nd Workshop on Language and Ontology & Terminology and Knowledge Structures (LangOnto+TermiKS'16), Portorož, Slovenia, May 2016. To appear.
BibTex | Web page | PDF ]
[HBD16]
L. Hirschi, D. Baelde, and S. Delaune. A method for verifying privacy-type properties: the unbounded case. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P'16), pages 564--581, San Jose, California, USA, May 2016. IEEECSP.
doi: 10.1109/SP.2016.40.
BibTex | DOI | Web page | PDF ]
[GLSHHM16]
J. Goubault-Larrecq, P.-A. Sentucq, F. Hulin-Hubard, and F. Majorczyk. Etat final des travaux engagés sur Orchids. Rapport final et fourniture 4 du contrat DGA-INRIA Orchids, May 2016.
BibTex ]
[GLM16]
J. Goubault-Larrecq and F. Majorczyk. Génération de signatures pour le suivi de flux d'informations. Fourniture 3 du contrat DGA-INRIA Orchids, May 2016.
BibTex ]
[HHK+16b]
M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and É. Lozes. Two-Buffer Simulation Games. In Proceedings of the Cassting Workshop on Games for the Synthesis of Complex Systems and 3rd International Workshop on Synthesis of Complex Parameters (Cassting/SYNCOP'16), volume 220 of Electronic Proceedings in Theoretical Computer Science, pages 213--227, Eindhoven, The Netherlands, April 2016.
doi: 10.4204/EPTCS.220.3.
BibTex | DOI | Web page | PDF ]
[HT16c]
S. Haar and S. Theissing. Forecasting Passenger Loads in Transportation Networks. In Proceedings of the 8th International Workshop on Practical Applications of Stochastic Modelling (PASM'16), volume 327 of Electronic Notes in Theoretical Computer Science, pages 49--69, Münster, Germany, April 2016. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2016.09.023.
BibTex | DOI | Web page | PDF ]
[LACF16]
A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, and L. Fribourg. Control of Nonlinear Switched Systems Based on Validated Simulation. In Proceedings of the 2nd International Workshop on Symbolic and Numerical Methods for Reachability Analysis (SNR'16), pages 1--6, Vienna, Austria, April 2016. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[FGMP16]
L. Fribourg, É. Goubault, S. Mohamed, and S. Putot. A Topological Method for Finding Invariant Sets of Switched Systems. In Proceedings of the 19th ACM International Conference on Hybrid Systems: Computation and Control (HSCC'16), pages 61--70, Vienna, Austria, April 2016. ACM Press.
doi: 10.1145/2883817.2883822.
BibTex | DOI | Web page | PDF ]
[CCH+16]
D. Chistikov, W. Czerwiński, P. Hofman, M. Pilipczuk, and M. Wehar. Shortest paths in one-counter systems. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 462--478, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49630-5_27.
BibTex | DOI | Web page | PDF ]
[HLL+16]
P. Hofman, S. Lasota, R. Lazić, J. Leroux, S. Schmitz, and P. Totzke. Coverability Trees for Petri Nets with Unordered Data. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 445--461, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49630-5_26.
BibTex | DOI | Web page ]
[FG16]
M. Fortin and P. Gastin. Verification of parameterized communicating automata via split-width. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 197--213, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49630-5_12.
BibTex | DOI | Web page | PDF ]
[CDD16]
V. Cortier, A. Dallon, and S. Delaune. Bounding the number of agents, for equivalence too. In Proceedings of the 5th International Conference on Principles of Security and Trust (POST'16), volume 9635 of Lecture Notes in Computer Science, pages 211--232, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49635-0_11.
BibTex | DOI | Web page | PDF ]
[BFHH16a]
M. Blondin, A. Finkel, C. Haase, and S. Haddad. Approaching the Coverability Problem Continuously. In Proceedings of the 22th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'16), volume 9636 of Lecture Notes in Computer Science, pages 480--496, Eindhoven, The Netherlands, April 2016. Springer.
doi: 10.1007/978-3-662-49674-9_28.
BibTex | DOI | Web page | PDF ]
[BHJL16]
B. Bérard, S. Haddad, A. Jovanović, and D. Lime. Interrupt Timed Automata with Auxiliary Clocks and Parameters. Fundamenta Informaticae, 143(3-4):235--259, March 2016.
doi: 10.3233/FI-2016-1313.
BibTex | DOI | Web page | PDF ]
[BHL16a]
N. Bertrand, S. Haddad, and E. Lefaucheux. Accurate Approximate Diagnosability of Stochastic Systems. In Proceedings of the 10th International Conference on Language and Automata Theory and Applications (LATA'16), volume 9618 of Lecture Notes in Computer Science, pages 549--561, Prague, Czech Republic, March 2016. Springer.
doi: 10.1007/978-3-319-30000-9_42.
BibTex | DOI | Web page | PDF ]
[DD16a]
S. Demri and M. Deters. Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction. ACM Transactions on Computational Logic, 17(2):12:1--12:44, March 2016.
doi: 10.1145/2835490.
BibTex | DOI | Web page | PDF ]
[AD16a]
P. Arrighi and G. Dowek. Free fall and cellular automata. In Proceedings of the 11th International Workshop on Developments in Computational Models (DCM'15), volume 204 of Electronic Proceedings in Theoretical Computer Science, pages 1--10, Cali, Colombia, March 2016.
doi: 10.4204/EPTCS.204.1.
BibTex | DOI | Web page ]
[BGM16]
P. Bouyer, P. Gardy, and N. Markey. On the semantics of Strategy Logic. Information Processing Letters, 116(2):75--79, February 2016.
doi: 10.1016/j.ipl.2015.10.004.
BibTex | DOI | Web page | PDF ]
[HK16]
C. Haase and S. Kiefer. The Complexity of the Kth Largest Subset Problem and Related Problems. Information Processing Letters, 116(2):111--115, February 2016.
doi: 10.1016/j.ipl.2015.09.015.
BibTex | DOI | Web page | PDF ]
[LS16b]
J. Leroux and S. Schmitz. Ideal Decompositions for Vector Addition Systems. In Proceedings of the 33rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'16), volume 47 of Leibniz International Proceedings in Informatics, pages 1:1--1:13, Orléans, France, February 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2016.1.
BibTex | DOI | Web page ]
[Sch16b]
S. Schmitz. Complexity Hierarchies Beyond Elementary. ACM Transactions on Computation Theory, 8(1:3), February 2016.
doi: 10.1145/2858784.
BibTex | DOI | Web page ]
[HH16]
C. Haase and P. Hofman. Tightening the Complexity of Equivalence Problems for Commutative Grammars. In Proceedings of the 33rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'16), volume 47 of Leibniz International Proceedings in Informatics, pages 41:1--14, Orléans, France, February 2016. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2016.41.
BibTex | DOI | Web page | PDF ]
[KNS16]
P. Karandikar, M. Niewerth, and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords and superwords. Theoretical Computer Science, 610(A):91--107, January 2016.
doi: 10.1016/j.tcs.2015.09.028.
BibTex | DOI | Web page | PDF ]
[DD16b]
S. Demri and M. Deters. Temporal Logics on Strings with Prefix Relation. Journal of Logic and Computation, 26(3):989--1017, 2016.
doi: 10.1093/logcom/exv028.
BibTex | DOI | Web page | PDF ]
[BFHH16b]
M. Blondin, A. Finkel, C. Haase, and S. Haddad. QCover: an efficient coverability verifier for discrete and continuous Petri nets, 2016.
BibTex | Web page ]
[DH16]
S. Delaune and L. Hirschi. A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols. Journal of Logic and Algebraic Methods in Programming, 87:127--144, 2016. To appear.
doi: 10.1016/j.jlamp.2016.10.005.
BibTex | DOI | Web page | PDF ]
[JSD16]
F. Jacquemard, L. Segoufin, and J. Dimino. FO2(<, +1,) on data trees, data tree automata and branching vector addition systems. Logical Methods in Computer Science, 12(2):1--28, 2016.
doi: 10.2168/LMCS-12(2:3)2016.
BibTex | DOI | Web page | PDF ]
[GSSW16]
J. Goubault-Larrecq, M. Seisenberger, V. Selivanov, and A. Weiermann. Well Quasi-Orders in Computer Science (Dagstuhl Seminar 16031). Dagstuhl Reports, 6(1):69--98, January 2016.
doi: 10.4230/DagRep.6.1.69.
BibTex | DOI | Web page | PDF ]
[KGH+16b]
F. Kordon, H. Garavel, L. Hillah, E. Paviot-Adet, L. Jezequel, C. Rodríguez, and F. Hulin-Hubard. MCC'2015 - The Fifth Model Checking Contest. Transactions on Petri Nets and Other Models of Concurrency, 11:262--273, 2016.
doi: 10.1007/978-3-662-53401-4_12.
BibTex | DOI | Web page | PDF ]
[ADF+16]
P. A. Abdulla, S. Demri, A. Finkel, J. Leroux, and I. Potapov. Selected papers of Reachability Problems Workshop 2012 (Bordeaux) and 2013 (Uppsala). Fundamenta Informaticae, 143(3--4), 2016.
BibTex | Web page ]
[LDR+16]
A. Le Coënt, F. De Vuyst, C. Rey, L. Chamoin, and L. Fribourg. Control of mechanical systems using set-based methods. International Journal of Dynamics and Control, pages 1--17, 2016.
doi: 10.1007/s40435-016-0245-y.
BibTex | DOI | Web page | PDF ]
[DD16c]
A. Díaz-Caro and G. Dowek. Quantum superpositions and projective measurement in the lambda calculus. Research Report 1601.04294, Computing Research Repository, January 2016. 22 pages.
BibTex | Web page | PDF ]
[Chr16]
R. Chrétien. Analyse automatique de propriétés d'équivalence pour les protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2016.
BibTex | Web page | PDF ]
[Sch16a]
S. Schmitz. Automata column: The complexity of reachability in vector addition systems. SIGLOG News, 3(1):3--21, January 2016.
doi: 10.1145/2893582.2893585.
BibTex | DOI | Web page ]
[HOW16]
C. Haase, J. Ouaknine, and J. Worrell. Relating Reachability Problems in Timed and Counter Automata. Fundamenta Informaticae, 143(3-4):317--338, January 2016.
doi: 10.3233/FI-2016-1316.
BibTex | DOI | Web page | PDF ]
[Gou16c]
J. Goubault-Larrecq. Les méthodes formelles: l'autre arme de la cybersécurité. Encart dans l'article ”S'adapter à la cyberguerre”, de Karen Elazari, Pour La Science 459, January 2016.
BibTex ]
[ADJL16a]
A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu. Encoding Proofs in Dedukti: the case of Coq proofs. In Preliminary Proceedings of the 1st International Workshop on Hammers for Type Theories (HaTT'16), Coimbra, Portugal, 2016.
BibTex | Web page | PDF ]
[ADJL16b]
A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu. Untyped Confluence in Dependent Type Theories. In Proceedings of the 8th International Workshop on Higher-Order Rewriting (HOR'16), Porto, Portugal, 2016.
BibTex | Web page | PDF ]
[ABC+16]
A. Assaf, G. Burel, R. Cauderlier, D. Delahaye, G. Dowek, C. Dubois, F. Gilbert, P. Halmagrand, O. Hermant, and R. Saillard. Expressing theories in the λΠ-calculus modulo theory and in the Dedukti system. In Proceedings of the 22nd International Conference on Types for Proofs and Programs (TYPES'16), volume 97 of Leibniz International Proceedings in Informatics, Novi Sad, Serbia, 2016. Leibniz-Zentrum für Informatik. To appear.
BibTex ]
[Dow16]
G. Dowek. Rules and derivations in an elementary logic course. preprint, January 2016.
BibTex | Web page | PDF ]
[CDGH15]
K. Chatterjee, L. Doyen, H. Gimbert, and T. A. Henzinger. Randomness for free. Information and Computation, 245:3--16, December 2015.
doi: 10.1016/j.ic.2015.06.003.
BibTex | DOI | Web page | PDF ]
[LM15]
F. Laroussinie and N. Markey. Augmenting ATL with strategy contexts. Information and Computation, 245:98--123, December 2015.
doi: 10.1016/j.ic.2014.12.020.
BibTex | DOI | Web page | PDF ]
[GHKS15]
V. Germanos, S. Haar, V. Khomenko, and S. Schwoon. Diagnosability under Weak Fairness. ACM Transactions in Embedded Computing Systems, 14(4:69), December 2015.
doi: 10.1145/2832910.
BibTex | DOI | Web page | PDF ]
[BGH+15]
Th. Brihaye, G. Geeraerts, A. Haddad, E. Lefaucheux, and B. Monmege. Simple Priced Timed Games Are Not That Simple. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 278--292, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.278.
BibTex | DOI | Web page | PDF ]
[BHH+15]
S. Böhm, S. Haar, S. Haddad, P. Hofman, and S. Schwoon. Active Diagnosis with Observable Quiescence. In Proceedings of the 54th IEEE Conference on Decision and Control (CDC'15), pages 1663--1668, Osaka, Japan, December 2015. IEEE Control System Society.
doi: 10.1109/CDC.2015.7402449.
BibTex | DOI | Web page | PDF ]
[BV15b]
D. Berwanger and M. Van den Bogaard. Games with Delays. A Frankenstein Approach. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 307--319, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.307.
BibTex | DOI | Web page | PDF ]
[KS15a]
P. Karandikar and Ph. Schnoebelen. Decidability in the logic of subsequences and supersequences. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 84--97, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.84.
BibTex | DOI | Web page | PDF ]
[BGM15]
P. Bouyer, P. Gardy, and N. Markey. Weighted strategy logic with boolean goals over one-counter games. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 69--83, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2015.69.
BibTex | DOI | Web page | PDF ]
[Fra15b]
N. Francis. View-based Query Determinacy and Rewritings over Graph Databases. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2015.
BibTex | Web page ]
[FSS15]
N. Francis, L. Segoufin, and C. Sirangelo. Datalog Rewritings of Regular Path Queries using Views. Logical Methods in Computer Science, 11(4:14), December 2015.
doi: 10.2168/LMCS-11(4:14)2015.
BibTex | DOI | Web page | PDF ]
[Gon15]
M. González. Constructions d'Information Parfaite pour certains Jeux à Information Imparfaite. Quelques Algorithmes. Rapport de Master, Université Pierre et Marie Curie, Paris, France, December 2015.
BibTex ]
[ABV15]
S. Abiteboul, P. Bourhis, and V. Vianu. Highly Expressive Query Languages for Unordered Data Trees. Theory of Computing Systems, 57(4):927--966, November 2015.
doi: 10.1007/s00224-015-9617-5.
BibTex | DOI | Web page | PDF ]
[AAD+15]
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and P. Senellart. Optimal Probabilistic Generation of XML Documents. Theory of Computing Systems, 57(4):806--842, November 2015.
doi: 10.1007/s00224-014-9581-5.
BibTex | DOI | Web page | PDF ]
[MAS15]
D. Montoya, S. Abiteboul, and P. Senellart. Hup-Me: Inferring and Reconciling a Timeline of User Activity with Smartphone and Personal Data. In Proceedings of the 23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS'15), pages 62:1--4, Seattle, Washington, USA, November 2015.
doi: 10.1145/2820783.2820852.
BibTex | DOI | Web page | PDF ]
[CHH15]
D. Chistikov, C. Haase, and S. Halfon. Context-Free Commutative Grammars with Integer Counters and Resets. Research Report 1511-04893, Computing Research Repository, November 2015. 31 pages.
BibTex | Web page | PDF ]
[HT15]
S. Haar and S. Theissing. A Hybrid-Dynamical Model for Passenger-flow in Transportation Systems. In Proceedings of the 5th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'15), volume 48 of IFAC-PapersOnLine, pages 236--241, Atlanta, Georgia, USA, October 2015. Elsevier Science Publishers.
doi: 10.1016/j.ifacol.2015.11.181.
BibTex | DOI | Web page | PDF ]
[BMV15]
D. Berwanger, A. B. Mathew, and M. Van den Bogaard. Hierarchical Information Patterns and Distributed Strategy Synthesis. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15), volume 9364 of Lecture Notes in Computer Science, pages 378--393, Shanghai, China, October 2015. Springer.
doi: 10.1007/978-3-319-24953-7_28.
BibTex | DOI | Web page | PDF ]
[PRC+15]
H. Ponce de León, C. Rodríguez, J. Carmona, K. Heljanko, and S. Haar. Unfolding-Based Process Discovery. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15), volume 9364 of Lecture Notes in Computer Science, Shanghai, China, October 2015. Springer.
doi: 10.1007/978-3-319-24953-7_4.
BibTex | DOI | Web page | PDF ]
[Loz15]
É. Lozes. A Type-Directed Negation Elimination. In Proceedings of the 10th Workshop on Fixed Points in Computer Science (FICS'15), volume 191 of Electronic Proceedings in Theoretical Computer Science, pages 132--142, Berlin, Germany, September 2015.
doi: 10.4204/EPTCS.191.12.
BibTex | DOI | Web page | PDF ]
[Dal15]
A. Dallon. Verification of Cryptographic Protocols : a bound on the number of agents. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2015. 38 pages.
BibTex | Web page | PDF ]
[MDB15]
N. Markey, L. Doyen, and D. Berwanger. Models for large-scale systems. Cassting deliverable D1.3 (FP7-ICT-601148), September 2015. 17 pages.
BibTex | Web page | PDF ]
[MLB+15b]
A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and K. Barkaoui. State Space Reduction Strategie for Model Checking Concurrent C Programs. In Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems(VECoS'15), volume 1431 of CEUR Workshop Proceedings, pages 65--76, Bucharest, Romania, September 2015. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[CCD15c]
R. Chrétien, V. Cortier, and S. Delaune. From security protocols to pushdown automata. ACM Transactions on Computational Logic, 17(1:3), September 2015.
doi: 10.1145/2811262.
BibTex | DOI | Web page | PDF ]
[CCD15a]
R. Chrétien, V. Cortier, and S. Delaune. Checking trace equivalence: How to get rid of nonces? In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15), Lecture Notes in Computer Science, pages 230--251, Vienna, Austria, September 2015. Springer.
doi: 10.1007/978-3-319-24177-7_12.
BibTex | DOI | Web page | PDF ]
[FGM+15]
L. Fribourg, É. Goubault, S. Mohamed, M. Mrozek, and S. Putot. A Topological Method for Finding Invariants of Continuous Systems. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 63--75, Warsaw, Poland, September 2015. Springer.
doi: 10.1007/978-3-319-24537-9_7.
BibTex | DOI | Web page | PDF ]
[LS15a]
R. Lazić and S. Schmitz. The Ideal View on Rackoff's Coverability Technique. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 76--88, Warsaw, Poland, September 2015. Springer.
doi: 10.1007/978-3-319-24537-9_8.
BibTex | DOI | Web page | PDF ]
[BHP+15]
B. Bérard, S. Haddad, C. Picaronny, M. Safey El Din, and M. Sassolas. Polynomial Interrupt Timed Automata. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 20--32, Warsaw, Poland, September 2015. Springer.
doi: 10.1007/978-3-319-24537-9_3.
BibTex | DOI | Web page | PDF ]
[BFM15]
P. Bouyer, E. Fang, and N. Markey. Permissive strategies in timed automata and games. In Proceedings of the 15th International Workshop on Automated Verification of Critical Systems (AVoCS'15), volume 72 of Electronic Communications of the EASST, Edinburgh, UK, September 2015. European Association of Software Science and Technology.
doi: 10.14279/tuj.eceasst.72.1015.
BibTex | DOI | Web page | PDF ]
[Bol15c]
B. Bollig. Towards Formal Verification of Distributed Algorithms. In Proceedings of the 22nd International Symposium on Temporal Representation and Reasoning (TIME'15), page 3, Kassel, Germany, September 2015. IEEE Computer Society Press.
doi: 10.1109/TIME.2015.23.
BibTex | DOI | Web page | PDF ]
[RG15]
K. Rafes and C. Germain. A platform for scientific data sharing. In Actes de la 31ème Conférence sur la Gestion de Données -- Principes, Technologies et Applications (BDA'15), Île de Porquerolles, France, September 2015.
BibTex | Web page | PDF ]
[BMR+15]
P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and S. Laursen. Average-energy games. In Proceedings of the 6th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'15), volume 193 of Electronic Proceedings in Theoretical Computer Science, pages 1--15, Genova, Italy, September 2015.
doi: 10.4204/EPTCS.193.1.
BibTex | DOI | Web page | PDF ]
[LMS15]
F. Laroussinie, N. Markey, and A. Sangnier. ATL_sc with partial observation. In Proceedings of the 6th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'15), volume 193 of Electronic Proceedings in Theoretical Computer Science, pages 43--57, Genova, Italy, September 2015.
doi: 10.4204/EPTCS.193.4.
BibTex | DOI | Web page | PDF ]
[BDS15]
D. Baelde, A. Doumane, and A. Saurin. Least and Greatest Fixed Points in Ludics. In Proceedings of the 24th Annual EACSL Conference on Computer Science Logic (CSL'15), volume 41 of Leibniz International Proceedings in Informatics, pages 549--566, Berlin, Germany, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2015.549.
BibTex | DOI | Web page | PDF ]
[BMPS15]
P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber. Timed automata abstraction of switched dynamical systems using control funnels. In Proceedings of the 13th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268 of Lecture Notes in Computer Science, pages 60--75, Madrid, Spain, September 2015. Springer.
doi: 10.1007/978-3-319-22975-1_5.
BibTex | DOI | Web page | PDF ]
[AM15]
É. André and N. Markey. Language Preservation Problems in Parametric Timed Automata. In Proceedings of the 13th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268 of Lecture Notes in Computer Science, pages 27--43, Madrid, Spain, September 2015. Springer.
doi: 10.1007/978-3-319-22975-1_3.
BibTex | DOI | Web page | PDF ]
[ABG15]
C. Aiswarya, B. Bollig, and P. Gastin. An Automata-Theoretic Approach to the Verification of Distributed Algorithms. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 340--353, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2015.340.
BibTex | DOI | Web page | PDF ]
[BDH15]
D. Baelde, S. Delaune, and L. Hirschi. Partial Order Reduction for Security Protocols. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 497--510, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2015.497.
BibTex | DOI | Web page | PDF ]
[BJM15]
P. Bouyer, S. Jaziri, and N. Markey. On the Value Problem in Weighted Timed Games. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 311--324, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CONCUR.2015.311.
BibTex | DOI | Web page | PDF ]
[BDK15]
D. Baelde, S. Delaune, and S. Kremer. Decision procedures for equivalence based properties (part II). Deliverable VIP 3.2 (ANR-11-JS02-0006), September 2015. 9 pages.
BibTex | Web page | PDF ]
[DK15]
S. Delaune and S. Kremer. Composition results for equivalence-based security properties. Deliverable VIP 3.1 (ANR-11-JS02-0006), September 2015. 6 pages.
BibTex | Web page | PDF ]
[PS15]
Th. Place and L. Segoufin. Deciding definability in FO^2(<_h,<_v) on trees. Logical Methods in Computer Science, 11(3:5), September 2015.
doi: 10.2168/LMCS-11(3:5)2015.
BibTex | DOI | Web page | PDF ]
[DS15]
A. Dawar and L. Segoufin. Capturing MSO with one quantifier. In Fields of Logic and Computation II -- Essays Dedicated to Yuri Gurevich on the Occasion of His 75th Birthday, volume 9300 of Lecture Notes in Computer Science, pages 142--152. Springer, September 2015.
doi: 10.1007/978-3-319-23534-9_8.
BibTex | DOI | Web page | PDF ]
[Abi15]
S. Abiteboul. The Story of Webdamlog. In Proceedings of the 19th East-European Conference on Advances in Databases and Information Systems (ADBIS'15), Poitiers, France, September 2015.
BibTex | Web page | PDF ]
[For15]
M. Fortin. Verification of distributed systems with parameterized network topology. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2015.
BibTex ]
[LL15]
M. Lange and É. Lozes. Conjunctive Visibly-Pushdown Path Queries. In Proceedings of the 20th International Symposium on Fundamentals of Computation Theory (FCT'15), volume 9210 of Lecture Notes in Computer Science, pages 327--338, Gdańsk, Poland, August 2015. Springer.
doi: 10.1007/978-3-319-22177-9_25.
BibTex | DOI | Web page | PDF ]
[AGMK15]
S. Akshay, P. Gastin, M. Mukund, and K. N. Kumar. Checking conformance for time-constrained scenario-based specifications. Theoretical Computer Science, 594:24--43, August 2015.
doi: 10.1016/j.tcs.2015.03.030.
BibTex | DOI | Web page | PDF ]
[Bou15]
P. Bouyer. On the optimal reachability problem in weighted timed automata and games. In Proceedings of the 7th Workshop on Non-Classical Models of Automata and Applications (NCMA'15), volume 318 of books@ocg.at, pages 11--36, Porto, Portugal, August 2015. Austrian Computer Society.
BibTex | Web page | PDF ]
[Bol15a]
B. Bollig. Automata and Logics for Concurrent Systems: Five Models in Five Pages. In Proceedings of the 20th International Conference on Implementation and Application of Automata (CIAA'15), volume 9223 of Lecture Notes in Computer Science, pages 3--12, Umeå, Sweden, August 2015. Springer-Verlag.
doi: 10.1007/978-3-319-22360-5_1.
BibTex | DOI | Web page | PDF ]
[BBD+15]
P. Ballarini, B. Barbot, M. Duflot, S. Haddad, and N. Pekergin. HASL: A New Approach for Performance Evaluation and Model Checking from Concepts to Experimentation. Performance Evaluation, 90:53--77, August 2015.
doi: 10.1016/j.peva.2015.04.003.
BibTex | DOI | Web page | PDF ]
[Gou15b]
J. Goubault-Larrecq. Formal balls. Invited talk, Domains XII workshop, Cork, Ireland, August 2015.
BibTex ]
[Rei15]
J. Reichert. Décidabilité et complexité de jeux d'accessibilité sur des systèmes à compteurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2015.
BibTex | Web page | PDF ]
[BV15a]
D. Berwanger and M. Van den Bogaard. Consensus Game Acceptors. In Proceedings of the 19th International Conference on Developments in Language Theory (DLT'15), volume 9168 of Lecture Notes in Computer Science, pages 108--119, Liverpool, UK, July 2015. Springer.
doi: 10.1007/978-3-319-21500-6_8.
BibTex | DOI | Web page | PDF ]
[HPRV15]
S. Haar, S. Perchy, C. Rueda, and F. Valencia. An Algebraic View of SpaceashBelief and ExtrusionashUtterance for ConcurrencyashEpistemic Logic. In Proceedings of the 17th International Conference on Principles and Practice of Declarative Programming (PPDP'15), pages 161--172, Siena, Italy, July 2015. ACM Press.
doi: 10.1007/978-3-319-19488-2_6.
BibTex | DOI | Web page | PDF ]
[CDV15]
K. Chatterjee, L. Doyen, and M. Vardi. The Complexity of Synthesis from Probabilistic Components. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 108--120, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_9.
BibTex | DOI | Web page | PDF ]
[JLS15]
M. Jurdziński, R. Lazić, and S. Schmitz. Fixed-Dimensional Energy Games are in Pseudo Polynomial Time. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 260--272, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_21.
BibTex | DOI | Web page | PDF ]
[CCD15b]
R. Chrétien, V. Cortier, and S. Delaune. Decidability of trace equivalence for protocols with nonces. In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF'15), pages 170--184, Verona, Italy, July 2015. IEEE Computer Society Press.
doi: 10.1109/CSF.2015.19.
BibTex | DOI | Web page | PDF ]
[RRS15a]
M. Randour, J.-F. Raskin, and O. Sankur. Percentile Queries in Multi-Dimensional Markov Decision Processes. In Proceedings of the 27th International Conference on Computer Aided Verification (CAV'15) -- Part I, volume 9206 of Lecture Notes in Computer Science, pages 123--139, San Francisco, CA, USA, July 2015. Springer.
doi: 10.1007/978-3-319-21690-4_8.
BibTex | DOI | Web page | PDF ]
[HK15]
C. Haase and S. Kiefer. The Odds of Staying on Budget. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 234--246, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_19.
BibTex | DOI | Web page | PDF ]
[DGG15]
J. Dubut, É. Goubault, and J. Goubault-Larrecq. Natural Homology. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 171--183, Kyoto, Japan, July 2015. Springer.
doi: 10.1007/978-3-662-47666-6_14.
BibTex | DOI | Web page | PDF ]
[LS15c]
J. Leroux and S. Schmitz. Demystifying Reachability in Vector Addition Systems. In Proceedings of the 30th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'15), pages 56--67, Kyoto, Japan, July 2015. IEEE Press.
doi: 10.1109/LICS.2015.1.
BibTex | DOI | Web page | PDF ]
[BFG+15]
M. Blondin, A. Finkel, S. Göller, C. Haase, and P. McKenzie. Reachability in Two-Dimensional Vector Addition Systems with States is PSPACE-Complete. In Proceedings of the 30th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'15), pages 32--43, Kyoto, Japan, July 2015. IEEE Press.
doi: 10.1109/LICS.2015.14.
BibTex | DOI | Web page | PDF ]
[LS15b]
R. Lazić and S. Schmitz. Non-Elementary Complexities for Branching VASS, MELL, and Extensions. ACM Transactions on Computational Logic, 16(3:20), July 2015.
doi: 10.1145/2733375.
BibTex | DOI | Web page | PDF ]
[APS15]
K. Athanasiou, H. Ponce de León, and S. Schwoon. Test Case Generation for Concurrent Systems Using Event Structures. In Proceedings of the 9th International Conference on Tests and Proofs (TAP'15), volume 9154 of Lecture Notes in Computer Science, pages 19--37, L'Aquila, Italy, July 2015. Springer.
doi: 10.1007/978-3-319-21215-9_2.
BibTex | DOI | Web page | PDF ]
[BBMU15]
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Pure Nash Equilibria in Concurrent Games. Logical Methods in Computer Science, 11(2:9), June 2015.
doi: 10.2168/LMCS-11(2:9)2015.
BibTex | DOI | Web page | PDF ]
[CLMT15]
K. Chatterjee, S. Lafortune, N. Markey, and W. Thomas. Non-Zero-Sum-Games and Control (Dagstuhl Seminar 15061). Dagstuhl Reports, 5(2):1--25, June 2015.
doi: 10.4230/DagRep.5.2.1.
BibTex | DOI | Web page | PDF ]
[Bol15b]
B. Bollig. Automata and Logics for Concurrent Systems: Realizability and Verification. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, June 2015.
BibTex | Web page | PDF ]
[BHHP15]
B. Barbot, S. Haddad, M. Heiner, and C. Picaronny. Rare Event Handling in Signalling Cascades. International Journal on Advances in Systems and Measurements, 8(1-2):69--79, June 2015.
BibTex | Web page | PDF ]
[RNG15]
K. Rafes, J. Nauroy, and C. Germain. Certifying the interoperability of RDF database systems. In Proceedings of the 2nd Workshop on Linked Data Quality (LDQ'15), volume 1376 of CEUR Workshop Proceedings, Portorož, Slovenia, June 2015. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[ACR15]
É. André, Th. Chatain, and C. Rodríguez. Preserving Partial Order Runs in Parametric Time Petri Nets. In Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD'15), pages 120--129, Brussels, Belgium, June 2015. IEEE Computer Society Press.
doi: 10.1109/ACSD.2015.16.
BibTex | DOI | Web page | PDF ]
[CHKS15]
Th. Chatain, S. Haar, M. Koutny, and S. Schwoon. Non-Atomic Transition Firing in Contextual Nets. In Proceedings of the 36th International Conference on Applications and Theory of Petri Nets (PETRI NETS'15), volume 9115 of Lecture Notes in Computer Science, pages 117--136, Brussels, Belgium, June 2015. Springer.
doi: 10.1007/978-3-319-19488-2_6.
BibTex | DOI | Web page | PDF ]
[DDS15]
S. Demri, A. K. Dhar, and A. Sangnier. Taming Past LTL and Flat Counter Systems. Information and Computation, 242:306--339, June 2015.
doi: 10.1016/j.ic.2015.03.007.
BibTex | DOI | Web page | PDF ]
[CDRR15]
K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin. Looking at Mean-Payoff and Total-Payoff through Windows. Information and Computation, 242:25--52, June 2015.
doi: 10.1016/j.ic.2015.03.010.
BibTex | DOI | Web page | PDF ]
[BtCS15]
V. Bárány, B. ten Cate, and L. Segoufin. Guarded nagation. Journal of the ACM, 62(3:22), June 2015.
doi: 10.1145/2701414.
BibTex | DOI | Web page | PDF ]
[HM15]
S. Haar and R. Meyer, editors. Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD'15), Brussels, Belgium, June 2015. IEEE Computer Society Press.
BibTex | Web page ]
[KGH+15]
F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, A. Linard, M. Beccuti, A. Hamez, E. Lopez-Bobeda, L. Jezequel, J. Meijer, E. Paviot-Adet, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, and K. Wolf. Complete Results for the 2015 Edition of the Model Checking Contest, June 2015.
BibTex | Web page ]
[FL15]
A. Finkel and J. Leroux. Recent and simple algorithms for Petri nets. Software & System Modeling, 14(2):719--725, May 2015.
doi: 10.1007/s10270-014-0426-0.
BibTex | DOI | Web page | PDF ]
[KS15b]
P. Karandikar and Ph. Schnoebelen. Generalized Post Embedding Problems. Theory of Computing Systems, 56(4):697--716, May 2015.
doi: 10.1007/s00224-014-9561-9.
BibTex | DOI | Web page | PDF ]
[MD15]
N. Markey and A. Delaborde. Annual report for Year 2. Cassting deliverable D6.3 (FP7-ICT-601148), May 2015. 34 pages.
BibTex ]
[ADE+15]
S. Abiteboul, X. L. Dong, O. Etzioni, D. Srivastava, G. Weikum, J. Stoyanovich, and F. M. Suchanek. The elephant in the room: getting value from Big Data. In Proceedings of the 18th International Workshop on the Web and Databases (WebDB'15), pages 1--5, Melbourne, Australia, May 2015. ACM Press.
doi: 10.1145/2767109.2770014.
BibTex | DOI | Web page | PDF ]
[MSAM15]
V. Z. Moffitt, J. Stoyanovich, S. Abiteboul, and G. Miklau. Collaborative Access Control in WebdamLog. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'15), pages 197--211, Melbourne, Australia, May-June 2015. ACM Press.
doi: 10.1109/DSAA.2015.7344775.
BibTex | DOI | Web page | PDF ]
[AAK15]
S. Abiteboul, B. André, and D. Kaplan. Managing your digital life. Communications of the ACM, 58(5):32--35, May 2015.
doi: 10.1145/2670528.
BibTex | DOI | Web page | PDF ]
[GLSM15]
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Etat d'avancement intermédiaire des travaux engagés sur OrchIDS. Rapport intermédiaire du contrat DGA-INRIA Orchids, May 2015.
BibTex ]
[JKS15]
P. Jancar, P. Karandikar, and Ph. Schnoebelen. On Reachability for Unidirectional Channel Systems Extended with Regular Tests. Logical Methods in Computer Science, 11(2:2), April 2015.
doi: 10.2168/LMCS-11(2:2)2015.
BibTex | DOI | Web page | PDF ]
[KKS15]
P. Karandikar, M. Kufleitner, and Ph. Schnoebelen. On the index of Simon's congruence for piecewise testability. Information Processing Letters, 15(4):515--519, April 2015.
doi: 10.1016/j.ipl.2014.11.008.
BibTex | DOI | Web page | PDF ]
[FKM15]
L. Fribourg, U. Kühne, and N. Markey. Game-based Synthesis of Distributed Controllers for Sampled Switched Systems. In Proceedings of the 2nd International Workshop on Synthesis of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series in Informatics, pages 47--61, London, UK, April 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.SynCoP.2015.47.
BibTex | DOI | Web page | PDF ]
[LDR+15]
A. Le Coënt, F. De Vuyst, Ch. Rey, L. Chamoin, and L. Fribourg. Guaranteed control of switched control systems using model order reduction and state-space bisection. In Proceedings of the 2nd International Workshop on Synthesis of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series in Informatics, pages 32--46, London, UK, April 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.SynCoP.2015.32.
BibTex | DOI | Web page | PDF ]
[ACD15]
M. Arapinis, V. Cheval, and S. Delaune. Composing security protocols: from confidentiality to privacy. In Proceedings of the 4th International Conference on Principles of Security and Trust (POST'15), volume 9036 of Lecture Notes in Computer Science, pages 324--343, London, UK, April 2015. Springer.
doi: 10.1007/978-3-662-46666-7_17.
BibTex | DOI | Web page | PDF ]
[VCD+15]
Y. Velner, K. Chatterjee, L. Doyen, T. A. Henzinger, A. M. Rabinovich, and J.-F. Raskin. The complexity of multi-mean-payoff and multi-energy games. Information and Computation, 241:177--196, April 2015.
doi: 10.1016/j.ic.2015.03.001.
BibTex | DOI | Web page | PDF ]
[LV15]
É. Lozes and J. Villard. Shared contract-obedient channels. Science of Computer Programming, 100:28--60, March 2015.
doi: 10.1016/j.scico.2014.09.008.
BibTex | DOI | Web page | PDF ]
[GDML15]
G. Geeraerts, S. Dehouck, N. Markey, and K. G. Larsen. Efficient algorithms for multi-player games with quantitative aspects. Cassting deliverable D2.1 (FP7-ICT-601148), March 2015. 22 pages.
BibTex | Web page | PDF ]
[DD15b]
S. Demri and M. Deters. Two-variable separation logic and its inner circle. ACM Transactions on Computational Logic, 16(2:15), March 2015.
doi: 10.1145/2724711.
BibTex | DOI | Web page | PDF ]
[KV15]
A. Koutsos and V. Vianu. Process-Centric Views of Data-Driven Business Artifacts. In Proceedings of the 18th International Conference on Database Theory (ICDT'15), volume 31 of Leibniz International Proceedings in Informatics, pages 247--264, Brussels, Belgium, March 2015. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.ICDT.2015.247.
BibTex | DOI | Web page | PDF ]
[Fra15a]
N. Francis. Asymptotic Determinacy of Path Queries using Union-of-Paths Views. In Proceedings of the 18th International Conference on Database Theory (ICDT'15), volume 31 of Leibniz International Proceedings in Informatics, pages 44--59, Brussels, Belgium, March 2015. Leibniz-Zentrum für Informatik. Best student paper award.
doi: 10.4230/LIPIcs.ICDT.2015.44.
BibTex | DOI | Web page | PDF ]
[GJL15]
S. Göller, J. C. Jung, and M. Lohrey. The Complexity of Decomposing Modal and First-Order Theories. ACM Transactions on Computational Logic, 16(1:9), March 2015.
doi: 10.1145/2699918.
BibTex | DOI | Web page | PDF ]
[Seg15]
L. Segoufin. Constant Delay Enumeration for Conjunctive Queries. SIGMOD Records, 44(1):10--17, March 2015.
doi: 10.1145/2783888.2783894.
BibTex | DOI | Web page | PDF ]
[Kar15]
P. Karandikar. Subwords: automata, embedding problems, and verification. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Chennai Mathematical Institute, India, February 2015.
BibTex | Web page | PDF ]
[Gou15c]
J. Goubault-Larrecq. Full Abstraction for Non-Deterministic and Probabilistic Extensions of PCF I: the Angelic Cases. Journal of Logic and Algebraic Methods in Programming, 84(1):155--184, January 2015.
doi: 10.1016/j.jlamp.2014.09.003.
BibTex | DOI | Web page | PDF ]
[BMS15]
P. Bouyer, N. Markey, and O. Sankur. Robust Reachability in Timed Automata and Games: A Game-based Approach. Theoretical Computer Science, 563:43--74, January 2015.
doi: 10.1016/j.tcs.2014.08.014.
BibTex | DOI | Web page | PDF ]
[Gou15a]
J. Goubault-Larrecq. A short proof of the Schröder-Simpson theorem. Mathematical Structures in Computer Science, 25(1):1--5, January 2015.
doi: 10.1017/S0960129513000467.
BibTex | DOI | Web page | PDF ]
[KDH15]
M. Koutny, J. Desel, and S. Haddad, editors. Transactions on Petri Nets and Other Models of Concurrency X, volume 9410 of Lecture Notes in Computer Science. Springer, 2015.
BibTex | Web page ]
[MLB+15a]
A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and K. Barkaoui. Specifying and Verifying Concurrent C Programs with TLA+. In Proceedings of the 3rd International Workshop on Formal Techniques for Safety-Critical Systems, Nov. 2014 (FTSCS'14), volume 476 of Communications in Computer and Information Science, pages 206--222, Luxembourg, 2015. Springer.
doi: 10.1007/978-3-319-17581-2_14.
BibTex | DOI | Web page | PDF ]
[FH15]
E. Fraca and S. Haddad. Complexity Analysis of Continuous Petri Nets. Fundamenta Informaticae, 137(1):1--28, 2015.
doi: 10.3233/FI-2015-1168.
BibTex | DOI | Web page | PDF ]
[BH15]
N. Bertrand and S. Haddad. Contrôle, probabilités et observation partielle. In Informatique Mathématique. Une photographie en 2015, chapter 5, pages 177--227. CNRS Éditions, 2015.
BibTex | Web page | PDF ]
[Sce15]
G. Scerri. Proofs of security protocols revisited. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2015.
BibTex | Web page | PDF ]
[DD15a]
S. Demri and M. Deters. Separation Logics and Modalities: A Survey. Journal of Applied Non-Classical Logics, 25(1):50--99, 2015.
doi: 10.1080/11663081.2015.1018801.
BibTex | DOI | Web page | PDF ]
[RRS15b]
M. Randour, J.-F. Raskin, and O. Sankur. Variations on the Stochastic Shortest Path Problem. In Proceedings of the 16th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'15), volume 8931 of Lecture Notes in Computer Science, pages 1--18, Mumbai, India, January 2015. Springer.
doi: 10.1007/978-3-662-46081-8_1.
BibTex | DOI | Web page | PDF ]
[BFCH14]
M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and S. Haddad. Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis. The Computer Journal, 57(12):1870--1892, December 2014.
doi: 10.1093/comjnl/bxt134.
BibTex | DOI | Web page | PDF ]
[GLS14]
A. Gheerbrant, L. Libkin, and C. Sirangelo. Naïve Evaluation of Queries over Incomplete Databases. ACM Transactions on Database Systems, 39(4:31), December 2014.
doi: 10.1145/2691190.2691194.
BibTex | DOI | Web page | PDF ]
[Sir14]
C. Sirangelo. Representing and querying incomplete information: a data interoperability perspective. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2014.
BibTex | Web page | PDF ]
[LLV14]
M. Lange, É. Lozes, and M. Vargas Guzmán. Model-checking process equivalences. Theoretical Computer Science, 560(3):326--347, December 2014.
doi: 10.1016/j.tcs.2014.08.020.
BibTex | DOI | Web page | PDF ]
[BHLM14]
B. Bollig, P. Habermehl, M. Leucker, and B. Monmege. A Robust Class of Data Languages and an Application to Learning. Logical Methods in Computer Science, 10(4:19), December 2014.
doi: 10.2168/LMCS-10(4:19)2014.
BibTex | DOI | Web page | PDF ]
[HSS14]
C. Haase, S. Schmitz, and Ph. Schnoebelen. The Power of Priority Channel Systems. Logical Methods in Computer Science, 10(4:4), December 2014.
doi: 10.2168/LMCS-10(4:4)2014.
BibTex | DOI | Web page | PDF ]
[AG14]
C. Aiswarya and P. Gastin. Reasoning about distributed systems: WYSIWYG. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 11--30, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.11.
BibTex | DOI | Web page | PDF ]
[BHL14]
N. Bertrand, S. Haddad, and E. Lefaucheux. Foundation of Diagnosis and Predictability in Probabilistic Systems. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 417--429, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.417.
BibTex | DOI | Web page | PDF ]
[BGK14]
B. Bollig, P. Gastin, and A. Kumar. Parameterized Communicating Automata: Complementation and Model Checking. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 625--637, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.625.
BibTex | DOI | Web page | PDF ]
[CMS14]
R. Chadha, U. Mathur, and S. Schwoon. Computing Information Flow Using Symbolic Model-Checking. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 505--516, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.505.
BibTex | DOI | Web page | PDF ]
[DFM14]
C. David, N. Francis, and F. Murlak. Consistency of injective tree patterns. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 279--290, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.279.
BibTex | DOI | Web page | PDF ]
[DJL+14]
L. Doyen, L. Juhl, K. G. Larsen, N. Markey, and M. Shirmohammadi. Synchronizing words for weighted and timed automata. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 121--132, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.121.
BibTex | DOI | Web page | PDF ]
[BMS14]
P. Bouyer, N. Markey, and D. Stan. Mixed Nash Equilibria in Concurrent Games. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 351--363, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2014.351.
BibTex | DOI | Web page | PDF ]
[BBB+14]
N. Bertrand, P. Bouyer, Th. Brihaye, Q. Menet, C. Baier, M. Größer, and M. Jurdziński. Stochastic Timed Automata. Logical Methods in Computer Science, 10(4:6), December 2014.
doi: 10.2168/LMCS-10(4:6)2014.
BibTex | DOI | Web page | PDF ]
[BCGZ14]
B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun. Temporal logics for concurrent recursive programs: Satisfiability and model checking. Journal of Applied Logic, 12(4):395--416, December 2014.
doi: 10.1016/j.jal.2014.05.001.
BibTex | DOI | Web page | PDF ]
[CDR14]
V. Cheval, S. Delaune, and M. D. Ryan. Tests for establishing security properties. In Revised Selected Papers of the 9th Symposium on Trustworthy Global Computing (TGC'14), volume 8902 of Lecture Notes in Computer Science, pages 82--96, Rome, Italy, December 2014. Springer.
doi: 10.1007/978-3-662-45917-1_6.
BibTex | DOI | Web page | PDF ]
[FKS14]
L. Fribourg, U. Kühne, and R. Soulat. Finite Controlled Invariants for Sampled Switched Systems. Formal Methods in System Design, 45(3):303--329, December 2014.
doi: 10.1007/s10703-014-0211-2.
BibTex | DOI | Web page | PDF ]
[LM14]
F. Laroussinie and N. Markey. Quantified CTL: Expressiveness and Complexity. Logical Methods in Computer Science, 10(4:17), December 2014.
doi: 10.2168/LMCS-10(4:17)2014.
BibTex | DOI | Web page | PDF ]
[Shi14]
M. Shirmohammadi. Qualitative Analysis of Synchronizing Probabilistic Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Université Libre de Bruxelles, Belgium, December 2014.
BibTex | Web page | PDF ]
[Gou14a]
J. Goubault-Larrecq. Détection d'intrusions avec OrchIDS. Matinale de l'innovation Logiciels Libres et Sécurité, Paris, France, December 2014.
BibTex ]
[GPPS14]
C. Gardent, G. Perrier, Y. Parmentier, and S. Schmitz. Lexical Disambiguation in LTAG using Left Context. In Proceedings of the 5th Language & Technology Conference (LTC'11), volume 8387 of Lecture Notes in Artificial Intelligence, Poznań, Poland, November 2014. Springer.
BibTex | Web page ]
[BC14]
G. Bana and H. Comon-Lundh. A Computationally Complete Symbolic Attacker for Equivalence Properties. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14), pages 609--620, Scottsdale, Arizona, USA, November 2014. ACM Press.
doi: 10.1145/2660267.2660276.
BibTex | DOI | Web page | PDF ]
[Pon14]
H. Ponce de León. Testing Concurrent Systems Through Event Structures. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2014.
BibTex | Web page | PDF ]
[Bar14]
B. Barbot. Acceleration for Statistical Model Checking. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2014.
BibTex | Web page | PDF ]
[CHJ+14]
Th. Chatain, S. Haar, L. Jezequel, L. Paulevé, and S. Schwoon. Characterization of Reachable Attractors Using Petri Net Unfoldings. In Proceedings of the 12th Conference on Computational Methods in System Biology (CMSB'14), volume 8859 of Lecture Notes in Bioinformatics, pages 129--142, Manchester, UK, November 2014. Springer-Verlag.
doi: 10.1007/978-3-319-12982-2_10.
BibTex | DOI | Web page | PDF ]
[PHL14b]
H. Ponce de León, S. Haar, and D. Longuet. Model-Based Testing for Concurrent Systems with Labeled Event Structures. Software Testing, Verification and Reliability, 24(7):558--590, November 2014.
doi: 10.1002/stvr.1543.
BibTex | DOI | Web page | PDF ]
[AGNK14]
C. Aiswarya, P. Gastin, and K. Narayan Kumar. Verifying Communicating Multi-pushdown Systems via Split-width. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 1--17, Sydney, Australia, November 2014. Springer.
doi: 10.1007/978-3-319-11936-6_1.
BibTex | DOI | Web page | PDF ]
[BGM14]
P. Bouyer, P. Gardy, and N. Markey. Quantitative verification of weighted Kripke structures. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 64--80, Sydney, Australia, November 2014. Springer.
doi: 10.1007/978-3-319-11936-6_6.
BibTex | DOI | Web page | PDF ]
[MV14b]
N. Markey and S. Vester. Symmetry Reduction in Infinite Games with Finite Branching. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 281--296, Sydney, Australia, November 2014. Springer.
doi: 10.1007/978-3-319-11936-6_21.
BibTex | DOI | Web page | PDF ]
[ACD14]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Information and Computation, 238:30--67, November 2014.
doi: 10.1016/j.ic.2014.07.004.
BibTex | DOI | Web page | PDF ]
[BCD14]
S. Bursuc, H. Comon-Lundh, and S. Delaune. Deducibility constraints and blind signatures. Information and Computation, 238:106--127, November 2014.
doi: 10.1016/j.ic.2014.07.006.
BibTex | DOI | Web page | PDF ]
[KNS14]
P. Karandikar, M. Niewerth, and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords. Research Report 1406.0690, Computing Research Repository, November 2014. 24 pages.
BibTex | Web page | PDF ]
[MCGS14]
N. Markey, N. Chaturvedi, G. Geeraerts, and J. Srba. Efficient strategy synthesis for complex objectives. Cassting deliverable D2.4 (FP7-ICT-601148), October 2014. 20 pages.
BibTex | Web page | PDF ]
[BHHP14]
B. Barbot, S. Haddad, M. Heiner, and C. Picaronny. Rare Event Handling in Signalling Cascades. In Proceedings of the 6th International Conference on Advances in System Simulation (SIMUL'14), pages 126--131, Nice, France, October 2014. XPS.
BibTex | Web page | PDF ]
[AFG14]
S. Abiteboul, L. Fribourg, and J. Goubault-Larrecq. Gérard Berry : un informaticien médaille d'or du CNRS 2014. 1024 -- Bulletin de la société informatique de France, 4:139--142, October 2014.
BibTex | Web page | PDF ]
[MA14]
D. Montoya and S. Abiteboul. Inférence d'itinéraires multimodaux à partir de données smartphone. In Actes de la 30ème Conférence sur la Gestion de Données -- Principes, Technologies et Applications (BDA'14), pages 38--42, Autrans, France, October 2014.
BibTex | Web page | PDF ]
[Lef14]
E. Lefaucheux. Détection de fautes dans les systèmes probabilistes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 35 pages.
BibTex | Web page | PDF ]
[Dub14]
J. Dubut. Homologie dirigée. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 35 pages.
BibTex | Web page | PDF ]
[Hal14]
S. Halfon. Non Primitive Recursive Complexity Classes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 21 pages.
BibTex | Web page | PDF ]
[DDS14]
S. Demri, A. K. Dhar, and A. Sangnier. Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 85--97, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_7.
BibTex | DOI | Web page | PDF ]
[CD14c]
R. Chrétien and S. Delaune. Le bitcoin, une monnaie 100% numérique. Interstices, September 2014.
BibTex | Web page | PDF ]
[Sch14a]
S. Schmitz. Complexity Bounds for Ordinal-Based Termination. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 1--19, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_1.
BibTex | DOI | Web page | PDF ]
[BGS14]
B. Bollig, P. Gastin, and J. Schubert. Parameterized Verification of Communicating Automata under Context Bounds. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 45--57, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_4.
BibTex | DOI | Web page | PDF ]
[HM14]
S. Haddad and B. Monmege. Reachability in MDPs: Refining Convergence of Value Iteration. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 125--137, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_10.
BibTex | DOI | Web page | PDF ]
[LS14b]
J. Leroux and Ph. Schnoebelen. On Functions Weakly Computable by Petri Nets and Vector Addition Systems. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 190--202, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_15.
BibTex | DOI | Web page | PDF ]
[HH14]
C. Haase and S. Halfon. Integer Vector Addition Systems with States. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 112--124, Oxford, UK, September 2014. Springer.
doi: 10.1007/978-3-319-11439-2_9.
BibTex | DOI | Web page | PDF ]
[BMP14]
L. Brandán Briones, A. Madalinski, and H. Ponce de León. Distributed Diagnosability Analysis with Petri Nets. In Proceedings of the 25th International Workshop on Principles of Diagnosis (DX'14), Graz, Austria, September 2014.
BibTex | Web page | PDF ]
[CGNK14]
A. Cyriac, P. Gastin, and K. Narayan Kumar. Controllers for the Verification of Communicating Multi-Pushdown Systems. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 297--311, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_21.
BibTex | DOI | Web page | PDF ]
[CCD14]
R. Chrétien, V. Cortier, and S. Delaune. Typing messages for free in security protocols: the case of equivalence properties. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 372--386, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_26.
BibTex | DOI | Web page | PDF ]
[DMS14b]
L. Doyen, Th. Massart, and M. Shirmohammadi. Robust Synchronization in Markov Decision Processes. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 234--248, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_17.
BibTex | DOI | Web page | PDF ]
[BMM14]
P. Bouyer, N. Markey, and R. M. Matteplackel. Averaging in LTL. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 266--280, Rome, Italy, September 2014. Springer.
doi: 10.1007/978-3-662-44584-6_19.
BibTex | DOI | Web page | PDF ]
[PHL14a]
H. Ponce de León, S. Haar, and D. Longuet. Distributed testing of concurrent systems: vector clocks to the rescue. In Proceedings of the 11th International Colloquium on Theoretical Aspects of Computing (ICTAC'14), volume 8687 of Lecture Notes in Computer Science, pages 369--387, Bucharest, Romania, September 2014. Springer.
doi: 10.1007/978-3-319-10882-7_22.
BibTex | DOI | Web page | PDF ]
[Dou14]
A. Doumane. Études des automates en ludique. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014.
BibTex ]
[Gou14c]
J. Goubault-Larrecq. Noetherian spaces. Invited talk, Continuity, Computability, Constructivity workshop (CCC), Ljubljana, Slovenia, September 2014.
BibTex ]
[Jaz14]
S. Jaziri. Robustness issues in priced timed automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014.
BibTex ]
[CS14]
J.-B. Courtois and S. Schmitz. Alternating Vector Addition Systems with States. In Proceedings of the 39th International Symposium on Mathematical Foundations of Computer Science (MFCS'14) -- Part I, volume 8634 of Lecture Notes in Computer Science, pages 220--231, Budapest, Hungary, August 2014. Springer.
doi: 10.1007/978-3-662-44522-8_19.
BibTex | DOI | Web page | PDF ]
[KS14]
P. Karandikar and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords. In Proceedings of the 16th Workshop on Descriptional Complexity of Formal Systems (DCFS'14), volume 8614 of Lecture Notes in Computer Science, pages 234--245, Turku, Finland, August 2014. Springer-Verlag.
doi: 10.1007/978-3-319-09704-6_21.
BibTex | DOI | Web page | PDF ]
[SLS+14]
Y. Sun, G. Lipari, R. Soulat, L. Fribourg, and N. Markey. Component-Based Analysis of Hierarchical Scheduling using Linear Hybrid Automata. In Proceedings of the 20th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'14), Chongqing, China, August 2014. IEEE Computer Society Press.
doi: 10.1109/RTCSA.2014.6910502.
BibTex | DOI | Web page | PDF ]
[DD14a]
S. Demri and M. Deters. The effects of modalities in separation logics (extended abstract). In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'14), pages 134--138, Groningen, The Netherlands, August 2014. College Publications.
BibTex | Web page | PDF ]
[DKW14]
S. Demri, D. Kapur, and C. Weidenbach, editors. Proceedings of the 7th International Joint Conference on Automated Reasoning (IJCAR'14), volume 8562 of Lecture Notes in Computer Science, Vienna, Austria, July 2014. Springer.
BibTex | Web page ]
[CKM14]
M. Cadilhac, A. Krebs, and P. McKenzie. Extremely uniform branching programs. In Proceedings of the 6th Workshop on Non-Classical Models of Automata and Applications (NCMA'14), volume 304 of books@ocg.at, pages 73--83, Kassel, Germany, July 2014. Austrian Computer Society.
BibTex | Web page | PDF ]
[BFS14]
F. Bouchy, A. Finkel, and P. San Pietro. Dense-choice Counter Machines Revisited. Theoretical Computer Science, 542:17--31, July 2014.
doi: 10.1016/j.tcs.2014.04.029.
BibTex | DOI | Web page | PDF ]
[CD14a]
K. Chatterjee and L. Doyen. Games with a Weak Adversary. In Proceedings of the 41st International Colloquium on Automata, Languages and Programming (ICALP'14) -- Part II, volume 8573 of Lecture Notes in Computer Science, pages 110--121, Copenhagen, Denmark, July 2014. Springer.
doi: 10.1007/978-3-662-43951-7_10.
BibTex | DOI | Web page | PDF ]
[BFM14]
M. Blondin, A. Finkel, and P. McKenzie. Handling Infinitely Branching WSTS. In Proceedings of the 41st International Colloquium on Automata, Languages and Programming (ICALP'14) -- Part II, volume 8573 of Lecture Notes in Computer Science, pages 13--25, Copenhagen, Denmark, July 2014. Springer.
doi: 10.1007/978-3-662-43951-7_2.
BibTex | DOI | Web page | PDF ]
[DD14b]
S. Demri and M. Deters. Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603142.
BibTex | DOI | Web page | PDF ]
[BGMZ14a]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Logical Characterization of Weighted Pebble Walking Automata. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603118.
BibTex | DOI | Web page | PDF ]
[Haa14]
C. Haase. Subclasses of Presburger Arithmetic and the Weak EXP Hierarchy. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603092.
BibTex | DOI | Web page | PDF ]
[Bol14]
B. Bollig. Logic for Communicating Automata with Parameterized Topology. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603093.
BibTex | DOI | Web page | PDF ]
[Sch14b]
S. Schmitz. Implicational Relevance Logic is 2-ExpTime-Complete. In Proceedings of the Joint 25th International Conference on Rewriting Techniques and Applications and 12th International Conference on Typed Lambda-Calculi and Applications (RTA/ TLCA'14), volume 8560 of Lecture Notes in Computer Science, pages 395--409, Vienna, Austria, July 2014. Springer.
doi: 10.1007/978-3-319-08918-8_27.
BibTex | DOI | Web page | PDF ]
[LS14a]
R. Lazić and S. Schmitz. Non-Elementary Complexities for Branching VASS, MELL, and Extensions. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press.
doi: 10.1145/2603088.2603129.
BibTex | DOI | Web page | PDF ]
[Gou14d]
J. Goubault-Larrecq. OrchIDS: on the value of rigor in intrusion detection. CPS Summer School, Grenoble, France, July 2014.
BibTex ]
[DSS14]
A. Durand, N. Schweikardt, and L. Segoufin. Enumerating answers to first-order queries over databases of low degree. In Proceedings of the 33rd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'14), pages 121--131, Snowbird, Utah, USA, June 2014. ACM Press.
doi: 10.1145/2594538.2594539.
BibTex | DOI | Web page | PDF ]
[JLMX14]
S. Jaziri, K. G. Larsen, R. Mardare, and B. Xue. Adequacy and Complete Axiomatization for Timed Modal Logic. In Proceedings of the 30th Conference on Mathematical Foundations of Programming Semantics (MFPS'14), volume 308 of Electronic Notes in Theoretical Computer Science, pages 183--210, Ithaca, New York, USA, June 2014. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2014.10.011.
BibTex | DOI | Web page | PDF ]
[GJ14]
J. Goubault-Larrecq and A. Jung. QRB, QFS, and the Probabilistic Powerdomain. In Proceedings of the 30th Conference on Mathematical Foundations of Programming Semantics (MFPS'14), volume 308 of Electronic Notes in Theoretical Computer Science, pages 167--182, Ithaca, New York, USA, June 2014. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2014.10.010.
BibTex | DOI | Web page | PDF ]
[ADK14]
M. Arapinis, S. Delaune, and S. Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, 10(2:11), June 2014.
doi: 10.2168/LMCS-10(2:11)2014.
BibTex | DOI | Web page | PDF ]
[FL14]
A. Finkel and J. Leroux. Neue, einfache Algorithmen für Petrinetze. Informatik Spektrum, 37(3):229--236, June 2014.
doi: 10.1007/s00287-013-0753-5.
BibTex | DOI | Web page | PDF ]
[KH14]
F. Kordon and F. Hulin-Hubard. BenchKit, a Tool for Massive Concurrent Benchmarking. In Proceedings of the 14th International Conference on Application of Concurrency to System Design (ACSD'14), pages 159--165, Tunis, Tunisia, June 2014. IEEE Computer Society Press.
doi: 10.1109/ACSD.2014.12.
BibTex | DOI | Web page | PDF ]
[GHKS14]
V. Germanos, S. Haar, V. Khomenko, and S. Schwoon. Diagnosability under Weak Fairness. In Proceedings of the 14th International Conference on Application of Concurrency to System Design (ACSD'14), pages 132--141, Tunis, Tunisia, June 2014. IEEE Computer Society Press.
doi: 10.1109/ACSD.2014.9.
BibTex | DOI | Web page | PDF ]
[DGLWM14]
S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Méry. Separation Logic with One Quantified Variable. In Proceedings of the 9th International Computer Science Symposium in Russia (CSR'14), volume 8476 of Lecture Notes in Computer Science, pages 125--138, Moscow, Russia, June 2014. Springer.
doi: 10.1007/978-3-319-06686-8_10.
BibTex | DOI | Web page | PDF ]
[Gou14b]
J. Goubault-Larrecq. Exponentiable streams and prestreams. Applied Categorical Structures, 22(3):515--549, June 2014.
doi: 10.1007/s10485-013-9315-x.
BibTex | DOI | Web page | PDF ]
[KGH+14]
F. Kordon, H. Garavel, L.-M. Hillah, F. Hulin-Hubard, A. Linard, M. Beccuti, S. Evangelista, A. Hamez, N. Lohmann, E. Lopez, E. Paviot-Adet, C. Rodriguez, C. Rohr, and J. Srba. Results for the MCC @ Petri Nets 2014, June 2014.
BibTex | Web page ]
[FFL+14]
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Correct-by-design Control Synthesis for Multilevel Converters using State Space Decomposition. In Proceedings of the 2nd French-Singaporean Workshop on Formal Methods and Applications (FSFMA'14), volume 156 of Electronic Proceedings in Theoretical Computer Science, pages 5--16, Singapore, May 2014.
doi: 10.4204/EPTCS.156.5.
BibTex | DOI | Web page | PDF ]
[MV14a]
N. Markey and S. Valette. Annual report for Year 1. Cassting deliverable D6.2 (FP7-ICT-601148), May 2014. 38 pages.
BibTex ]
[GM14]
P. Gastin and B. Monmege. Adding Pebbles to Weighted Automata -- Easy Specification & Efficient Evaluation. Theoretical Computer Science, 534:24--44, May 2014.
doi: 10.1016/j.tcs.2014.02.034.
BibTex | DOI | Web page | PDF ]
[GLSM14b]
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Techniques et méthodes de génération de signatures pour la détection d'intrusions. Fourniture 2 du contrat DGA-INRIA Orchids, May 2014.
BibTex ]
[GLSM14a]
J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Politiques de sécurité système. Fourniture 1 du contrat DGA-INRIA Orchids, May 2014.
BibTex ]
[SLAF14]
Y. Sun, G. Lipari, É. André, and L. Fribourg. Toward Parametric Timed Interfaces for Real-Time Components. In Proceedings of the 1st International Workshop on Synthesis of Continuous Parameters (SYNCOP'14), volume 145 of Electronic Proceedings in Theoretical Computer Science, pages 49--64, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.145.6.
BibTex | DOI | Web page | PDF ]
[CD14b]
K. Chatterjee and L. Doyen. Partial-Observation Stochastic Games: How to Win when Belief Fails. ACM Transactions on Computational Logic, 15(2:16), April 2014.
doi: 10.1145/2579819.
BibTex | DOI | Web page | PDF ]
[SL14]
Y. Sun and G. Lipari. A Weak Simulation Relation for Real-Time Schedulability Analysis of Global Fixed Priority Scheduling Using Linear Hybrid Automata. Research Report LSV-14-06, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2014. 17 pages.
BibTex | Web page | PDF ]
[CDNV14]
K. Chatterjee, L. Doyen, S. Nain, and M. Y. Vardi. The Complexity of Partial-Observation Stochastic Parity Games with Finite-Memory Strategies. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 242--257, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_16.
BibTex | DOI | Web page | PDF ]
[CDGO14]
K. Chatterjee, L. Doyen, H. Gimbert, and Y. Oualhadj. Perfect-Information Stochastic Mean-Payoff Parity Games. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 210--225, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_4.
BibTex | DOI | Web page | PDF ]
[DMS14a]
L. Doyen, Th. Massart, and M. Shirmohammadi. Limit Synchronization in Markov Decision Processes. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 58--72, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_4.
BibTex | DOI | Web page | PDF ]
[Mar14]
N. Markey. Cassting: Synthesizing Complex Systems Using Non-Zero-Sum Games. ERCIM News, 97:25--26, April 2014.
BibTex | Web page | PDF ]
[BDH14]
D. Baelde, S. Delaune, and L. Hirschi. A reduced semantics for deciding trace equivalence using constraint systems. In Proceedings of the 3rd International Conference on Principles of Security and Trust (POST'14), volume 8414 of Lecture Notes in Computer Science, pages 1--21, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54792-8_1.
BibTex | DOI | Web page | PDF ]
[BM14a]
D. Berwanger and A. B. Mathew. Games with Recurring Certainty. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 91--96, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.146.12.
BibTex | DOI | Web page | PDF ]
[CDFR14b]
K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin. Doomsday Equilibria for Omega-Regular Games. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 43--48, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.146.6.
BibTex | DOI | Web page | PDF ]
[BMV14]
P. Bouyer, N. Markey, and S. Vester. Nash Equilibria in Symmetric Games with Partial Observation. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 49--55, Grenoble, France, April 2014.
doi: 10.4204/EPTCS.146.7.
BibTex | DOI | Web page | PDF ]
[AGH+14]
T. Antonopoulos, N. Gorogiannis, C. Haase, M. Kanovich, and J. Ouaknine. Foundations for Decision Problems in Separation Logic with General Inductive Predicates. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 411--425, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_27.
BibTex | DOI | Web page | PDF ]
[BFH+14]
N. Bertrand, É. Fabre, S. Haar, S. Haddad, and L. Hélouët. Active diagnosis for probabilistic systems. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 29--42, Grenoble, France, April 2014. Springer.
doi: 10.1007/978-3-642-54830-7_4.
BibTex | DOI | Web page | PDF ]
[ABG+14b]
S. Akshay, B. Bollig, P. Gastin, M. Mukund, and K. Narayan Kumar. Distributed Timed Automata with Independently Evolving Clocks. Fundamenta Informaticae, 130(4):377--407, April 2014.
doi: 10.3233/FI-2014-996.
BibTex | DOI | Web page | PDF ]
[BGMZ14b]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Pebble Weighted Automata and Weighted Logics. ACM Transactions on Computational Logic, 15(2:15), April 2014.
doi: 10.1145/2579819.
BibTex | DOI | Web page | PDF ]
[MBL14]
N. Markey, Th. Brihaye, and K. G. Larsen. Robustness of collective adaptive systems. Cassting deliverable D3.1 (FP7-ICT-601148), March 2014. 17 pages.
BibTex | Web page | PDF ]
[BM14b]
Th. Brihaye and N. Markey. Solution concepts for collective adaptive systems. Cassting deliverable D1.4 (FP7-ICT-601148), March 2014. 13 pages.
BibTex | Web page | PDF ]
[Seg14]
L. Segoufin. A glimpse on constant delay enumeration. In Proceedings of the 31st Annual Symposium on Theoretical Aspects of Computer Science (STACS'14), volume 25 of Leibniz International Proceedings in Informatics, pages 13--27, Lyon, France, March 2014. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2014.13.
BibTex | DOI | Web page | PDF ]
[ADV14]
S. Abiteboul, D. Deutch, and V. Vianu. Deduction with Contradictions in Datalog. In Proceedings of the 17th International Conference on Database Theory (ICDT'14), pages 143--154, Athens, Greece, March 2014.
doi: 10.5441/002/icdt.2014.17.
BibTex | DOI | Web page | PDF ]
[EM14]
Y. Elias and P. McKenzie. On Generalized Addition Chains. INTEGERS -- Electronic Journal of Combinatorial Number Theory, 14(A16), March 2014.
BibTex | Web page | PDF ]
[FSS14]
N. Francis, L. Segoufin, and C. Sirangelo. Datalog Rewritings of Regular Path Queries using Views. In Proceedings of the 17th International Conference on Database Theory (ICDT'14), pages 107--118, Athens, Greece, March 2014.
doi: 10.5441/002/icdt.2014.14.
BibTex | DOI | Web page | PDF ]
[BLM14]
P. Bouyer, K. G. Larsen, and N. Markey. Lower-Bound Constrained Runs in Weighted Timed Automata. Performance Evaluation, 73:91--109, March 2014.
doi: 10.1016/j.peva.2013.11.002.
BibTex | DOI | Web page | PDF ]
[HHM14]
S. Haddad, R. Hennicker, and M. H. Møller. Specification of Asynchronous Component Systems with Modal IashO-Petri Nets. In Revised Selected Papers of the 8th Symposium on Trustworthy Global Computing (TGC'13), volume 8358 of Lecture Notes in Computer Science, pages 219--234, Buenos Aires, Argentina, March 2014. Springer.
doi: 10.1007/978-3-319-05119-2_13.
BibTex | DOI | Web page | PDF ]
[Fin14]
A. Finkel. REACHARD -- Compte-rendu intermédiaire. Deliverable D3 Reachard (ANR-11-BS02-001), February 2014. 18 pages.
BibTex ]
[Bra14]
J. Brault-Baron. Hypergraph Acyclicity Revisited. Research Report 1403.7076, Computing Research Repository, February 2014. 32 pages.
BibTex | Web page | PDF ]
[Sou14]
R. Soulat. Synthesis of Correct-by-Design Schedulers for Hybrid Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2014.
BibTex | Web page | PDF ]
[FGM+14]
L. Fribourg, É. Goubault, S. Mohamed, S. Putot, and R. Soulat. Synthesis of robust boundary control for systems governed by semi-discrete differential equations. Research Report LSV-14-03, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2014. 8 pages.
BibTex | Web page | PDF ]
[SBM14]
O. Sankur, P. Bouyer, and N. Markey. Shrinking Timed Automata. Information and Computation, 234:107--132, February 2014.
doi: 10.1016/j.ic.2014.01.002.
BibTex | DOI | Web page | PDF ]
[KL14]
S. Kumar and G. Lipari. Latency Analysis of Network-On-Chip-based Many-Core Processors. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP'14), pages 432--439, Turin, Italy, February 2014. IEEE Computer Society Press.
doi: 10.1109/PDP.2014.107.
BibTex | DOI ]
[ABG+14a]
A. Adjé, O. Bouissou, J. Goubault-Larrecq, É. Goubault, and S. Putot. Static Analysis of Programs with Imprecise Probabilistic Inputs. In Revised Selected Papers of the 5th IFIP TC2/WG2.3 Conference Verified Software---Theories, Tools, and Experiments (VSTTE'13), volume 8164 of Lecture Notes in Computer Science, pages 22--47, Atherton, California, USA, 2014. Springer.
doi: 10.1007/978-3-642-54108-7.
BibTex | DOI | Web page | PDF ]
[BFHP14]
L. Bernardinello, C. Ferigato, S. Haar, and L. Pomello. Closed Sets in Occurrence Nets with Conflicts. Fundamenta Informaticae, 133(4):323--344, 2014.
doi: 10.3233/FI-2014-1079.
BibTex | DOI | Web page | PDF ]
[KHY14]
M. Koutny, S. Haddad, and A. Yakovlev, editors. Transactions on Petri Nets and Other Models of Concurrency IX, volume 8910 of Lecture Notes in Computer Science. Springer, 2014.
BibTex | Web page ]
[CH14]
Th. Chatain and S. Haar. A Canonical Contraction for Safe Petri Nets. In Transactions on Petri Nets and Other Models of Concurrency IX, volume 8910 of Lecture Notes in Computer Science, pages 83--98. Springer, 2014.
doi: 10.1007/978-3-662-45730-6_5.
BibTex | DOI | Web page | PDF ]
[GS14]
J. Goubault-Larrecq and R. Segala. Random Measurable Selections. In Horizons of the Mind. A Tribute to Prakash Panangaden, volume 8464 of Lecture Notes in Computer Science, pages 343--362. Springer, 2014.
doi: 10.1007/978-3-319-06880-0_18.
BibTex | DOI | Web page | PDF ]
[CDFR14a]
K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin. Doomsday Equilibria for Omega-Regular Games. In Proceedings of the 15th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'14), volume 8318 of Lecture Notes in Computer Science, pages 78--97, San Diego, California, USA, January 2014. Springer.
doi: 10.1007/978-3-642-54013-4_5.
BibTex | DOI | Web page | PDF ]
[Cyr14]
A. Cyriac. Verification of Communicating Recursive Programs via Split-width. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2014.
BibTex | Web page | PDF ]
[BCG+14]
D. Baelde, K. Chaudhuri, A. Gacek, D. Miller, G. Nadathur, A. Tiu, and Y. Wang. Abella: A System for Reasoning about Relational Specifications. Journal of Formalized Reasoning, 7(2):1--89, 2014.
doi: 10.6092/issn.1972-5787/4650.
BibTex | DOI | Web page | PDF ]
[Cha13]
Th. Chatain. Concurrency in Real-Time Distributed Systems, from Unfoldings to Implementability. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2013.
BibTex | Web page | PDF ]
[Rod13]
C. Rodríguez. Verification Based on Unfoldings of Petri Nets with Read Arcs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2013.
BibTex | Web page | PDF ]
[Sch13]
S. Schwoon. Efficient verification of sequential and concurrent systems. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2013.
BibTex | Web page | PDF ]
[Ant13]
É. Antoine. Distributed data management with a declarative rule-based language: Webdamlog. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2013.
BibTex | Web page | PDF ]
[BLBL13]
M. Bambagini, J. Lelli, G. Buttazzo, and G. Lipari. On the Energy-Aware Partitioning of Real-Time Tasks on Homogeneous Multi-Processor Systems. In Proceedings of the 4th International Conference on Energy-Aware Computing Systems and Applications (ICEAC'14),, pages 69--74, Istanbul, Turkey, December 2013. IEEE Circuits and Systems Society.
doi: 10.1109/ICEAC.2013.6737640.
BibTex | DOI | Web page | PDF ]
[HHMS13]
S. Haar, S. Haddad, T. Melliti, and S. Schwoon. Optimal Constructions for Active Diagnosis. In Proceedings of the 33rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'13), volume 24 of Leibniz International Proceedings in Informatics, pages 527--539, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2013.527.
BibTex | DOI | Web page | PDF ]
[EJS13]
J. Esparza, L. Jezequel, and S. Schwoon. Computation of summaries using net unfoldings. In Proceedings of the 33rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'13), volume 24 of Leibniz International Proceedings in Informatics, pages 225--236, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2013.225.
BibTex | DOI | Web page | PDF ]
[CDKR13]
C. Chevalier, S. Delaune, S. Kremer, and M. D. Ryan. Composition of Password-based Protocols. Formal Methods in System Design, 43(3):369--413, December 2013.
doi: 10.1007/s10703-013-0184-6.
BibTex | DOI | Web page | PDF ]
[BS13c]
D. Berwanger and O. Serre. Théorie des jeux en informatique. Technique et Science Informatiques, 32(9-10), December 2013.
BibTex | Web page | PDF ]
[BC13a]
S. Balaguer and Th. Chatain. Avoiding Shared Clocks in Networks of Timed Automata. Logical Methods in Computer Science, 9(4:13), November 2013.
doi: 10.2168/LMCS-9(4:13)2013.
BibTex | DOI | Web page | PDF ]
[CD13b]
R. Chrétien and S. Delaune. La protection des informations sensibles. Pour La Science, 433:70--77, November 2013.
BibTex | Web page ]
[PHL13]
H. Ponce de León, S. Haar, and D. Longuet. Unfolding-based Test Selection for Concurrent Conformance. In Proceedings of the 25th IFIP International Conference on Testing Software and Systems (ICTSS'13), Lecture Notes in Computer Science, pages 98--113, Istanbul, Turkey, November 2013. Springer.
doi: 10.1007/978-3-642-41707-8_7.
BibTex | DOI | Web page | PDF ]
[KS13c]
W. Kazana and L. Segoufin. Enumeration of monadic second-order queries on trees. ACM Transactions on Computational Logic, 14(4), November 2013.
doi: 10.1145/2528928.
BibTex | DOI | Web page | PDF ]
[CFM13]
M. Cadilhac, A. Finkel, and P. McKenzie. Unambiguous Contrained Automata. International Journal of Foundations of Computer Science, 24(7):1099--1116, November 2013.
doi: 10.1142/S0129054113400339.
BibTex | DOI | Web page | PDF ]
[BS13a]
N. Bertrand and Ph. Schnoebelen. Computable fixpoints in well-structured symbolic model checking. Formal Methods in System Design, 43(2):233--267, October 2013.
doi: 10.1007/s10703-012-0168-y.
BibTex | DOI | Web page | PDF ]
[MLS+13]
N. Markey, K. G. Larsen, A. Skou, D. Lux, J. Rozenkilde, K. L. Pedersen, and S. M. Sørensen. Description of case studies. Cassting deliverable D4.1 (FP7-ICT-601148), October 2013. 19 pages.
BibTex ]
[Mon13]
B. Monmege. Spécification et vérification de propriétés quantitatives : expressions, logiques, et automates. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2013.
BibTex | Web page | PDF ]
[PLML13]
A. Parri, J. Lelli, M. Marinoni, and G. Lipari. Design and Implementation of the Multiprocessor Bandwidth Inheritance Protocol on Linux. In Proceedings of the 15th Real-Time Linux Workshop (RTLWS'13), pages 41--54, Lugano-Manno, Switzerland, October 2013. Open Source Automation Development Lab (OSADL).
BibTex | Web page | PDF ]
[SSL+13]
Y. Sun, R. Soulat, G. Lipari, É. André, and L. Fribourg. Parametric Schedulability Analysis of Fixed Priority Real-Time Distributed Systems. In Preproceedings of the 2nd International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13), pages 179--194, Queenstown, New Zealand, October 2013.
BibTex | Web page | PDF ]
[PBB13]
H. Ponce de León, G. Bonigo, and L. Brandán Briones. Distributed Analysis of Diagnosability in Concurrent Systems. In Proceedings of the 24th International Workshop on Principles of Diagnosis (DX'13), Jerusalem, Israel, October 2013.
BibTex | Web page | PDF ]
[ABD+13]
É. André, B. Barbot, C. Démoulins, L. M. Hillah, F. Hulin-Hubard, F. Kordon, A. Linard, and L. Petrucci. A Modular Approach for Reusing Formalisms in Verification Tools of Concurrent Systems. In Proceedings of the 15th International Conference on Formal Engineering Methods (ICFEM'13), Lecture Notes in Computer Science, pages 199--214, Queenstown, New Zealand, October-November 2013. Springer.
doi: 10.1007/978-3-642-41202-8_14.
BibTex | DOI | Web page | PDF ]
[BDG+13]
Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine, J.-F. Raskin, and J. Worrell. Time-Bounded Reachability for Monotonic Hybrid Automata: Complexity and Fixed Points. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 55--70, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_6.
BibTex | DOI | Web page | PDF ]
[CDRR13]
K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin. Looking at Mean-Payoff and Total-Payoff through Windows. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 118--132, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_10.
BibTex | DOI | Web page | PDF ]
[RS13a]
C. Rodríguez and S. Schwoon. Cunf: A Tool for Unfolding and Verifying Petri Nets with Read Arcs. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 492--495, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_42.
BibTex | DOI | Web page | PDF ]
[AFS13a]
É. André, L. Fribourg, and R. Soulat. Merge and Conquer: State Merging in Parametric Timed Automata. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 381--396, Hanoi, Vietnam, October 2013. Springer.
doi: 10.1007/978-3-319-02444-8_27.
BibTex | DOI | Web page | PDF ]
[CDH13]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. A survey of partial-observation stochastic parity games. Formal Methods in System Design, 43(2):268--284, October 2013.
doi: 10.1007/s10703-012-0164-2.
BibTex | DOI | Web page | PDF ]
[GO13]
J. Goubault-Larrecq and J. Olivain. On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. In Revised Selected Papers of the 6th International Symposium on Foundations and Practice of Security (FPS'13), volume 8352 of Lecture Notes in Computer Science, pages 3--16, La Rochelle, France, October 2013. Springer.
doi: 10.1007/978-3-319-05302-8_1.
BibTex | DOI | Web page | PDF ]
[AV13b]
S. Abiteboul and V. Vianu. Models for Data-Centric Workflows. In In Search of Elegance in the Theory and Practice of Computation -- Essays Dedicated to Peter Buneman, volume 8000 of Lecture Notes in Computer Science, pages 1--12. Springer, September 2013.
doi: 10.1007/978-3-642-41660-6_1.
BibTex | DOI ]
[tCS13]
B. ten Cate and L. Segoufin. Unary negation. Logical Methods in Computer Science, 9(3:25), September 2013.
doi: 10.2168/LMCS-9(3:25)2013.
BibTex | DOI | Web page | PDF ]
[BCMV13]
R. Bonnet, R. Chadha, P. Madhusudan, and M. Viswanathan. Reachability under contextual locking. Logical Methods in Computer Science, 9(3:21), September 2013.
doi: 10.2168/LMCS-9(3:21)2013.
BibTex | DOI | Web page | PDF ]
[BL13b]
G. Buttazzo and G. Lipari. Ptask: An Educational C Library for Programming Real-Time Systems on Linux. In Proceedings of the 18th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'13), Cagliari, Italy, September 2013. IEEE Industrial Electronics Society.
doi: 10.1109/ETFA.2013.6648001.
BibTex | DOI | Web page | PDF ]
[Bro13]
R. Brochenin. Separation Logic: Expressiveness, Complexity, Temporal Extension. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013.
BibTex | Web page | PDF ]
[Kaz13]
W. Kazana. Query Evaluation with Constant Delay. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013.
BibTex | Web page | PDF ]
[Hir13a]
L. Hirschi. Réduction d'entrelacements pour l'équivalence de traces. Research Report LSV-13-13, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013. 22 pages.
BibTex | Web page | PDF ]
[BMS13b]
P. Bouyer, N. Markey, and O. Sankur. Robustness in timed automata. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 1--18, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_1.
BibTex | DOI | Web page | PDF ]
[Rei13]
J. Reichert. On The Complexity of Counter Reachability Games. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 196--208, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_18.
BibTex | DOI | Web page | PDF ]
[BHJL13]
B. Bérard, S. Haddad, A. Jovanovic, and D. Lime. Parametric Interrupt Timed Automata. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 59--69, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_7.
BibTex | DOI | Web page | PDF ]
[FS13c]
L. Fribourg and R. Soulat. Stability Controllers for Sampled Switched Systems. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 135--145, Uppsala, Sweden, September 2013. Springer.
doi: 10.1007/978-3-642-41036-9_13.
BibTex | DOI | Web page | PDF ]
[SHL+13]
R. Soulat, G. Hérault, D. Labrousse, B. Revol, G. Feld, S. Lefebvre, and L. Fribourg. Use of a full wave correct-by-design command to control a multilevel modular converter. In Proceedings of the 15th European Conference on Power Electronics and Applications (EPE'13), Lille, France, September 2013. IEEE Power Electronics Society.
doi: 10.1109/EPE.2013.6634448.
BibTex | DOI | Web page | PDF ]
[KKS13]
S. Kremer, R. Künnemann, and G. Steel. Universally Composable Key-Management. In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS'13), volume 8134 of Lecture Notes in Computer Science, pages 327--344, Egham, U.K., September 2013. Springer.
doi: 10.1007/978-3-642-40203-6_19.
BibTex | DOI | Web page | PDF ]
[AtCK13]
S. Abiteboul, B. ten Cate, and Y. Katsis. On the equivalence of distributed systems with queries and communication. Journal of Computer and System Sciences, 79(6):739--762, September 2013.
doi: 10.1016/j.jcss.2013.01.001.
BibTex | DOI | Web page | PDF ]
[BDD13]
C. Barrett, S. Demri, and M. Deters. Witness runs for counter machines. In Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCoS'13), volume 8152 of Lecture Notes in Artificial Intelligence, pages 120--150, Nancy, France, September 2013. Springer.
doi: 10.1007/978-3-642-40885-4_9.
BibTex | DOI | Web page | PDF ]
[Sta13]
D. Stan. Équilibres mixtes dans les jeux concurrents. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2013. 29 pages.
BibTex | Web page | PDF ]
[BF13]
V. Braberman and L. Fribourg, editors. Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, Buenos Aires, Argentina, August 2013. Springer.
BibTex | Web page ]
[BL13a]
S. Benedetto and G. Lipari. ADOK: A Minimal Object Oriented Real-Time Operating System in C++. In Proceedings of the 3rd Embedded Operating Systems Workshop (EWiLi'13), Toulouse, France, August 2013.
BibTex | Web page | PDF ]
[Gou13a]
J. Goubault-Larrecq. A Constructive Proof of the Topological Kruskal Theorem. In Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS'13), volume 8087 of Lecture Notes in Computer Science, pages 22--41, Klosterneuburg, Austria, August 2013. Springer.
doi: 10.1007/978-3-642-40313-2_3.
BibTex | DOI | Web page | PDF ]
[LM13]
F. Laroussinie and N. Markey. Satisfiability of ATL with strategy contexts. In Proceedings of the 4th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'13), volume 119 of Electronic Proceedings in Theoretical Computer Science, pages 208--223, Borca di Cadore, Italy, August 2013.
doi: 10.4204/EPTCS.119.18.
BibTex | DOI | Web page | PDF ]
[SS13]
S. Schmitz and Ph. Schnoebelen. The Power of Well-Structured Systems. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 5--24, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40184-8_2.
BibTex | DOI | Web page | PDF ]
[ABHH13]
S. Akshay, N. Bertrand, S. Haddad, and L. Hélouët. The steady-state control problem for Markov decision processes. In Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), pages 290--304, Buenos Aires, Argentina, August 2013. IEEE Computer Society Press.
doi: 10.1007/978-3-642-40196-1_26.
BibTex | DOI | Web page | PDF ]
[CJ13]
Th. Chatain and C. Jard. Back in Time Petri Nets. In Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, pages 91--105, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40229-6_7.
BibTex | DOI | Web page | PDF ]
[BMS13a]
P. Bouyer, N. Markey, and O. Sankur. Robust Weighted Timed Automata and Games. In Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, pages 31--46, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40229-6_3.
BibTex | DOI | Web page | PDF ]
[HSS13]
C. Haase, S. Schmitz, and Ph. Schnoebelen. The Power of Priority Channel Systems. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 319--333, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40184-8_23.
BibTex | DOI | Web page | PDF ]
[SBMR13]
O. Sankur, P. Bouyer, N. Markey, and P.-A. Reynier. Robust Controller Synthesis in Timed Automata. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 546--560, Buenos Aires, Argentina, August 2013. Springer.
doi: 10.1007/978-3-642-40184-8_38.
BibTex | DOI | Web page | PDF ]
[FGH13]
A. Finkel, S. Göller, and C. Haase. Reachability in Register Machines with Polynomial Updates. In Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS'13), volume 8087 of Lecture Notes in Computer Science, pages 409--420, Klosterneuburg, Austria, August 2013. Springer.
doi: 10.1007/978-3-642-40313-2_37.
BibTex | DOI | Web page | PS | PDF ]
[Dem13]
S. Demri. On selective unboundedness of VASS. Journal of Computer and System Sciences, 79(5):689--713, August 2013.
doi: 10.1016/j.jcss.2013.01.014.
BibTex | DOI | Web page | PDF ]
[Hir13b]
L. Hirschi. Reduction of interleavings for trace equivalence checking of security protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2013.
BibTex ]
[Fan13]
E. Fang. Permissive multi-strategies in timed games. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2013.
BibTex ]
[GLS13a]
A. Gheerbrant, L. Libkin, and C. Sirangelo. Reasoning About Pattern-Based XML Queries. In Proceedings of the 7th International Conference on Web Reasoning and Rule Systems (WRRS'13), volume 7994 of Lecture Notes in Computer Science, pages 4--18, Mannheim, Germany, July 2013. Springer.
doi: 10.1007/978-3-642-39666-3_2.
BibTex | DOI | Web page | PDF ]
[FS13a]
L. Fribourg and R. Soulat. Control of Switching Systems by Invariance Analysis: Application to Power Electronics. Wiley-ISTE, July 2013. 144 pages.
BibTex | Web page ]
[RS13b]
C. Rodríguez and S. Schwoon. An Improved Construction of Petri Net Unfoldings. In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, pages 47--52, Singapore, July 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.FSFMA.2013.47.
BibTex | DOI | Web page | PDF ]
[HMY13]
S. Haddad, L. Mokdad, and S. Youcef. Bounding models families for performance evaluation in composite Web services. Journal of Computational Science, 4(4):232--241, July 2013.
doi: 10.1016/j.jocs.2011.11.003.
BibTex | DOI | Web page | PDF ]
[DDS13]
S. Demri, A. K. Dhar, and A. Sangnier. On the Complexity of Verifying Regular Properties on Flat Counter Systems. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, volume 7966 of Lecture Notes in Computer Science, pages 162--173, Riga, Latvia, July 2013. Springer.
doi: 10.1007/978-3-642-39212-2_17.
BibTex | DOI | Web page | PDF ]
[Fri13]
L. Fribourg. Control of Switching Systems by Invariance Analysis (Invited Talk). In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, page 1, Singapore, July 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.FSFMA.2013.1.
BibTex | DOI | Web page | PDF ]
[FKS13]
L. Fribourg, U. Kühne, and R. Soulat. Constructing Attractors of Nonlinear Dynamical Systems by State Space Decomposition. In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, pages 53--60, Singapore, July 2013. Leibniz-Zentrum für Informatik.
doi: 10.4230/OASIcs.FSFMA.2013.53.
BibTex | DOI | Web page | PDF ]
[AHH+13]
É. André, L. M. Hillah, F. Hulin-Hubard, F. Kordon, Y. Lembachar, A. Linard, and L. Petrucci. CosyVerif: An Open Source Extensible Verification Environment. In Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'13), pages 33--36, Singapore, July 2013. IEEE Computer Society Press.
doi: 10.1109/ICECCS.2013.15.
BibTex | DOI | Web page | PDF ]
[HRS13]
S. Haar, C. Rodríguez, and S. Schwoon. Reveal Your Faults: It's Only Fair! In Proceedings of the 13th International Conference on Application of Concurrency to System Design (ACSD'13), pages 120--129, Barcelona, Spain, July 2013. IEEE Computer Society Press.
doi: 10.1109/ACSD.2013.15.
BibTex | DOI | Web page | PDF ]
[HKS13]
S. Haar, C. Kern, and S. Schwoon. Computing the Reveals Relation in Occurrence Nets. Theoretical Computer Science, 493:66--79, July 2013.
doi: 10.1016/j.tcs.2013.04.028.
BibTex | DOI | Web page | PDF ]
[McK13]
P. McKenzie. Can chimps go it alone? In Proceedings of the 15th Workshop on Descriptional Complexity of Formal Systems (DCFS'13), volume 8031 of Lecture Notes in Computer Science, page 17, London, Ontario, Canada, July 2013. Springer-Verlag.
doi: 10.1007/978-3-642-39310-5_3.
BibTex | DOI | Web page | PDF ]
[CCD13b]
R. Chrétien, V. Cortier, and S. Delaune. From security protocols to pushdown automata. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, volume 7966 of Lecture Notes in Computer Science, pages 137--149, Riga, Latvia, July 2013. Springer.
doi: 10.1007/978-3-642-39212-2_15.
BibTex | DOI | Web page | PDF ]
[CCP13]
V. Cheval, V. Cortier, and A. Plet. Lengths may break privacy ---or how to check for equivalences with length. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 708--723, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_50.
BibTex | DOI | Web page | PDF ]
[HIOP13]
C. Haase, S. Ishtiaq, J. Ouaknine, and M. Parkinson. SeLoger: A Tool for Graph-Based Reasoning in Separation Logic. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 790--795, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_55.
BibTex | DOI | Web page | PDF ]
[San13b]
O. Sankur. Shrinktech: A Tool for the Robustness Analysis of Timed Automata. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 1006--1012, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_72.
BibTex | DOI | Web page | PDF ]
[Bre13]
R. Brenguier. PRALINE: A Tool for Computing Nash Equilibria in Concurrent Games. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 890--895, Saint Petersburg, Russia, July 2013. Springer.
doi: 10.1007/978-3-642-39799-8_63.
BibTex | DOI | Web page | PDF ]
[Gou13b]
J. Goubault-Larrecq. A few pearls in the theory of quasi-metric spaces. Invited talk (semi-plenary speaker), Summer Topology Conference, North Bay, Ontario, CA, July 2013.
BibTex ]
[Gou13e]
J. Goubault-Larrecq. A short proof of the Schröder-Simpson theorem. Invited talk, Workshop on Asymmetric Topology, Summer Topology Conference, North Bay, Ontario, CA, July 2013.
BibTex ]
[ABG13]
S. Akshay, B. Bollig, and P. Gastin. Event-clock Message Passing Automata: A Logical Characterization and an Emptiness-Checking Algorithm. Formal Methods in System Design, 42(3):262--300, June 2013.
doi: 10.1007/s10703-012-0179-8.
BibTex | DOI | Web page | PDF ]
[GS13]
P. Gastin and N. Sznajder. Fair Synthesis for Asynchronous Distributed Systems. ACM Transactions on Computational Logic, 14(2:9), June 2013.
doi: 10.1145/2480759.2480761.
BibTex | DOI | Web page | PDF ]
[AAM+13]
S. Abiteboul, É. Antoine, G. Miklau, J. Stoyanovich, and J. Testard. Rule-based application development using Webdamlog. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'13), pages 965--968, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463676.2465251.
BibTex | DOI | Web page | PDF ]
[BD13]
K. Bansal and S. Demri. Model-checking bounded multi-pushdown systems. In Proceedings of the 8th International Computer Science Symposium in Russia (CSR'13), volume 7913 of Lecture Notes in Computer Science, pages 405--417, Ekaterinburg, Russia, June 2013. Springer.
doi: 10.1007/978-3-642-38536-0_35.
BibTex | DOI | Web page | PDF ]
[VM13a]
S. Valette and N. Markey. Cassting website. Cassting deliverable D6.1 (FP7-ICT-601148), June 2013. 10 pages.
BibTex | Web page | PDF ]
[CH13]
Th. Chatain and S. Haar. A Canonical Contraction for Safe Petri Nets. In Proceedings of the 7th International Workshop on Petri Nets and Software Engineering (PNSE'13), volume 969 of CEUR Workshop Proceedings, pages 25--39, Milano, Italy, June 2013. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[GHPR13]
G. Geeraerts, A. Heußner, M. Praveen, and J.-F. Raskin. ω-Petri nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 49--69, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_4.
BibTex | DOI | Web page | PDF ]
[BST13]
M. Bojańczyk, L. Segoufin, and S. Toruńczyk. Verification of Database-driven Systems via Amalgamation. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 63--74, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2465228.
BibTex | DOI | Web page | PDF ]
[GLS13b]
A. Gheerbrant, L. Libkin, and C. Sirangelo. When is Naïve Evaluation Possible? In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 75--86, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2463674.
BibTex | DOI | Web page | PDF ]
[AV13a]
S. Abiteboul and V. Vianu. Collaborative Data-Driven Workflows: Think Global, Act Local. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 91--102, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2463672.
BibTex | DOI | Web page | PDF ]
[KS13b]
W. Kazana and L. Segoufin. Enumeration of First-Order Queries on Classes of Structures With Bounded Expansion. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 297--308, New York, New York, USA, June 2013. ACM Press.
doi: 10.1145/2463664.2463667.
BibTex | DOI | Web page | PDF ]
[CCD13a]
V. Cheval, V. Cortier, and S. Delaune. Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492:1--39, June 2013.
doi: 10.1016/j.tcs.2013.04.016.
BibTex | DOI | Web page | PDF ]
[CCS13]
H. Comon-Lundh, V. Cortier, and G. Scerri. Tractable inference systems: an extension with a deducibility predicate. In Proceedings of the 24th International Conference on Automated Deduction (CADE'13), volume 7898 of Lecture Notes in Artificial Intelligence, pages 91--108, Lake Placid, New York, USA, June 2013. Springer.
doi: 10.1007/978-3-642-38574-2_6.
BibTex | DOI | Web page | PDF ]
[BKM13]
B. Bollig, D. Kuske, and R. Mennicke. The Complexity of Model Checking Multi-Stack Systems. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 163--170, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press.
doi: 10.1109/LICS.2013.22.
BibTex | DOI | Web page | PDF ]
[DFP13]
S. Demri, D. Figueira, and M. Praveen. Reasoning about Data Repetitions with Counter Systems. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 33--42, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press.
doi: 10.1109/LICS.2013.8.
BibTex | DOI | Web page | PDF ]
[BS13d]
A. Boral and S. Schmitz. Model Checking Parse Trees. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 153--162, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press.
doi: 10.1109/LICS.2013.21.
BibTex | DOI | Web page | PDF ]
[BHLM13]
B. Bollig, P. Habermehl, M. Leucker, and B. Monmege. A Fresh Approach to Learning Register Automata. In Proceedings of the 17th International Conference on Developments in Language Theory (DLT'13), volume 7907 of Lecture Notes in Computer Science, pages 118--130, Marne-la-Vallée, France, June 2013. Springer.
doi: 10.1007/978-3-642-38771-5_12.
BibTex | DOI | Web page | PDF ]
[RSK13]
C. Rodríguez, S. Schwoon, and V. Khomenko. Contextual Merged Processes. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 29--48, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_3.
BibTex | DOI | Web page | PDF ]
[FH13]
E. Fraca and S. Haddad. Complexity Analysis of Continuous Petri Nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 170--189, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_10.
BibTex | DOI | Web page | PDF ]
[HHM13]
S. Haddad, R. Hennicker, and M. H. Møller. Channel Properties of Asynchronously Composed Petri Nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 369--388, Milano, Italy, June 2013. Springer.
doi: 10.1007/978-3-642-38697-8_20.
BibTex | DOI | Web page | PDF ]
[AR13]
A. Arul and J. Reichert. The Complexity of Robot Games on the Integer Line. In Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages (QAPl'13), volume 117 of Electronic Proceedings in Theoretical Computer Science, pages 132--148, Rome, Italy, June 2013.
doi: 10.4204/EPTCS.117.9.
BibTex | DOI | Web page | PDF ]
[BS13b]
N. Bertrand and Ph. Schnoebelen. Solving stochastic Büchi games on infinite arenas with a finite attractor. In Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages (QAPl'13), volume 117 of Electronic Proceedings in Theoretical Computer Science, pages 116--131, Rome, Italy, June 2013.
doi: 10.4204/EPTCS.117.8.
BibTex | DOI | Web page | PDF ]
[Gou13d]
J. Goubault-Larrecq. OrchIDS, ou : de l'importance de la sémantique. Séminaire DGA Innosciences. DGA, Bagneux, June 2013.
BibTex ]
[BCH13a]
S. Balaguer, Th. Chatain, and S. Haar. Building Occurrence Nets from Reveals Relations. Fundamenta Informaticae, 123(3):245--272, May 2013.
doi: 10.3233/FI-2013-809.
BibTex | DOI | Web page | PDF ]
[FS13b]
L. Fribourg and R. Soulat. Limit Cycles of Controlled Switched Systems: Existence, Stability, Sensitivity. In Proceedings of the 3rd International Workshop on New Computational Methods for Inverse Problems (NCMIP'13), volume 464 of Journal of Physics: Conference Series, Cachan, France, May 2013. IOS Press.
doi: 10.1088/1742-6596/464/1/012007.
BibTex | DOI | Web page | PDF ]
[San13a]
O. Sankur. Robustness in Timed Automata: Analysis, Synthesis, Implementation. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2013.
BibTex | Web page | PDF ]
[ABB+13]
E. G. Amparore, B. Barbot, M. Beccuti, S. Donatelli, and G. Franceschinis. Simulation-based Verification of Hybrid Automata Stochastic Logic Formulas for Stochastic Symmetric Nets. In Proceedings of the 1st ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS'13), pages 253--264, Montreal, Canada, May 2013. ACM Press.
doi: 10.1145/2486092.2486124.
BibTex | DOI | Web page | PDF ]
[AFS13b]
É. André, L. Fribourg, and J. Sproston. An Extension of the Inverse Method to Probabilistic Timed Automata. Formal Methods in System Design, 42(2):119--145, April 2013.
doi: 10.1007/s10703-012-0169-x.
BibTex | DOI | Web page | PDF ]
[VM13b]
S. Valette and N. Markey. Minutes of the Kick-Off Meeting. Cassting deliverable D6.1 (FP7-ICT-601148), April 2013. 9 pages.
BibTex | Web page | PDF ]
[BCG+13]
L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and C. Vacher. Decidable Classes of Tree Automata Mixing Local and Global Constraints Modulo Flat Theories. Logical Methods in Computer Science, 9(2), April 2013.
doi: 10.2168/LMCS-9(2:1)2013.
BibTex | DOI | Web page | PDF ]
[BCH+13c]
B. Bollig, A. Cyriac, L. Hélouët, A. Kara, and Th. Schwentick. Dynamic Communicating Automata and Branching High-Level MSCs. In Proceedings of the 7th International Conference on Language and Automata Theory and Applications (LATA'13), volume 7810 of Lecture Notes in Computer Science, pages 177--189, Bilbao, Spain, April 2013. Springer.
doi: 10.1109/REVET.2012.6195253.
BibTex | DOI | Web page | PDF ]
[CB13]
V. Cheval and B. Blanchet. Proving More Observational Equivalences with ProVerif. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), volume 7796 of Lecture Notes in Computer Science, pages 226--246, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-36830-1_12.
BibTex | DOI | Web page | PDF ]
[CD13a]
R. Chrétien and S. Delaune. Formal analysis of privacy for routing protocols in mobile ad hoc networks. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), volume 7796 of Lecture Notes in Computer Science, pages 1--20, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-36830-1_1.
BibTex | DOI | Web page | PDF ]
[BFHR13]
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Ordinal Theory for Expressiveness of Well-Structured Transition Systems. Information and Computation, 224:1--22, March 2013.
doi: 10.1016/j.ic.2012.11.003.
BibTex | DOI | Web page | PDF ]
[Gou13c]
J. Goubault-Larrecq. Non-Hausdorff Topology and Domain Theory---Selected Topics in Point-Set Topology, volume 22 of New Mathematical Monographs. Cambridge University Press, March 2013.
BibTex | Web page ]
[BC13b]
R. Bonnet and R. Chadha. Bounded Context-Switching and Reentrant Locking. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 65--80, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37075-5_5.
BibTex | DOI ]
[LGBB13]
G. Lipari, L. George, E. Bini, and M. Bertogna. On the Average Complexity of the Processor Demand Analysis for Earliest Deadline Scheduling. In Real-Time Sytems: the past, the present, and the future -- Proceedings of a conference organized in celebration of Professor Alan Burns' sixtieth birthday, pages 75--86, York, UK, March 2013. CreateSpace Independent Publishing Platform.
BibTex | Web page | PDF ]
[LB13]
G. Lipari and G. Buttazzo. Resource reservation for Mixed Criticality Systems. In Real-Time Sytems: the past, the present, and the future -- Proceedings of a conference organized in celebration of Professor Alan Burns' sixtieth birthday, pages 60--74, York, UK, March 2013. CreateSpace Independent Publishing Platform.
BibTex | Web page | PDF ]
[DKN+13]
M. Duflot, M. Kwiatkowska, G. Norman, D. Parker, S. Peyronnet, C. Picaronny, and J. Sproston. Practical Applications of Probabilistic Model Checking to Communication Protocols. In Formal Methods for Industrial Critical Systems: A Survey of Applications, chapter 7, pages 133--150. John Wiley & Sons, Ltd. and IEEE Computer Society Press, March 2013.
doi: 10.1002/9781118459898.ch7.
BibTex | DOI | Web page | PDF ]
[ABMW13]
S. Abiteboul, P. Bourhis, A. Muscholl, and Z. Wu. Recursive queries on trees and data trees. In Proceedings of the 16th International Conference on Database Theory (ICDT'13), pages 93--104, Genoa, Italy, March 2013. ACM Press.
doi: 10.1145/2448496.2448509.
BibTex | DOI | Web page | PDF ]
[BGM13]
B. Bollig, P. Gastin, and B. Monmege. Weighted Specifications over Nested Words. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 385--400, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37075-5_25.
BibTex | DOI | Web page | PDF ]
[BNS13]
E. Bertsch, M.-J. Nederhof, and S. Schmitz. On LR Parsing with Selective Delays. In Proceedings of the 22nd International Conference on Compiler Construction (CC'13), volume 7791 of Lecture Notes in Computer Science, pages 244--263, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37051-9_13.
BibTex | DOI | Web page | PDF ]
[KS13a]
P. Karandikar and S. Schmitz. The Parametric Ordinal-Recursive Complexity of Post Embedding Problems. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 273--288, Rome, Italy, March 2013. Springer.
doi: 10.1007/978-3-642-37075-5_18.
BibTex | DOI | Web page | PDF ]
[Fin13]
A. Finkel. REACHARD -- Compte-rendu intermédiaire. Deliverable D2 Reachard (ANR-11-BS02-001), March 2013. 9 pages.
BibTex ]
[BCH+13b]
B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H. Roux. The Expressive Power of Time Petri Nets. Theoretical Computer Science, 474:1--20, February 2013.
doi: 10.1016/j.tcs.2012.12.005.
BibTex | DOI | Web page | PDF ]
[BCD13]
M. Baudet, V. Cortier, and S. Delaune. YAPA: A generic tool for computing intruder knowledge. ACM Transactions on Computational Logic, 14(1:4), February 2013.
doi: 10.1145/2422085.2422089.
BibTex | DOI | Web page | PDF ]
[FK13]
L. Fribourg and U. Kühne. Parametric Verification and Test Coverage for Hybrid Automata using the Inverse Method. International Journal of Foundations of Computer Science, 24(2):233--249, February 2013.
doi: 10.1142/S0129054113400091.
BibTex | DOI | Web page | PDF ]
[HM13]
S. Haar and T. Masopust. Languages, Decidability, and Complexity. In Control of Discrete-Event Systems -- Automata and Petri Net Perspectives, volume 433 of Lecture Notes in Control and Information Sciences, pages 23--43. Springer, 2013.
doi: 10.1007/978-1-4471-4276-8_2.
BibTex | DOI | Web page | PDF ]
[HF13]
S. Haar and É. Fabre. Diagnosis with Petri Net Unfoldings. In Control of Discrete-Event Systems -- Automata and Petri Net Perspectives, volume 433 of Lecture Notes in Control and Information Sciences, pages 301--318. Springer, 2013.
doi: 10.1007/978-1-4471-4276-8_15.
BibTex | DOI | Web page | PDF ]
[BBL+13]
B. Bérard, P. Bouyer, K. G. Larsen, N. Markey, J. Mullins, O. Sankur, M. Sassolas, and C. Thrane. Measuring the robustness. Deliverable ImpRo 3.1, (ANR-10-BLAN-0317), January 2013. 59 pages.
BibTex | Web page | PDF ]
[BFH+13]
P. Bouyer, S. Faucou, S. Haar, A. Jovanivić, D. Lime, N. Markey, O. H. Roux, and O. Sankur. Control tasks for Timed System; Robustness issues. Deliverable ImpRo 5.1, (ANR-10-BLAN-0317), January 2013. 34 pages.
BibTex | Web page | PDF ]
[AS13]
É. André and R. Soulat. The Inverse Method. Wiley-ISTE, January 2013. 176 pages.
BibTex | Web page ]
[HMN13]
S. Haddad, J. Mairesse, and H.-T. Nguyen. Synthesis and Analysis of Product-form Petri Nets. Fundamenta Informaticae, 122(1-2):147--172, 2013.
doi: 10.3233/FI-2013-786.
BibTex | DOI | Web page | PDF ]
[GJ13]
J. Goubault-Larrecq and J.-P. Jouannaud. The Blossom of Finite Semantic Trees. In Programming Logics -- Essays in Memory of Harald Ganzinger, volume 7797 of Lecture Notes in Computer Science, pages 90--122. Springer, January 2013.
BibTex | Web page | PDF ]
[Bon13]
R. Bonnet. Theory of Well-Structured Transition Systems and Extended Vector-Addition Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2013.
BibTex | Web page | PDF ]
[DR13]
L. Doyen and A. Rabinovich. Robot games. Research Report LSV-13-02, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2013. 2 pages.
BibTex | Web page | PDF ]
[Haa12]
S. Haar. What topology tells us about diagnosability in partial order semantics. Discrete Event Dynamic Systems: Theory and Applications, 22(4):383--402, December 2012.
doi: 10.1007/s10626-011-0121-z.
BibTex | DOI | Web page | PDF ]
[CU12]
R. Chadha and M. Ummels. The complexity of quantitative information flow in recursive programs. In Proceedings of the 32nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12), volume 18 of Leibniz International Proceedings in Informatics, pages 534--545, Hyderabad, India, December 2012. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2012.534.
BibTex | DOI | Web page | PDF ]
[Ben12b]
H. Benzina. Enforcing Virtualized Systems Security. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012.
BibTex | Web page | PDF ]
[Bal12]
S. Balaguer. La concurrence dans les systèmes distribués temps-réel. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012.
BibTex | Web page | PDF ]
[FFL+12b]
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Correct-by-Design Control of 5-level and 7-level Power Converters. Research Report LSV-12-25, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 8 pages.
BibTex | Web page | PDF ]
[FS12]
L. Fribourg and R. Soulat. Controlled Recurrent Subspaces for Sampled Switched Linear Systems. Research Report LSV-12-24, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 11 pages.
BibTex | Web page | PDF ]
[Ves12]
S. Vester. Symmetric Nash equilibria. Research Report LSV-12-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 51 pages.
BibTex | Web page | PDF ]
[Che12]
V. Cheval. Automatic verification of cryptographic protocols: privacy-type properties. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012.
BibTex | Web page | PDF ]
[CFM12b]
M. Cadilhac, A. Finkel, and P. McKenzie. Bounded Parikh automata. International Journal of Foundations of Computer Science, 23(8):1691--1710, December 2012.
doi: 10.1142/S0129054112400709.
BibTex | DOI | Web page | PDF ]
[BGKR12]
D. Berwanger, E. Grädel, L. Kaiser, and R. Rabinovich. Entanglement and the complexity of directed graphs. Theoretical Computer Science, 463:2--25, December 2012.
doi: 10.1016/j.tcs.2012.07.010.
BibTex | DOI | Web page | PDF ]
[BFP12]
R. Bonnet, A. Finkel, and M. Praveen. Extending the Rackoff technique to affine nets. In Proceedings of the 32nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12), volume 18 of Leibniz International Proceedings in Informatics, Hyderabad, India, December 2012. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2012.301.
BibTex | DOI | Web page | PDF ]
[BS12]
D. Berwanger and O. Serre. Parity games on undirected graphs. Information Processing Letters, 112(23):928--932, December 2012.
doi: 10.1016/j.ipl.2012.08.021.
BibTex | DOI | Web page | PDF ]
[GS12]
P. Gastin and N. Sznajder. Decidability of well-connectedness for distributed synthesis. Information Processing Letters, 112(24):963--968, December 2012.
doi: 10.1016/j.ipl.2012.08.018.
BibTex | DOI | Web page | PDF ]
[BDF12]
A. Bušić, H. Djafri, and J.-M. Fourneau. Bounded state space truncation and censored Markov chains. In Proceedings of the 51st IEEE Conference on Decision and Control (CDC'12), pages 5828--5833, Maui, Hawaii, USA, December 2012. IEEE Control System Society.
doi: 10.1109/CDC.2012.6426156.
BibTex | DOI | Web page | PDF ]
[AvMSS12]
M. Anderson, D. van Melkebeek, N. Schweikardt, and L. Segoufin. Locality from Circuit Lower Bounds. SIAM Journal on Computing, 41(6):1481--1523, November 2012.
doi: 10.1137/110856873.
BibTex | DOI | Web page | PDF ]
[Bre12]
R. Brenguier. Équilibres de Nash dans les Jeux Concurrents -- Application aux Jeux Temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2012.
BibTex | Web page | PDF ]
[BHP12b]
B. Barbot, S. Haddad, and C. Picaronny. Importance Sampling for Model Checking of Continuous Time Markov Chains. In Proceedings of the 4th International Conference on Advances in System Simulation (SIMUL'12), pages 30--35, Lisbon, Portugal, November 2012. XPS.
BibTex | Web page | PDF ]
[CD12c]
K. Chatterjee and L. Doyen. Energy parity games. Theoretical Computer Science, 458:49--60, November 2012.
doi: 10.1016/j.tcs.2012.07.038.
BibTex | DOI | Web page | PDF ]
[FLC12]
D. Faggioli, G. Lipari, and T. Cucinotta. Analysis and Implementation of the Multiprocessor Bandwidth Inheritance Protocol. Real-Time Systems, 48(6):789--825, November 2012.
doi: 10.1007/s11241-012-9162-0.
BibTex | DOI | Web page | PDF ]
[DDG12]
S. Demri, D. D'Souza, and R. Gascon. Temporal Logics of Repeating Values. Journal of Logic and Computation, 22(5):1059--1096, October 2012.
doi: 10.1093/logcom/exr013.
BibTex | DOI | Web page | PDF ]
[CFM12a]
M. Cadilhac, A. Finkel, and P. McKenzie. Affine Parikh automata. RAIRO Informatique Théorique et Applications, 46(4):511--545, October 2012.
doi: 10.1051/ita/2012013.
BibTex | DOI | Web page | PDF ]
[DDMM12]
Ph. Darondeau, S. Demri, R. Meyer, and Ch. Morvan. Petri Net Reachability Graphs: Decidability Status of FO Properties. Logical Methods in Computer Science, 8(4:9), October 2012.
doi: 10.2168/LMCS-8(4:9)2012.
BibTex | DOI | Web page | PDF ]
[AG12]
A. Adjé and J. Goubault-Larrecq. Concrete Semantics of Programs with Non-Deterministic and Random Inputs. Research Report cs.LO/1210.2605, Computing Research Repository, October 2012. 19 pages.
BibTex | Web page | PDF ]
[BGMZ12]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. A Probabilistic Kleene Theorem. In Proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA'12), volume 7561 of Lecture Notes in Computer Science, pages 400--415, Thiruvananthapuram, India, October 2012. Springer.
doi: 10.1007/978-3-642-33386-6_31.
BibTex | DOI | Web page | PDF ]
[SVMdM12]
D. V. Simões De Sousa, H. Viana, N. Markey, and J. A. F. de Macêdo. Querying Trajectories through Model Checking based on Timed Automata. In Proceedings of the 27th Brazilian Symposium on Databases (SBBD'12), São Paulo, Brazil, October 2012. Sociedade Brasileira de Computação.
BibTex | Web page | PDF ]
[AGL12]
A. Adjé and J. Goubault-Larrecq. Concrete semantics of programs with non-deterministic and random inputs. Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities), WP 2, version 1, October 2012.
BibTex | Web page ]
[FG12a]
A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part II: Complete WSTS. Logical Methods in Computer Science, 8(3:28), September 2012.
doi: 10.2168/LMCS-8(3:28)2012.
BibTex | DOI | Web page | PDF ]
[Abi12b]
S. Abiteboul. Sharing Distributed Knowledge on the Web (Invited Talk). In Proceedings of the 21st Annual EACSL Conference on Computer Science Logic (CSL'12), volume 16 of Leibniz International Proceedings in Informatics, pages 6--8, Fontainebleau, France, September 2012. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.CSL.2012.6.
BibTex | DOI | Web page | PDF ]
[BSS12]
M. Bojańczyk, L. Segoufin, and H. Straubing. Piecewise testable tree languages. Logical Methods in Computer Science, 8(3:26), September 2012.
doi: 10.2168/LMCS-8(3:26)2012.
BibTex | DOI | Web page | PDF ]
[Chr12]
R. Chrétien. Trace equivalence of protocols for an unbounded number of sessions. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2012. 30 pages.
BibTex | Web page | PDF ]
[KS12b]
R. Künnemann and G. Steel. YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. In Revised Selected Papers of the 8th Workshop on Security and Trust Management (STM'12), volume 7783 of Lecture Notes in Computer Science, pages 257--272, Pisa, Italy, September 2012. Springer.
doi: 10.1007/978-3-642-38004-4_17.
BibTex | DOI | Web page | PDF ]
[FLP12]
A. Finkel, J. Leroux, and I. Potapov, editors. Proceedings of the 6th International Wokshop on Reachability Problems (RP'12), volume 7550 of Lecture Notes in Computer Science, Bordeaux, France, September 2012. Springer.
doi: 10.1007/978-3-642-33512-9.
BibTex | DOI | Web page ]
[SLBC12]
R. M. Santos, G. Lipari, E. Bini, and T. Cucinotta. On-line schedulability tests for adaptive reservations in fixed priority scheduling. Real-Time Systems, 48(5):601--634, September 2012.
doi: 10.1007/s11241-012-9156-y.
BibTex | DOI | Web page | PDF ]
[JKS12]
P. Jančar, P. Karandikar, and Ph. Schnoebelen. Unidirectional channel systems can be tested. In Proceedings of the 7th IFIP International Conference on Theoretical Computer Science (IFIP TCS'12), volume 7604 of Lecture Notes in Computer Science, pages 149--163, Amsterdam, The Netherlands, September 2012. Springer.
doi: 10.1007/978-3-642-33475-7_11.
BibTex | DOI | Web page | PDF ]
[RS12]
C. Rodríguez and S. Schwoon. Verification of Petri Nets with Read Arcs. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 471--485, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_33.
BibTex | DOI | Web page | PDF ]
[CGNK12]
A. Cyriac, P. Gastin, and K. Narayan Kumar. MSO Decidability of Multi-Pushdown Systems via Split-Width. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 547--561, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_38.
BibTex | DOI | Web page | PDF ]
[BGS12]
R. Brenguier, S. Göller, and O. Sankur. A Comparison of Succinctly Represented Finite-State Systems. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 147--161, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_12.
BibTex | DOI | Web page | PDF ]
[BHSS12]
B. Bérard, S. Haddad, M. Sassolas, and N. Sznajder. Concurrent Games on VASS with Inhibition. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 39--52, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_5.
BibTex | DOI | Web page | PDF ]
[BC12a]
S. Balaguer and Th. Chatain. Avoiding Shared Clocks in Networks of Timed Automata. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 100--114, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_9.
BibTex | DOI | Web page | PDF ]
[DLM12]
A. Da Costa, F. Laroussinie, and N. Markey. Quantified CTL: expressiveness and model checking. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 177--192, Newcastle, UK, September 2012. Springer.
doi: 10.1007/978-3-642-32940-1_14.
BibTex | DOI | Web page | PDF ]
[FLMS12]
L. Fribourg, D. Lesens, P. Moro, and R. Soulat. Robustness Analysis for Scheduling Problems using the Inverse Method. In Proceedings of the 19th International Symposium on Temporal Representation and Reasoning (TIME'12), pages 73--80, Leicester, UK, September 2012. IEEE Computer Society Press.
doi: 10.1109/TIME.2012.10.
BibTex | DOI | Web page | PDF ]
[BBJM12]
P. Bouyer, Th. Brihaye, M. Jurdziński, and Q. Menet. Almost-Sure Model-Checking of Reactive Timed Automata. In Proceedings of the 9th International Conference on Quantitative Evaluation of Systems (QEST'12), pages 138--147, London, UK, September 2012. IEEE Computer Society Press.
doi: 10.1109/QEST.2012.10.
BibTex | DOI | Web page | PDF ]
[BLM12]
P. Bouyer, K. G. Larsen, and N. Markey. Lower-Bound Constrained Runs in Weighted Timed Automata. In Proceedings of the 9th International Conference on Quantitative Evaluation of Systems (QEST'12), pages 128--137, London, UK, September 2012. IEEE Computer Society Press.
doi: 10.1109/QEST.2012.28.
BibTex | DOI | Web page | PDF ]
[CFM12c]
M. Cadilhac, A. Finkel, and P. McKenzie. Unambiguous Constrained Automata. In Proceedings of the 16th International Conference on Developments in Language Theory (DLT'12), volume 7410 of Lecture Notes in Computer Science, pages 239--250, Taipei, Taiwan, August 2012. Springer.
doi: 10.1007/978-3-642-31653-1_22.
BibTex | DOI | Web page | PDF ]
[BKL12]
D. Berwanger, L. Kaiser, and S. Leßenich. Solving Counter Parity Games. In Proceedings of the 37th International Symposium on Mathematical Foundations of Computer Science (MFCS'12), volume 7464 of Lecture Notes in Computer Science, pages 160--171, Bratislava, Slovakia, August 2012. Springer.
doi: 10.1007/978-3-642-32589-2_17.
BibTex | DOI | Web page | PDF ]
[BBC+12]
P. Baldan, A. Bruni, A. Corradini, B. König, C. Rodríguez, and S. Schwoon. Efficient unfolding of contextual Petri nets. Theoretical Computer Science, 449(1):2--22, August 2012.
doi: 10.1016/j.tcs.2012.04.046.
BibTex | DOI | Web page | PDF ]
[BFK+12]
R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel, and J.-K. Tsay. Efficient Padding Oracle Attacks on Cryptographic Hardware. In Proceedings of the 32nd Annual International Cryptology Conference (CRYPTO'12), volume 7417 of Lecture Notes in Computer Science, pages 608--625, Santa Barbara, California, USA, August 2012. Springer.
doi: 10.1007/978-3-642-32009-5_36.
BibTex | DOI | Web page | PDF ]
[CD12b]
F. Carreiro and S. Demri. Beyond Regularity for Presburger Modal Logics. In Selected Papers from the 9th Workshop on Advances in Modal Logics (AiML'12), pages 161--182, Copenhagen, Denmark, August 2012. College Publications.
BibTex | Web page | PDF ]
[AFKS12]
É. André, L. Fribourg, U. Kühne, and R. Soulat. IMITATOR 2.5: A Tool for Analyzing Robustness in Scheduling Problems. In Proceedings of the 18th International Symposium on Formal Methods (FM'12), volume 7436 of Lecture Notes in Computer Science, pages 33--36, Paris, France, August 2012. Springer.
doi: 10.1007/978-3-642-32759-9_6.
BibTex | DOI | Web page | PDF ]
[AMH12]
A. Agarwal, A. Madalinski, and S. Haar. Effective Verification of Weak Diagnosability. In Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS'12), Mexico City, Mexico, August 2012. IFAC.
doi: 10.3182/20120829-3-MX-2028.00083.
BibTex | DOI | Web page | PDF ]
[DG12]
S. Demri and P. Gastin. Specification and Verification using Temporal Logics. In Modern applications of automata theory, volume 2 of IISc Research Monographs, chapter 15, pages 457--494. World Scientific, July 2012.
BibTex | Web page | PDF ]
[BDH+12]
D. Berwanger, A. Dawar, P. Hunter, S. Kreutzer, and J. Obdrzálek. The DAG-width of directed graphs. Journal of Combinatorial Theory, Series B, 102(4):900--923, July 2012.
doi: 10.1016/j.jctb.2012.04.004.
BibTex | DOI | Web page | PDF ]
[FFL+12c]
G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Numerical simulation and physical experimentation of a 5-level and 7-level power converter under a control designed by a formal method. Research Report LSV-12-16, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2012. 18 pages.
BibTex | Web page | PDF ]
[Loz12]
É. Lozes. Separation Logic: Expressiveness and Copyless Message-Passing. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, July 2012.
BibTex | Web page | PDF ]
[GM12]
P. Gastin and B. Monmege. Adding Pebbles to Weighted Automata. In Proceedings of the 17th International Conference on Implementation and Application of Automata (CIAA'12), volume 7381 of Lecture Notes in Computer Science, pages 28--51, Porto, Portugal, July 2012. Springer-Verlag.
doi: 10.1007/978-3-642-31606-7_4.
BibTex | DOI | Web page | PDF ]
[BMO+12]
P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen, and J. Worrell. On Termination and Invariance for Faulty Channel Systems. Formal Aspects of Computing, 24(4-6):595--607, July 2012.
doi: 10.1007/s00165-012-0234-7.
BibTex | DOI | Web page | PDF ]
[BDL12a]
B. Bollig, N. Decker, and M. Leucker. Frequency Linear-time Temporal Logic. In Proceedings of the 6th International Symposium on Theoretical Aspects of Software Engineering (TASE'12), pages 85--92, Beijing, China, July 2012. IEEE Computer Society Press.
doi: 10.1109/TASE.2012.43.
BibTex | DOI | Web page | PDF ]
[BMS12]
P. Bouyer, N. Markey, and O. Sankur. Robust Reachability in Timed Automata: A Game-based Approach. In Proceedings of the 39th International Colloquium on Automata, Languages and Programming (ICALP'12) -- Part II, volume 7392 of Lecture Notes in Computer Science, pages 128--140, Warwick, UK, July 2012. Springer.
doi: 10.1007/978-3-642-31585-5_15.
BibTex | DOI | Web page | PDF ]
[Ben12a]
H. Benzina. A Network Policy Model for Virtualized Systems. In Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12), pages 680--683, Nevsehir, Turkey, July 2012. IEEE Computer Society Press.
doi: 10.1109/ISCC.2012.6249376.
BibTex | DOI | Web page | PDF ]
[KS12a]
P. Karandikar and Ph. Schnoebelen. Cutting Through Regular Post Embedding Problems. In Proceedings of the 7th International Computer Science Symposium in Russia (CSR'12), volume 7353 of Lecture Notes in Computer Science, pages 229--240, Nizhni Novgorod, Russia, July 2012. Springer.
doi: 10.1007/978-3-642-30642-6_22.
BibTex | DOI | Web page | PDF ]
[Abi12c]
S. Abiteboul. Viewing the Web as a Distributed Knowledge Base. In Proceedings of the 2012 International Workshop Description Logic (DL'09), volume 846 of CEUR Workshop Proceedings, Rome, Italy, June 2012. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[CD12d]
K. Chatterjee and L. Doyen. Partial-Observation Stochastic Games: How to Win when Belief Fails. In Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS'12), pages 175--184, Dubrovnik, Croatia, June 2012. IEEE Computer Society Press.
doi: 10.1109/LICS.2012.28.
BibTex | DOI | Web page | PDF ]
[HP12]
S. Haddad and L. Pomello, editors. Proceedings of the 33rd International Conference on Applications and Theory of Petri Nets (ICATPN'12), volume 7347 of Lecture Notes in Computer Science, Hamburg, Germany, June 2012. Springer.
doi: 10.1007/978-3-642-31131-4.
BibTex | DOI | Web page ]
[FG12b]
A. Finkel and J. Goubault-Larrecq. The Theory of WSTS: The Case of Complete WSTS. In Proceedings of the 33rd International Conference on Applications and Theory of Petri Nets (PETRI NETS'12), volume 7347 of Lecture Notes in Computer Science, pages 3--31, Hamburg, Germany, June 2012. Springer.
doi: 10.1007/978-3-642-31131-4_2.
BibTex | DOI | Web page | PDF ]
[FFL+12a]
G. Feld, L. Fribourg, D. Labrousse, S. Lefebvre, B. Revol, and R. Soulat. Control of Multilevel Power Converters using Formal Methods. Research Report LSV-12-14, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2012. 14 pages.
BibTex | Web page | PDF ]
[Dja12]
H. Djafri. Approches numériques et statistiques pour le model checking des processus stochastiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2012.
BibTex | Web page | PDF ]
[HSS12]
S. Haddad, S. Schmitz, and Ph. Schnoebelen. The Ordinal-Recursive Complexity of Timed-Arc Petri Nets, Data Nets, and Other Enriched Nets. In Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS'12), pages 355--364, Dubrovnik, Croatia, June 2012. IEEE Computer Society Press.
doi: 10.1109/LICS.2012.46.
BibTex | DOI | Web page | PDF ]
[DDS12b]
S. Demri, A. K. Dhar, and A. Sangnier. Taming Past LTL and Flat Counter Systems. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in Artificial Intelligence, pages 179--193, Manchester, UK, June 2012. Springer-Verlag.
doi: 10.1007/978-3-642-31365-3_16.
BibTex | DOI | Web page | PDF ]
[ACD12]
M. Arapinis, V. Cheval, and S. Delaune. Verifying privacy-type properties in a modular way. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF'12), pages 95--109, Cambridge Massachusetts, USA, June 2012. IEEE Computer Society Press.
doi: 10.1109/CSF.2012.16.
BibTex | DOI | Web page | PDF ]
[DKP12]
S. Delaune, S. Kremer, and D. Pasailă. Security protocols, constraint systems, and group theories. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in Artificial Intelligence, pages 164--178, Manchester, UK, June 2012. Springer-Verlag.
doi: 10.1007/978-3-642-31365-3_15.
BibTex | DOI | Web page | PDF ]
[BCH12a]
S. Balaguer, Th. Chatain, and S. Haar. A Concurrency-Preserving Translation from Time Petri Nets to Networks of Timed Automata. Formal Methods in System Design, 40(3):330--355, June 2012.
doi: 10.1007/s10703-012-0146-4.
BibTex | DOI | Web page | PDF ]
[BK12]
B. Bollig and D. Kuske. An optimal construction of Hanf sentences. Journal of Applied Logic, 10(2):179--186, June 2012.
doi: 10.1016/j.jal.2012.01.002.
BibTex | DOI | Web page | PDF ]
[ABD12]
S. Abiteboul, M. Bienvenu, and D. Deutch. Deduction in the Presence of Distribution and Contradictions. In Proceedings of the 15th International Workshop on the Web and Databases (WebDB'12), pages 31--36, Scottsdale, Arizona, USA, May 2012.
BibTex | Web page | PDF ]
[AAMS12]
S. Abiteboul, Y. Amsterdamer, T. Milo, and P. Senellart. Auto-completion learning for XML. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'12), pages 669--672, Scottsdale, Arizona, USA, May 2012. ACM Press.
doi: 10.1145/2213836.2213928.
BibTex | DOI | Web page | PDF ]
[ABV12a]
S. Abiteboul, P. Bourhis, and V. Vianu. Comparing workflow specification languages: A matter of views. ACM Transactions on Database Systems, 37(2:10), May 2012.
doi: 10.1145/2188349.2188352.
BibTex | DOI | Web page | PDF ]
[PHL12]
H. Ponce de León, S. Haar, and D. Longuet. Conformance Relations for Labeled Event Structures. In Proceedings of the 6th International Conference on Tests and Proofs (TAP'12), volume 7305 of Lecture Notes in Computer Science, pages 83--98, Prague, Czech Republic, May-June 2012. Springer.
doi: 10.1007/978-3-642-30473-6_8.
BibTex | DOI | Web page | PDF ]
[IL12]
M. Izabachène and B. Libert. Divisible E-Cash in the Standard Model. In Proceedings of the 5th International Conference on Pairing-Based Cryptography (PAIRING'12), volume 7708 of Lecture Notes in Computer Science, pages 314--332, Cologne, Germany, May 2012. Springer.
doi: 10.1007/978-3-642-36334-4_20.
BibTex | DOI | Web page | PDF ]
[Ben12c]
H. Benzina. Towards Designing Secure Virtualized Systems. In Proceedings of the 2nd International Conference on Digital Information and Communication Technology and its Application (DICTAP'12), pages 250--255, Bangkok, Thailand, May 2012. IEEE Computer Society Press.
doi: 10.1109/DICTAP.2012.6215385.
BibTex | DOI | Web page | PDF ]
[CD12e]
H. Comon-Lundh and S. Delaune. Formal Security Proofs. In Software Safety and Security, volume 33 of NATO Science for Peace and Security Series -- D: Information and Communication Security, pages 26--63. IOS Press, May 2012.
BibTex | Web page | PDF ]
[CD12f]
V. Cortier and S. Delaune. Decidability and combination results for two notions of knowledge in security protocols. Journal of Automated Reasoning, 48(4):441--487, April 2012.
doi: 10.1007/s10817-010-9208-8.
BibTex | DOI | Web page | PDF ]
[ASV12]
S. Abiteboul, P. Senellart, and V. Vianu. The ERC webdam on foundations of web data management. In Proceedings of the 21st World Wide Web Conference (WWW'12) -- Companion Volume, pages 211--214, Lyon, France, April 2012. ACM Press.
BibTex | Web page | PDF ]
[AAS12]
S. Abiteboul, É. Antoine, and J. Stoyanovich. Viewing the Web as a Distributed Knowledge Base. In Proceedings of the 28th International Conference on Data Engineering (ICDE'12), pages 1--4, Washington, D.C., USA, April 2012. IEEE Computer Society Press.
doi: 10.1109/ICDE.2012.150.
BibTex | DOI | Web page | PDF ]
[AFS12]
É. André, L. Fribourg, and R. Soulat. Enhancing the Inverse Method with State Merging. In Proceedings of the 4th NASA Formal Methods Symposium (NFM'12), volume 7226 of Lecture Notes in Computer Science, pages 100--105, Norfolk, Virginia, USA, April 2012. Springer.
doi: 10.1007/978-3-642-28891-3_10.
BibTex | DOI | Web page | PDF ]
[GMM12]
P. Ganty, R. Majumdar, and B. Monmege. Bounded underapproximations. Formal Methods in System Design, 40(2):206--231, April 2012.
doi: 10.1007/s10703-011-0136-y.
BibTex | DOI | Web page | PDF ]
[CHKS12]
H. Comon-Lundh, M. Hagiya, Y. Kawamoto, and H. Sakurada. Computational Soundness of Indistinguishability Properties without Computable Parsing. In Proceedings of the 8th International Conference on Information Security Practice and Experience (ISPEC'12), volume 7232 of Lecture Notes in Computer Science, pages 63--79, Hangzhou, China, April 2012. Springer.
doi: 10.1007/978-3-642-29101-2_5.
BibTex | DOI | Web page | PDF ]
[BGGP12]
O. Bouissou, É. Goubault, J. Goubault-Larrecq, and S. Putot. A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs. Computing, 94(2-4):189--201, March 2012.
doi: 10.1007/s00607-011-0182-8.
BibTex | DOI | Web page | PDF ]
[BC12b]
G. Bana and H. Comon-Lundh. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 189--208, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28641-4_11.
BibTex | DOI | Web page | PDF ]
[CCS12]
H. Comon-Lundh, V. Cortier, and G. Scerri. Security proof with dishonest keys. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 149--168, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28641-4_9.
BibTex | DOI | Web page | PDF ]
[CDD12]
V. Cortier, J. Degrieck, and S. Delaune. Analysing routing protocols: four nodes topologies are sufficient. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 30--50, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28641-4_3.
BibTex | DOI | Web page | PDF ]
[BHP12a]
B. Barbot, S. Haddad, and C. Picaronny. Coupling and Importance Sampling for Statistical Model Checking. In Proceedings of the 18th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'12), volume 7214 of Lecture Notes in Computer Science, pages 331--346, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28756-5_23.
BibTex | DOI | Web page | PDF ]
[CMV12]
R. Chadha, P. Madhusudan, and M. Viswanathan. Reachability under Contextual Locking. In Proceedings of the 18th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'12), volume 7214 of Lecture Notes in Computer Science, pages 437--450, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28756-5_30.
BibTex | DOI | Web page | PDF ]
[BCGNK12]
B. Bollig, A. Cyriac, P. Gastin, and K. Narayan Kumar. Model Checking Languages of Data Words. In Proceedings of the 15th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages 391--405, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28729-9_26.
BibTex | DOI | Web page | PDF ]
[BBMU12]
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Concurrent games with ordered objectives. In Proceedings of the 15th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages 301--315, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28729-9_20.
BibTex | DOI | Web page | PDF ]
[BJ12]
A. Bouhoula and F. Jacquemard. Sufficient completeness verification for conditional and constrained TRS. Journal of Applied Logic, 10(1):127--143, March 2012.
doi: 10.1016/j.jal.2011.09.001.
BibTex | DOI | Web page | PDF ]
[ABV12b]
S. Abiteboul, P. Bourhis, and V. Vianu. Highly expressive query languages for unordered data trees. In Proceedings of the 15th International Conference on Database Theory (ICDT'12), pages 46--60, Berlin, Germany, March 2012. ACM Press.
doi: 10.1145/2274576.2274583.
BibTex | DOI | Web page | PDF ]
[AAD+12]
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and P. Senellart. Finding optimal probabilistic generators for XML collections. In Proceedings of the 15th International Conference on Database Theory (ICDT'12), pages 127--139, Berlin, Germany, March 2012. ACM Press.
doi: 10.1145/2274576.2274591.
BibTex | DOI | Web page | PDF ]
[IHL+12]
R. Iosif, P. Habermehl, S. Labbe, É. Lozes, and B. Yakobowski. Concurrent Programs with Simple Data Structures ash Sequential Programs with Composite Data Structures. Deliverable VERIDYC D 2 (ANR-09-SEGI-016), March 2012.
BibTex | Web page | PDF ]
[LL12]
M. Lange and É. Lozes. Model-Checking the Higher-Dimensional Modal μ-Calculus. In Proceedings of the 8th Workshop on Fixed Points in Computer Science (FICS'12), volume 77 of Electronic Proceedings in Theoretical Computer Science, pages 39--46, Tallinn, Estonia, March 2012.
doi: 10.4204/EPTCS.77.6.
BibTex | DOI | Web page | PDF ]
[BCH12b]
S. Balaguer, Th. Chatain, and S. Haar. Concurrent semantics for timed distributed systems. Deliverable ImpRo D 4.1 (ANR-2010-BLAN-0317), March 2012.
BibTex | Web page | PDF ]
[Doy12]
L. Doyen. Games and Automata: From Boolean to Quantitative Verification. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2012.
BibTex | Web page | PDF ]
[Sou12]
R. Soulat. Scheduling with IMITATOR: Some Case Studies. Research Report LSV-12-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2012. 13 pages.
BibTex | Web page | PDF ]
[CCK12]
R. Chadha, S. Ciobâcă, and S. Kremer. Automated verification of equivalence properties of cryptographic protocols. In Programming Languages and Systems --- Proceedings of the 22nd European Symposium on Programming (ESOP'12), volume 7211 of Lecture Notes in Computer Science, pages 108--127, Tallinn, Estonia, March 2012. Springer.
doi: 10.1007/978-3-642-28869-2_6.
BibTex | DOI | Web page | PDF ]
[BLL+12]
G. Belkacem, D. Labrousse, S. Lefebvre, P.-Y. Joubert, U. Kühne, L. Fribourg, R. Soulat, É. Florentin, and Ch. Rey. Distributed and Coupled Electrothermal Model of Power Semiconductor Devices. In Proceedings of the 1st International Conference on Renewable Energies and VEhicular Technology (REVET'12), pages 84--89, Hammamet, Tunisia, March 2012. IEEE Power & Energy Society.
doi: 10.1109/REVET.2012.6195253.
BibTex | DOI | Web page | PDF ]
[KMT12]
S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Journal of Automated Reasoning, 2(48):197--217, February 2012.
doi: 10.1007/s10817-010-9203-0.
BibTex | DOI | Web page | PDF ]
[CDK12]
S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, 48(2):219--262, February 2012.
doi: 10.1007/s10817-010-9197-7.
BibTex | DOI | Web page | PDF ]
[DJLL12]
S. Demri, M. Jurdziński, O. Lachish, and R. Lazić. The covering and boundedness problems for branching vector addition systems. Journal of Computer and System Sciences, 79(1):23--38, February 2012.
doi: 10.1016/j.jcss.2012.04.002.
BibTex | DOI | Web page | PDF ]
[BHP12c]
B. Barbot, S. Haddad, and C. Picaronny. Importance Sampling for Model Checking of Time-Bounded Until. Research Report LSV-12-04, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2012. 14 pages.
BibTex | Web page | PDF ]
[BHS12]
B. Bérard, S. Haddad, and M. Sassolas. Interrupt Timed Automata: Verification and Expressiveness. Formal Methods in System Design, 40(1):41--87, February 2012.
doi: 10.1007/s10703-011-0140-2.
BibTex | DOI | Web page | PDF ]
[BDL12b]
R. Brochenin, S. Demri, and É. Lozes. On the Almighty Wand. Information and Computation, 211:106--137, February 2012.
doi: 10.1016/j.ic.2011.12.003.
BibTex | DOI | Web page | PDF ]
[Gou12]
J. Goubault-Larrecq. QRB-Domains and the Probabilistic Powerdomain. Logical Methods in Computer Science, 8(1:14), 2012.
doi: 10.2168/LMCS-8(1:14)2012.
BibTex | DOI | Web page | PDF ]
[CD12a]
P. Cabalar and S. Demri. Automata-Based Computation of Temporal Equilibrium Models. In Proceedings of the 21st International Workshop on Logic Program Synthesis and Transformation (LOPSTR'11), volume 7225 of Lecture Notes in Computer Science, pages 57--72, Odense, Denmark, 2012. Springer.
doi: 10.1007/978-3-642-32211-2_5.
BibTex | DOI | Web page | PDF ]
[DDS12a]
M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Anonymous Location Based Services. In Revised Selected Papaers of the Workshop on Theory of Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in Computer Science, pages 98--112, Saarbrücken, Germany, January 2012. Springer.
doi: 10.1007/978-3-642-27375-9_6.
BibTex | DOI | Web page | PDF ]
[JLTV12]
F. Jacquemard, É. Lozes, R. Treinen, and J. Villard. Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus. In Revised Selected Papaers of the Workshop on Theory of Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in Computer Science, pages 166--185, Saarbrücken, Germany, January 2012. Springer.
doi: 10.1007/978-3-642-27375-9_10.
BibTex | DOI | Web page | PDF ]
[Abi12a]
S. Abiteboul. Sciences des données: De la logique du premier ordre à la Toile. Leçons inaugurales du Collège de France. Fayard, 2012.
BibTex ]
[LV12]
É. Lozes and J. Villard. Reliable Contracts for Unreliable Half-Duplex Communications. In Revised Selected Papers of the 8th International Workshop on Web Services and Formal Methods (WS-FM'11), volume 7176 of Lecture Notes in Computer Science, pages 2--16, Clermont-Ferrand, France, 2012. Springer.
doi: 10.1007/978-3-642-29834-9_2.
BibTex | DOI | Web page | PDF ]
[ABB+12]
S. Akshay, B. Bérard, P. Bouyer, S. Haar, S. Haddad, C. Jard, D. Lime, N. Markey, P.-A. Reynier, O. Sankur, and Y. Thierry-Mieg. Overview of Robustness in Timed Systems. Deliverable ImpRo D 2.1 (ANR-2010-BLAN-0317), January 2012.
BibTex | Web page | PDF ]
[AGG12]
A. Adjé, S. Gaubert, and É. Goubault. Coupling policy iteration with semi-definite relaxation to compute accurate numerical invariants in static analysis. Logical Methods in Computer Science, 8(1:1), January 2012.
doi: 10.2168/LMCS-8(1:01)2012.
BibTex | DOI | Web page | PDF ]
[Fig12]
D. Figueira. Alternating register automata on finite words and trees. Logical Methods in Computer Science, 8(1:22), 2012.
doi: 10.2168/LMCS-8(1:22)2012.
BibTex | DOI | Web page | PDF ]
[BFLZ12]
R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun. Model Checking Vector Addition Systems with one zero-test. Logical Methods in Computer Science, 8(2:11), 2012.
doi: 10.2168/LMCS-8(2:11)2012.
BibTex | DOI | Web page | PDF ]
[EHH12]
D. El Hog-Benzina, S. Haddad, and R. Hennicker. Refinement and Asynchronous Composition of Modal Petri Nets. In Transactions on Petri Nets and Other Models of Concurrency V, volume 6900 of Lecture Notes in Computer Science, pages 96--120. Springer, 2012.
doi: 10.1007/978-3-642-29072-5_4.
BibTex | DOI | Web page | PDF ]
[ACK+11]
S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and P. Senellart. Capturing continuous data and answering aggregate queries in probabilistic XML. ACM Transactions on Database Systems, 36(4:25), December 2011.
doi: 10.1145/2043652.2043658.
BibTex | DOI | Web page | PDF ]
[ACD11b]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Research Report LSV-11-24, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. 66 pages.
BibTex | Web page | PDF ]
[Arn11]
M. Arnaud. Formal verification of secured routing protocols. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011.
BibTex | Web page | PDF ]
[Cio11a]
S. Ciobâcă. Automated Verification of Security Protocols with Appplications to Electronic Voting. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011.
BibTex | Web page | PDF ]
[LV11]
É. Lozes and J. Villard. Sharing Contract-Obedient Endpoints. Research Report LSV-11-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. 42 pages.
BibTex | Web page | PDF ]
[ILV11]
M. Izabachène, B. Libert, and D. Vergnaud. Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes. In Proceedings of the 13th IMA International Conference on Cryptography and Coding (IMACC'11), volume 7089 of Lecture Notes in Computer Science, pages 431--450, Oxford, UK, December 2011. Springer.
doi: 10.1007/978-3-642-25516-8_26.
BibTex | DOI | Web page | PDF ]
[DDMM11]
Ph. Darondeau, S. Demri, R. Meyer, and Ch. Morvan. Petri Net Reachability Graphs: Decidability Status of FO Properties. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 140--151, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.140.
BibTex | DOI | Web page | PDF ]
[SBM11]
O. Sankur, P. Bouyer, and N. Markey. Shrinking Timed Automata. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 90--102, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.90.
BibTex | DOI | Web page | PDF ]
[CDK11]
C. Chevalier, S. Delaune, and S. Kremer. Transforming Password Protocols to Compose. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 204--216, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.204.
BibTex | DOI | Web page | PDF ]
[BBMU11]
P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Nash Equilibria in Concurrent Games with Büchi Objectives. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 375--386, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.375.
BibTex | DOI | Web page | PDF ]
[BKP11]
D. Berwanger, L. Kaiser, and B. Puchala. Perfect-Information Construction for Coordination in Games. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 387--398, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2011.387.
BibTex | DOI | Web page | PDF ]
[AGM11]
S. Abiteboul, G. Gottlob, and M. Manna. Distributed XML design. Journal of Computer and System Sciences, 77(6):936--964, November 2011.
doi: 10.1016/j.jcss.2011.02.003.
BibTex | DOI | Web page | PDF ]
[PS11]
Th. Place and L. Segoufin. A decidable characterization of locally testable tree languages. Logical Methods in Computer Science, 7(4:03), November 2011.
doi: 10.2168/LMCS-7(4:3)2011.
BibTex | DOI | Web page | PDF ]
[Jac11]
F. Jacquemard. Extended Tree Automata for the Verification of Infinite State Systems. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, November 2011.
BibTex | Web page | PDF ]
[ECGJ11]
J. Echeveste, A. Cont, J.-L. Giavitto, and F. Jacquemard. Formalisation des relations temporelles entre une partition et une performance musicale dans un contexte d'accompagnement automatique. In Actes du 8ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'11), volume 45 of Journal Européen des Systèmes Automatisés, pages 109--124, Lille, France, November 2011. Hermès.
doi: 10.3166/jesa.45.109-124.
BibTex | DOI | Web page | PDF ]
[BHP11]
B. Barbot, S. Haddad, and C. Picaronny. Échantillonnage préférentiel pour le model checking statistique. In Actes du 8ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'11), volume 45 of Journal Européen des Systèmes Automatisés, pages 237--252, Lille, France, November 2011. Hermès.
doi: 10.3166/jesa.45.237-252.
BibTex | DOI | Web page | PDF ]
[SGA11]
F. M. Suchanek, D. Gross-Amblard, and S. Abiteboul. Watermarking for Ontologies. In Proceedings of the 10th International Semantic Web Conference (ISWC'11), volume 7031 of Lecture Notes in Computer Science, pages 697--713, Bonn, Germany, October 2011. Springer.
doi: 10.1007/978-3-642-25073-6_44.
BibTex | DOI | Web page | PDF ]
[CD11b]
K. Chatterjee and L. Doyen. Games and Markov Decision Processes with Mean-payoff Parity and Energy Parity Objectives. In Proceedings of the 7th Annual Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS'11), volume 7119 of Lecture Notes in Computer Science, Lednice, Czech Republic, October 2011. Springer.
BibTex | Web page | PDF ]
[BBD+11b]
Th. Brihaye, V. Bruyère, L. Doyen, M. Ducobu, and J.-F. Raskin. Antichain-based QBF Solving. In Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis (ATVA'11), volume 6996 of Lecture Notes in Computer Science, pages 183--197, Taipei, Taiwan, October 2011. Springer.
doi: 10.1007/978-3-642-24372-1_14.
BibTex | DOI | Web page | PDF ]
[JKS11]
F. Jacquemard, Y. Kojima, and M. Sakai. Controlled Term Rewriting. In Proceedings of the 8th International Symposium on Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture Notes in Artificial Intelligence, pages 179--194, Saarbrücken, Germany, October 2011. Springer.
BibTex | DOI | Web page | PDF ]
[FRS11]
L. Fribourg, B. Revol, and R. Soulat. Synthesis of Switching Rules for Ensuring Reachability Properties of Sampled Linear Systems. In Proceedings of the 13th International Workshops on Verification of Infinite State Systems (INFINITY'11), volume 73 of Electronic Proceedings in Theoretical Computer Science, pages 35--48, Taipei, Taiwan, October 2011.
doi: 10.4204/EPTCS.73.6.
BibTex | DOI | Web page | PDF ]
[BD11]
M. Bersani and S. Demri. The complexity of reversal-bounded model-checking. In Proceedings of the 8th International Symposium on Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture Notes in Artificial Intelligence, pages 71--86, Saarbrücken, Germany, October 2011. Springer.
doi: 10.1007/978-3-642-24364-6_6.
BibTex | DOI | Web page | PDF ]
[BKL11]
D. Berwanger, L. Kaiser, and S. Leßenich. Imperfect Recall and Counter Games. Research Report LSV-11-20, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2011. 21 pages.
BibTex | Web page | PDF ]
[CCD11]
V. Cheval, H. Comon-Lundh, and S. Delaune. Trace Equivalence Decision: Negative Tests and Non-determinism. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), pages 321--330, Chicago, Illinois, USA, October 2011. ACM Press.
doi: 10.1145/2046707.2046744.
BibTex | DOI | Web page | PDF ]
[BMOU11]
P. Bouyer, N. Markey, J. Olschewski, and M. Ummels. Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited. In Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis (ATVA'11), volume 6996 of Lecture Notes in Computer Science, pages 135--149, Taipei, Taiwan, October 2011. Springer.
doi: 10.1007/978-3-642-24372-1_11.
BibTex | DOI | Web page | PDF ]
[CSV11a]
R. Chadha, A. P. Sistla, and M. Viswanathan. Power of Randomization in Automata on Infinite Strings. Logical Methods in Computer Science, 7(3:22), September 2011.
doi: 10.2168/LMCS-7(3:22)2011.
BibTex | DOI | Web page | PDF ]
[KD11]
A. Kumar Dhar. Counter Systems with Presburger-definable Reachability Sets: Decidability and Complexity. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011.
BibTex | Web page | PDF ]
[Cha11]
P. Chambart. Du Problème de sous-mot de Post et de la complexité des canaux non fiables. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011.
BibTex | Web page | PDF ]
[Gal11]
A. Galland. Distributed Data Management with Access Control. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011.
BibTex | Web page | PDF ]
[UW11b]
M. Ummels and D. Wojtczak. The Complexity of Nash Equilibria in Stochastic Multiplayer Games. Logical Methods in Computer Science, 7(3:20), September 2011.
doi: 10.2168/LMCS-7(3:20)2011.
BibTex | DOI | Web page | PDF ]
[Da 11]
A. Da Costa. Propriétés de jeux multi-agents. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011.
BibTex | Web page | PDF ]
[Pas11b]
D. Pasailă. Verifying equivalence properties of security protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011.
BibTex | Web page | PDF ]
[Deg11]
J. Degrieck. Réduction de graphes pour l'analyse de protocoles de routage sécurisés. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011.
BibTex | Web page | PDF ]
[CFM11a]
M. Cadilhac, A. Finkel, and P. McKenzie. Bounded Parikh Automata. In Proceedings of the 8th International Conference WORDS (WORDS'11), volume 63 of Electronic Proceedings in Theoretical Computer Science, pages 93--102, Prague, Czech Republic, September 2011.
doi: 10.4204/EPTCS.63.13.
BibTex | DOI | Web page | PDF ]
[FLS11]
R. Focardi, F. L. Luccio, and G. Steel. An Introduction to Security API Analysis. In Foundations of Security Analysis and Design -- FOSAD Tutorial Lectures (FOSAD'VI), volume 6858 of Lecture Notes in Computer Science, pages 35--65. Springer, September 2011.
doi: 10.1007/978-3-642-23082-0_2.
BibTex | DOI | Web page | PDF ]
[BMS11]
P. Bouyer, N. Markey, and O. Sankur. Robust Model-Checking of Timed Automata via Pumping in Channel Machines. In Proceedings of the 9th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'11), volume 6919 of Lecture Notes in Computer Science, pages 97--112, Aalborg, Denmark, September 2011. Springer.
doi: 10.1007/978-3-642-24310-3_8.
BibTex | DOI | Web page | PDF ]
[Bon11a]
R. Bonnet. Decidability of LTL Model Checking for Vector Addition Systems with one Zero-test. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 85--95, Genova, Italy, September 2011. Springer.
doi: 10.1007/978-3-642-24288-5_9.
BibTex | DOI | Web page | PDF ]
[FK11a]
L. Fribourg and U. Kühne. Parametric Verification and Test Coverage for Hybrid Automata Using the Inverse Method. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 191--204, Genova, Italy, September 2011. Springer.
doi: 10.1007/978-3-642-24288-5_17.
BibTex | DOI | Web page | PDF ]
[AS11]
É. André and R. Soulat. Synthesis of Timing Parameters Satisfying Safety Properties. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 31--44, Genova, Italy, September 2011. Springer.
doi: 10.1007/978-3-642-24288-5_5.
BibTex | DOI | Web page | PDF ]
[CKV+11]
R. Chadha, V. Korthikranthi, M. Viswanathan, G. Agha, and Y. Kwon. Model Checking MDPs with a Unique Compact Invariant Set of Distributions. In Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11), pages 121--130, Aachen, Germany, September 2011. IEEE Computer Society Press.
doi: 10.1109/QEST.2011.22.
BibTex | DOI | Web page | PDF ]
[BDD+11a]
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. COSMOS: a Statistical Model Checker for the Hybrid Automata Stochastic Logic. In Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11), pages 143--144, Aachen, Germany, September 2011. IEEE Computer Society Press.
doi: 10.1109/QEST.2011.24.
BibTex | DOI | Web page | PDF ]
[BFH11]
M. Beccuti, G. Franceschinis, and S. Haddad. MDWNsolver: A Framework to Design and Solve Markov Decision Petri Nets. International Journal of Performability Engineering, 7(5):417--428, September 2011.
BibTex | Web page | PDF ]
[UW11a]
M. Ummels and D. Wojtczak. The Complexity of Nash Equilibria in Limit-Average Games. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 482--496, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_32.
BibTex | DOI | Web page | PDF ]
[Bol11]
B. Bollig. An automaton over data words that captures EMSO logic. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 171--186, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_12.
BibTex | DOI | Web page | PDF ]
[RSB11]
C. Rodríguez, S. Schwoon, and P. Baldan. Efficient contextual unfolding. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 342--357, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_23.
BibTex | DOI | Web page | PDF ]
[BLM+11]
P. Bouyer, K. G. Larsen, N. Markey, O. Sankur, and C. Thrane. Timed automata can always be made implementable. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 76--91, Aachen, Germany, September 2011. Springer.
doi: 10.1007/978-3-642-23217-6_6.
BibTex | DOI | Web page | PDF ]
[BFLM11]
P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey. Quantitative analysis of real-time systems using priced timed automata. Communications of the ACM, 54(9):78--87, September 2011.
doi: 10.1145/1995376.1995396.
BibTex | DOI | Web page | PDF ]
[CDS11]
K. Chatterjee, L. Doyen, and R. Singh. On Memoryless Quantitative Objectives. In Proceedings of the 18th International Symposium on Fundamentals of Computation Theory (FCT'11), volume 6914 of Lecture Notes in Computer Science, pages 148--159, Oslo, Norway, August 2011. Springer.
doi: 10.1007/978-3-642-22953-4_13.
BibTex | DOI | Web page | PDF ]
[CD11a]
K. Chatterjee and L. Doyen. Energy and Mean-Payoff Parity Markov Decision Processes. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 206--218, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_21.
BibTex | DOI | Web page | PDF ]
[DMS11a]
L. Doyen, Th. Massart, and M. Shirmohammadi. Infinite Synchronizing Words for Probabilistic Automata. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 278--289, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_27.
BibTex | DOI | Web page | PDF ]
[BCGZ11]
B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun. Temporal Logics for Concurrent Recursive Programs: Satisfiability and Model Checking. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 132--144, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_15.
BibTex | DOI | Web page | PDF ]
[BS11]
M. Blockelet and S. Schmitz. Model-Checking Coverability Graphs of Vector Addition Systems. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 108--119, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_13.
BibTex | DOI | Web page | PDF ]
[San11]
O. Sankur. Untimed Language Preservation in Timed Systems. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 556--567, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_50.
BibTex | DOI | Web page | PDF ]
[Bon11b]
R. Bonnet. The reachability problem for Vector Addition Systems with one zero-test. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 145--157, Warsaw, Poland, August 2011. Springer.
doi: 10.1007/978-3-642-22993-0_16.
BibTex | DOI | Web page | PDF ]
[BDD+11c]
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. Petri Nets Compositional Modeling and Verification of Flexible Manufacturing Systems. In Proceedings of the 7th IEEE Conference on Automation Science and Engineering (CASE'11), pages 588--593, Trieste, Italy, August 2011. IEEE Robotics & Automation Society.
doi: 10.1109/CASE.2011.6042488.
BibTex | DOI | Web page | PDF ]
[Gou11a]
J. Goubault-Larrecq. A Few Pearls in the Theory of Quasi-Metric Spaces. Invited talk, Fifth International Conference on Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July 2011, July 2011.
BibTex ]
[BDM+11]
M. Bojańczyk, C. David, A. Muscholl, Th. Schwentick, and L. Segoufin. Two-variable logic on data words. ACM Transactions on Computational Logic, 12(4:27), July 2011.
doi: 10.1145/1970398.1970403.
BibTex | DOI | Web page | PDF ]
[LPS11]
F. Luccio, L. Pagli, and G. Steel. Mathematical and Algorithmic Foundations of the Internet. CRC Press, July 2011.
BibTex | Web page ]
[CFM11b]
M. Cadilhac, A. Finkel, and P. McKenzie. On the Expressiveness of Parikh Automata and Related Models. In Proceedings of the 3rd Workshop on Non-Classical Models of Automata and Applications (NCMA'11), volume 282 of books@ocg.at, pages 103--119, Milano, Italy, July 2011. Austrian Computer Society.
BibTex | DOI | Web page | PDF ]
[SR11]
S. Schwoon and C. Rodríguez. Construction and SAT-based verification of Contextual Unfoldings. In Proceedings of the 13th International Workshop on Descriptional Complexity of Formal Systems (DCFS'11), volume 6808 of Lecture Notes in Computer Science, pages 34--42, Limburg, Germany, July 2011. Springer.
doi: 10.1007/978-3-642-22600-7_3.
BibTex | DOI | Web page | PDF ]
[Cio11b]
S. Ciobâcă. Computing finite variants for subterm convergent rewrite systems. In Proceedings of the 25th International Workshop on Unification (UNIF'11), Wroclaw, Poland, July 2011.
BibTex | Web page | PDF ]
[Sch11]
S. Schmitz. A Note on Sequential Rule-Based POS Tagging. In Proceedings of the 9th International Workshop on Finite-State Methods and Natural Language Processing (FSMNLP'11), pages 83--87, Blois, France, July 2011. ACL Press.
BibTex | Web page | PDF ]
[BBBS11]
N. Bertrand, P. Bouyer, Th. Brihaye, and A. Stainer. Emptiness and Universality Problems in Timed Automata with Positive Frequency. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 246--257, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_19.
BibTex | DOI | Web page | PDF ]
[BDG+11]
Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine, J.-F. Raskin, and J. Worrell. On Reachability for Hybrid Automata over Bounded Time. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 416--427, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_33.
BibTex | DOI | Web page | PDF ]
[BtCS11]
V. Bárány, B. ten Cate, and L. Segoufin. Guarded negation. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 356--367, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_28.
BibTex | DOI | Web page | PDF ]
[SS11]
S. Schmitz and Ph. Schnoebelen. Multiply-Recursive Upper Bounds with Higman's Lemma. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 441--452, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_35.
BibTex | DOI | Web page | PDF ]
[AvMSS11]
M. Anderson, D. van Melkebeek, N. Schweikardt, and L. Segoufin. Locality of queries definable in invariant first-order logic with arbitrary built-in predicates. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 368--379, Zürich, Switzerland, July 2011. Springer.
doi: 10.1007/978-3-642-22012-8_29.
BibTex | DOI | Web page | PDF ]
[ACD11a]
M. Arnaud, V. Cortier, and S. Delaune. Deciding security for protocols with recursive tests. In Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), volume 6803 of Lecture Notes in Computer Science, pages 49--63, Wroclaw, Poland, July 2011. Springer.
doi: 10.1007/978-3-642-22438-6_6.
BibTex | DOI | Web page | PDF ]
[AFFM11]
C. Areces, D. Figueira, S. Figueira, and S. Mera. The Expressive Power of Memory Logics. Review of Symbolic Logic, 4(2):290 -- 318, June 2011.
doi: 10.1017/S1755020310000389.
BibTex | DOI | Web page | PDF ]
[GK11]
J. Goubault-Larrecq and K. Keimel. Choquet-Kendall-Matheron Theorems for Non-Hausdorff Spaces. Mathematical Structures in Computer Science, 21(3):511--561, June 2011.
doi: 10.1017/S0960129510000617.
BibTex | DOI | Web page | PDF ]
[AGP11]
S. Abiteboul, A. Galland, and N. Polyzotis. Web information management with access control. In Proceedings of the 14th International Workshop on the Web and Databases (WebDB'11), Athens, Greece, June 2011.
BibTex | Web page | PDF ]
[KS11]
W. Kazana and L. Segoufin. First-order query evaluation on structures of bounded degree. Logical Methods in Computer Science, 7(2:20), June 2011.
doi: 10.2168/LMCS-7(2:20)2011.
BibTex | DOI | Web page | PDF ]
[ABGA11]
S. Abiteboul, M. Bienvenu, A. Galland, and É. Antoine. A rule-based language for Web data management. In Proceedings of the 30th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'11), pages 293--304, Athens, Greece, June 2011. ACM Press.
doi: 10.1145/1989284.1989320.
BibTex | DOI | Web page | PDF ]
[BCJ+11]
M. Backes, I. Cervesato, A. Jaggard, A. Scedrov, and J.-K. Tsay. Cryptographically sound security proofs for basic and public-key Kerberos. International Journal on Information Security, 10(2):107--134, June 2011.
doi: 10.1007/s10207-011-0125-6.
BibTex | DOI | Web page | PDF ]
[HKS11]
S. Haar, C. Kern, and S. Schwoon. Computing the Reveals Relation in Occurrence Nets. In Proceedings of the 2nd International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'11), volume 54 of Electronic Proceedings in Theoretical Computer Science, pages 31--44, Minori, Italy, June 2011.
doi: 10.4204/EPTCS.54.3.
BibTex | DOI | Web page | PDF ]
[FFK+11]
É. Florentin, L. Fribourg, U. Kühne, S. Lefebvre, and Ch. Rey. COUPLET: Coupled Electrothermal Simulation. Research Report LSV-11-18, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2011. 32 pages.
BibTex | Web page | PDF ]
[Mar11a]
N. Markey. Robustness in Real-time Systems. In Proceedings of the 6th IEEE International Symposium on Industrial Embedded Systems (SIES'11), pages 28--34, Västerås, Sweden, June 2011. IEEE Computer Society Press.
doi: 10.1109/SIES.2011.5953652.
BibTex | DOI | Web page | PDF ]
[KSW11]
S. Kremer, G. Steel, and B. Warinschi. Security for Key Management Interfaces. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pages 266--280, Cernay-la-Ville, France, June 2011. IEEE Computer Society Press.
doi: 10.1109/CSF.2011.25.
BibTex | DOI | Web page | PDF ]
[DKRS11]
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. Formal analysis of protocols based on TPM state registers. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pages 66--82, Cernay-la-Ville, France, June 2011. IEEE Computer Society Press.
doi: 10.1109/CSF.2011.12.
BibTex | DOI | Web page | PDF ]
[BCH11]
S. Balaguer, Th. Chatain, and S. Haar. Building Tight Occurrence Nets from Reveals Relations. In Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11), pages 44--53, Newcastle upon Tyne, UK, June 2011. IEEE Computer Society Press.
doi: 10.1109/ACSD.2011.16.
BibTex | DOI | Web page | PDF ]
[HMN11]
S. Haddad, J. Mairesse, and H.-T. Nguyen. Synthesis and Analysis of Product-form Petri Nets. In Proceedings of the 32nd International Conference on Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709 of Lecture Notes in Computer Science, pages 288--307, Newcastle upon Tyne, UK, June 2011. Springer.
doi: 10.1007/978-3-642-21834-7_16.
BibTex | DOI | Web page | PDF ]
[CFS11]
P. Chambart, A. Finkel, and S. Schmitz. Forward Analysis and Model Checking for Trace Bounded WSTS. In Proceedings of the 32nd International Conference on Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709 of Lecture Notes in Computer Science, Newcastle upon Tyne, UK, June 2011. Springer.
doi: 10.1007/978-3-642-21834-7_4.
BibTex | DOI | Web page ]
[FFSS11]
D. Figueira, S. Figueira, S. Schmitz, and Ph. Schnoebelen. Ackermannian and Primitive-Recursive Bounds with Dickson's Lemma. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 269--278, Toronto, Canada, June 2011. IEEE Computer Society Press.
doi: 10.1109/LICS.2011.39.
BibTex | DOI | Web page | PDF ]
[GV11]
J. Goubault-Larrecq and D. Varacca. Continuous Random Variables. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 97--106, Toronto, Canada, June 2011. IEEE Computer Society Press.
doi: 10.1109/LICS.2011.23.
BibTex | DOI | Web page | PDF ]
[Fig11]
D. Figueira. A decidable two-way logic on data words. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 365--374, Toronto, Canada, June 2011. IEEE Computer Society Press.
doi: 10.1109/LICS.2011.18.
BibTex | DOI | Web page | PDF ]
[Ben11]
H. Benzina. Logic in Virtualized Systems. In Proceedings of the International Conference on Computer Applications and Network Security (ICCANS'11), Republic of Maldives, May 2011.
BibTex | Web page | PDF ]
[LS11]
L. Libkin and C. Sirangelo. Data exchange and schema mappings in open and closed worlds. Journal of Computer and System Sciences, 77(3):542--571, May 2011.
doi: 10.1016/j.jcss.2010.04.010.
BibTex | DOI | Web page | PDF ]
[BDD+11b]
P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. HASL: An Expressive Language for Statistical Verification of Stochastic Models. In Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'11), pages 306--315, Cachan, France, May 2011.
BibTex | Web page | PDF ]
[BCL11]
P. Bouyer, F. Cassez, and F. Laroussinie. Timed Modal Logics for Real-Time Systems: Specification, Verification and Control. Journal of Logic, Language and Information, 20(2):169--203, April 2011.
doi: 10.1007/s10849-010-9127-4.
BibTex | DOI | Web page | PDF ]
[ABKT11]
S. Abiteboul, K. Böhm, C. Koch, and K.-L. Tan. Proceedings of the 27th International Conference on Data Engineering (ICDE'11). In Proceedings of the 27th International Conference on Data Engineering (ICDE'11), Hannover, Germany, April 2011. IEEE Computer Society Press.
doi: 10.1109/ICDE.2011.5767975.
BibTex | DOI | Web page ]
[BCD+11]
L. Brim, J. Chaloupka, L. Doyen, R. Gentilini, and J.-F. Raskin. Faster algorithms for mean-payoff games. Formal Methods in System Design, 38(2):97--118, April 2011.
doi: 10.1007/s10703-010-0105-x.
BibTex | DOI | Web page | PDF ]
[AGL+11]
É. Antoine, A. Galland, K. Lyngbaek, A. Marian, and N. Polyzotis. Social networking on top of the WebdamExchange system. In Proceedings of the 27th International Conference on Data Engineering (ICDE'11), pages 1300--1303, Hannover, Germany, April 2011. IEEE Computer Society Press.
doi: 10.1109/ICDE.2011.5767939.
BibTex | DOI | Web page | PDF ]
[BGMZ11]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Weighted Expressions and DFS Tree Automata. Research Report LSV-11-08, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2011. 32 pages.
BibTex | Web page | PDF ]
[Mar11b]
N. Markey. Verification of Embedded Systems -- Algorithms and Complexity. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, April 2011.
BibTex | Web page | PDF ]
[Gou11b]
J. Goubault-Larrecq. Musings Around the Geometry of Interaction, and Coherence. Theoretical Computer Science, 412(20):1998--2014, April 2011.
doi: 10.1016/j.tcs.2010.12.023.
BibTex | DOI | Web page | PDF ]
[ABGR11]
S. Abiteboul, M. Bienvenu, A. Galland, and M.-Ch. Rousset. Distributed Datalog Revisited. In Revised Selected Papers of the 1st International Workshop Datalog Reloaded (Datalog'10), volume 6702 of Lecture Notes in Computer Science, pages 252--261, Oxford, UK, March 2011. Springer.
doi: 10.1007/978-3-642-24206-9_15.
BibTex | DOI | Web page | PDF ]
[JKV11]
F. Jacquemard, F. Klay, and C. Vacher. Rigid Tree Automata. Information and Computation, 209(3):486--512, March 2011.
doi: 10.1016/j.ic.2010.11.015.
BibTex | DOI | Web page | PDF ]
[AtCK11]
S. Abiteboul, B. ten Cate, and Y. Katsis. On the equivalence of distributed systems with queries and communication. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 126--137, Uppsala, Sweden, March 2011. ACM Press.
doi: 10.1145/1938551.1938570.
BibTex | DOI | Web page | PDF ]
[ABV11]
S. Abiteboul, P. Bourhis, and V. Vianu. Comparing workflow specification languages: a matter of views. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 78--89, Uppsala, Sweden, March 2011. ACM Press.
doi: 10.1145/1938551.1938564.
BibTex | DOI | Web page | PDF ]
[DMS11b]
L. Doyen, Th. Massart, and M. Shirmohammadi. Synchronizing Objectives for Markov Decision Processes. In Proceedings of the International Workshop on Interactions, Games and Protocols (iWIGP'11), volume 50 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Saarbrücken, Germany, March 2011.
BibTex | Web page | PDF ]
[FK11b]
L. Fribourg and U. Kühne. Parametric Verification of Hybrid Automata Using the Inverse Method. Research Report LSV-11-04, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2011. 25 pages.
BibTex | Web page | PDF ]
[CC11]
H. Comon-Lundh and V. Cortier. How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 29--44, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.29.
BibTex | DOI | Web page | PDF ]
[tCS11]
B. ten Cate and L. Segoufin. Unary negation. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 344--355, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.344.
BibTex | DOI | Web page | PDF ]
[ST11]
L. Segoufin and S. Toruńczyk. Automata based verification over linearly ordered data domains. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 81--92, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.81.
BibTex | DOI | Web page | PDF ]
[Kre11]
S. Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011.
BibTex | Web page | PDF ]
[Ste11b]
G. Steel. Formal Analysis of Security APIs. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011.
BibTex | Web page | PDF ]
[Del11]
S. Delaune. Verification of security protocols: from confidentiality to privacy. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011.
BibTex | Web page | PDF ]
[Pas11a]
D. Pasailă. Conjunctive queries determinacy and rewriting. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 220--231, Uppsala, Sweden, March 2011. ACM Press.
doi: 10.1145/1938551.1938580.
BibTex | DOI | Web page | PDF ]
[BFHR11]
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Ordinal Theory for Expressiveness of Well Structured Transition Systems. In Proceedings of the 14th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'11), volume 6604 of Lecture Notes in Computer Science, pages 153--167, Saarbrücken, Germany, March-April 2011. Springer.
doi: 10.1007/978-3-642-19805-2_11.
BibTex | DOI | Web page | PDF ]
[FS11]
D. Figueira and L. Segoufin. Bottom-up automata on data trees and vertical XPath. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 93--104, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.STACS.2011.93.
BibTex | DOI | Web page | PDF ]
[Bou11]
P. Bourhis. On the dynamics of active documents for distributed data management. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2011.
BibTex | Web page | PDF ]
[ACGP11]
M. Abdalla, C. Chevalier, L. Granboulan, and D. Pointcheval. Contributory Password-Authenticated Group Key Exchange with Join Capability. In Proceedings of the Cryptographers' Track at the RSA Conference 2011 (CT-RSA'11), volume 6558 of Lecture Notes in Computer Science, pages 142--160, San Francisco, California, USA, February 2011. Springer.
doi: 10.1007/978-3-642-19074-2_11.
BibTex | DOI | Web page | PDF ]
[Vil11]
J. Villard. Heaps and Hops. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2011.
BibTex | Web page | PDF ]
[BBD+11a]
S. Baarir, M. Beccuti, C. Dutheillet, G. Franceschinis, and S. Haddad. Lumping partially symmetrical stochastic models. Performance Evaluation, 76:21--44, January 2011.
doi: 10.1016/j.peva.2010.09.002.
BibTex | DOI | Web page | PDF ]
[CSV11b]
R. Chadha, A. P. Sistla, and M. Viswanathan. Probabilistic Büchi automata with non-extremal acceptance thresholds. In Proceedings of the 12th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'11), volume 6538 of Lecture Notes in Computer Science, pages 103--117, Austin, Texas, USA, January 2011. Springer.
doi: 10.1007/978-3-642-18275-4_9.
BibTex | DOI | Web page | PDF ]
[DR11]
L. Doyen and J.-F. Raskin. Games with Imperfect Information: Theory and Algorithms. In Lectures in Game Theory for Computer Scientists. Cambridge University Press, January 2011.
BibTex | Web page | PS | PDF ]
[Ste11a]
G. Steel. Formal Analysis of Security APIs. In Encyclopedia of Cryptography and Security, pages 492--494. Springer, 2nd edition, 2011.
doi: 10.1007/978-1-4419-5906-5_873.
BibTex | DOI ]
[AMR+11]
S. Abiteboul, I. Manolescu, Ph. Rigaux, M.- Ch. Rousset, and P. Senellart. Web Data Management. Cambridge University Press, 2011.
BibTex | Web page ]
[Had11]
S. Haddad. Introduction to Verification. In Models and Analysis in Distributed Systems, chapter 6, pages 137--154. John Wiley & Sons, Ltd., 2011.
BibTex ]
[DP11]
S. Demri and D. Poitrenaud. Verification of Infinite-State Systems. In Models and Analysis in Distributed Systems, chapter 8, pages 221--269. John Wiley & Sons, Ltd., 2011.
BibTex | Web page | PDF ]
[HKPP11a]
S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors. Distributed Systems Design and Algorithms. John Wiley & Sons, Ltd., 2011.
BibTex | Web page ]
[HKPP11b]
S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors. Models and Analysis in Distributed Systems. John Wiley & Sons, Ltd., 2011.
BibTex | Web page ]
[CDM11]
H. Comon-Lundh, S. Delaune, and J. K. Millen. Constraint solving techniques and enriching the model with equational theories. In Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series, pages 35--61. IOS Press, 2011.
BibTex | Web page | PDF ]
[CK11]
V. Cortier and S. Kremer, editors. Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series. IOS Press, 2011.
BibTex | Web page ]
[BKKL11]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. SMA---The Smyle Modeling Approach. In Revised Selected Papars of the 3rd IFIP TC2 Central and East European Conference on Software Engineering Techniques (CEE-SET'08), volume 4980 of Lecture Notes in Computer Science, pages 103--117, Brno, Czech Republic, 2011. Springer.
doi: 10.1007/978-3-642-22386-0_8.
BibTex | DOI | Web page | PDF ]
[LAL10]
D. Longuet, M. Aiguier, and P. Le Gall. Proof-guided test selection from first-order specifications with equality. Journal of Automated Reasoning, 45(4):437--473, December 2010.
doi: 10.1007/s10817-009-9128-7.
BibTex | DOI | Web page | PS | PDF ]
[BFHR10]
R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Comparing Petri Data Nets and Timed Petri Nets. Research Report LSV-10-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 16 pages.
BibTex | Web page | PDF ]
[Vac10]
C. Vacher. Automates à contraintes globales pour la vérification de propriétés de sécurité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[Pla10]
Th. Place. Decidable Characterizations for Tree Logics. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[Fig10b]
D. Figueira. On decidable automata on data words and data trees in relation to satisfiability of LTL and XPath. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[And10c]
É. André. An Inverse Method for the Synthesis of Timing Parameters in Concurrent Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010.
BibTex | Web page | PDF ]
[Sou10b]
R. Soulat. On Properties of the Inverse Method: Commutation of Instanciation and Full Covering of the Behavioral Cartography. Research Report LSV-10-22, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 14 pages.
BibTex | Web page | PDF ]
[And10d]
É. André. Synthesizing Parametric Constraints on Various Case Studies Using IMITATOR II. Research Report LSV-10-21, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 66 pages.
BibTex | Web page | PDF ]
[DR10a]
S. Demri and A. Rabinovich. The Complexity of Linear-time Temporal Logic over the Class of Ordinals. Logical Methods in Computer Science, 6(4), December 2010.
doi: 10.2168/LMCS-6(4:9)2010.
BibTex | DOI | Web page | PDF ]
[CSV10]
R. Chadha, A. P. Sistla, and M. Viswanathan. Model Checking Concurrent Programs with Nondeterminism and Randomization. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 364--375, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.364.
BibTex | DOI | Web page | PDF ]
[AGMNK10]
S. Akshay, P. Gastin, M. Mukund, and K. Narayan Kumar. Model checking time-constrained scenario-based specifications. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 204--215, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.204.
BibTex | DOI | Web page | PDF ]
[CDHR10]
K. Chatterjee, L. Doyen, Th. A. Henzinger, and J.-F. Raskin. Generalized Mean-payoff and Energy Games. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 505--516, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.505.
BibTex | DOI | Web page | PDF ]
[BFLZ10]
R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun. Place-Boundedness for Vector Addition Systems with one zero-test. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 192--203, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.192.
BibTex | DOI | Web page | PDF ]
[HBM+10]
P. Hunter, P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. Computing rational radical sums in uniform TC^0. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 308--316, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.308.
BibTex | DOI | Web page | PDF ]
[DLM10]
A. Da Costa, F. Laroussinie, and N. Markey. ATL with strategy contexts: Expressiveness and Model Checking. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 120--132, Chennai, India, December 2010. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2010.120.
BibTex | DOI | Web page | PDF ]
[BLPS10]
P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo. XML with incomplete information. Journal of the ACM, 58(1), December 2010.
doi: 10.1145/1870103.1870107.
BibTex | DOI | Web page | PDF ]
[DKS10]
S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11 and Proprietary Extensions. Journal of Computer Security, 18(6):1211--1245, November 2010.
doi: 10.3233/JCS-2009-0394.
BibTex | DOI | Web page | PDF ]
[Gou10b]
J. Goubault-Larrecq. Finite Models for Formal Security Proofs. Journal of Computer Security, 18(6):1247--1299, November 2010.
doi: 10.3233/JCS-2009-0395.
BibTex | DOI | Web page | PDF ]
[KM10]
S. Kremer and L. Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. Journal of Computer Security, 18(6):999--1033, November 2010.
doi: 10.3233/JCS-2009-0388.
BibTex | DOI | Web page | PDF ]
[And10b]
É. André. IMITATOR II User Manual. Research Report LSV-10-20, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2010. 31 pages.
BibTex | Web page | PDF ]
[LMT10]
R. Lanotte, A. Maggiolo-Schettini, and A. Troina. Weak bisimulation for Probabilistic Timed Automata? Theoretical Computer Science, 411(50):4291--4322, November 2010.
doi: 10.1016/j.tcs.2010.09.003.
BibTex | DOI | Web page | PDF ]
[AJRG10]
R. Abassi, F. Jacquemard, M. Rusinowitch, and S. Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas. In Proceedings of the 2nd International Conference on Communications and Networking (ComNet'10), Tozeur, Tunisia, November 2010. IEEE Computer Society Press.
doi: 10.1109/COMNET.2010.5699810.
BibTex | DOI | Web page | PDF ]
[BHB10]
S. S. Bauer, R. Hennicker, and M. Bidoit. A Modal Interface Theory with Data Constraints. In Revised Selected Papers of the 13th Brazilian Symposium on Formal Methods (SBMF'10), volume 6527 of Lecture Notes in Computer Science, pages 80--95. Springer, November 2010.
doi: 10.1007/978-3-642-19829-8_6.
BibTex | DOI | Web page | PDF ]
[LBD+10]
S. Li, S. Balaguer, A. David, K. G. Larsen, B. Nielsen, and S. Pusinskas. Scenario-based verification of real-time systems using Uppaal. Formal Methods in System Design, 37(2-3):200--264, November 2010.
doi: 10.1007/s10703-010-0103-z.
BibTex | DOI | Web page | PDF ]
[BHSZ10]
B. Bérard, S. Haddad, M. Sassolas, and M. Zeitoun. Distributed Synthesis with Incomparable Information. Research Report LSV-10-17, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2010. 20 pages.
BibTex | Web page | PDF ]
[CD10a]
K. Chatterjee and L. Doyen. The Complexity of Partial-Observation Parity Games. In Proceedings of the 17th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'10), volume 6397 of Lecture Notes in Artificial Intelligence, pages 1--14, Yogyakarta, Indonesia, October 2010. Springer.
doi: 10.1007/978-3-642-16242-8_1.
BibTex | DOI | Web page | PS | PDF ]
[KBBB10]
U. Kühne, S. Beyer, J. Bormann, and J. Barstow. Automated Formal Verification of Processors Based on Architectural Models. In Proceedings of the 10th International Conference on Formal Methods in Computer Aided Design (FMCAD'10), pages 129--136, Lugano, Switzerland, October 2010. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[BCFS10]
M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel. Attacking and Fixing PKCS#11 Security Tokens. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), pages 260--269, Chicago, Illinois, USA, October 2010. ACM Press.
doi: 10.1145/1866307.1866337.
BibTex | DOI | Web page | PDF ]
[Haa10a]
S. Haar. Types of Asynchronous Diagnosability and the phReveals-Relation in Occurrence Nets. IEEE Transactions on Automatic Control, 55(10):2310--2320, October 2010.
doi: 10.1109/TAC.2010.2063490.
BibTex | DOI | Web page | PDF ]
[SRKK10]
B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh. Towards automatic analysis of election verifiability properties. In Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10), volume 6186 of Lecture Notes in Computer Science, pages 146--163, Paphos, Cyprus, October 2010. Springer.
doi: 10.1007/978-3-642-16074-5_11.
BibTex | DOI | Web page | PDF ]
[BCHK10]
P. Baldan, Th. Chatain, S. Haar, and B. König. Unfolding-based Diagnosis of Systems with an Evolving Topology. Information and Computation, 208(10):1169--1192, October 2010.
doi: 10.1016/j.ic.2009.11.009.
BibTex | DOI | Web page | PDF ]
[BK10]
D. Berwanger and L. Kaiser. Information Tracking in Games on Graphs. Journal of Logic, Language and Information, 19(4):395--412, October 2010.
doi: 10.1007/s10849-009-9115-8.
BibTex | DOI | Web page | PDF ]
[BCD+10]
D. Berwanger, K. Chatterjee, L. Doyen, M. De Wulf, and Th. A. Henzinger. Strategy Construction for Parity Games with Imperfect Information. Information and Computation, 208(10):1206--1220, October 2010.
doi: 10.1016/j.ic.2009.09.006.
BibTex | DOI | Web page | PS | PDF ]
[BS10]
M. Bojańczyk and L. Segoufin. Tree Languages Defined in First-Order Logic with One Quantifier Alternation. Logical Methods in Computer Science, 6(4:1), October 2010.
doi: 10.2168/LMCS-6(4:1)2010.
BibTex | DOI | Web page | PDF ]
[Rod10]
C. Rodríguez. Implementation of a complete prefix unfolder for contextual nets. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[HMY10b]
S. Haddad, L. Mokdad, and S. Youcef. Selection of the Best composite Web Service Based on Quality of Service. In Proceedings of the 2nd International Symposium on Services Science and 3rd International Conference on Business Process and Services Computing (ISSSashBPSC'10), volume 177 of Lecture Notes in Informatics, pages 255--266, Leipzig, Germany, September-October 2010. Gesellschaft für Informatik.
BibTex | Web page | PDF ]
[Sce10]
G. Scerri. Modélisation des clés de l'intrus. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex ]
[CDH10a]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. Expressiveness and Closure Properties for Quantitative Languages. Logical Methods in Computer Science, 6(3:10), September 2010.
doi: 10.2168/LMCS-6(3:10)2010.
BibTex | DOI | Web page | PS | PDF ]
[BGGP10]
O. Bouissou, É. Goubault, J. Goubault-Larrecq, and S. Putot. A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs. In Proceedings of the 14th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetic and Validated Numerics (SCAN'10), Lyon, France, September 2010.
BibTex ]
[Dem10a]
S. Demri. Counter Systems for Data Logics. In Proceedings of the 12th European Conference on Logics in Artificial Intelligence (JELIA'10), volume 6431 of Lecture Notes in Artificial Intelligence, page 10, Helsinki, Finland, September 2010. Springer.
doi: 10.1007/978-3-642-15675-5_3.
BibTex | DOI | Web page | PDF ]
[MW10]
N. Markey and J. Wijsen, editors. Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), Paris, France, September 2010. IEEE Computer Society Press.
doi: 10.1109/TIME.2010.4.
BibTex | DOI | Web page ]
[DKRS10a]
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A Formal Analysis of Authentication in the TPM. In Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), volume 6561 of Lecture Notes in Computer Science, pages 111--125, Pisa, Italy, September 2010. Springer.
doi: 10.1007/978-3-642-19751-2_8.
BibTex | DOI | Web page | PS | PDF ]
[BWA10]
M. Baudet, B. Warinschi, and M. Abadi. Guessing Attacks and the Computational Soundness of Static Equivalence. Journal of Computer Security, 18(5):909--968, September 2010.
doi: 10.3233/JCS-2009-0386.
BibTex | DOI | Web page | PDF ]
[BG10]
H. Benzina and J. Goubault-Larrecq. Some Ideas on Virtualized Systems Security, and Monitors. In Revised Selected Papers of the 5th International Workshop on Data Privacy Management and Autonomous Spontaneous Security (DPM'10) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP'10), volume 6514 of Lecture Notes in Computer Science, pages 244--258, Athens, Greece, September 2010. Springer.
doi: 10.1007/978-3-642-19348-4_18.
BibTex | DOI | Web page | PDF ]
[LV10]
É. Lozes and J. Villard. A spatial equational logic for the applied π-calculus. Distributed Computing, 23(1):61--83, September 2010.
doi: 10.1007/s00446-010-0112-6.
BibTex | DOI | Web page | PDF ]
[And10a]
É. André. IMITATOR II: A Tool for Solving the Good Parameters Problem in Timed Automata. In Proceedings of the 12th International Workshops on Verification of Infinite State Systems (INFINITY'10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 91--99, Singapore, September 2010.
doi: 10.4204/EPTCS.39.7.
BibTex | DOI | Web page | PDF ]
[Dem10b]
S. Demri. On Selective Unboundedness of VASS. In Proceedings of the 12th International Workshops on Verification of Infinite State Systems (INFINITY'10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 1--15, Singapore, September 2010.
doi: 10.4204/EPTCS.39.1.
BibTex | DOI | Web page | PDF ]
[BDF10]
A. Bušić, H. Djafri, and J.-M. Fourneau. Stochastic Bounds for Censored Markov Chains. In Proceedings of the 6th International Meeting on the Numerical Solution of Markov Chain (NSMC'10), Williamsburg, Virginia, USA, September 2010.
BibTex | Web page | PDF ]
[KRS10]
S. Kremer, M. D. Ryan, and B. Smyth. Election verifiability in electronic voting protocols. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of Lecture Notes in Computer Science, pages 389--404, Athens, Greece, September 2010. Springer.
doi: 10.1007/978-3-642-15497-3_24.
BibTex | DOI | Web page | PDF ]
[DDS10a]
M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of Lecture Notes in Computer Science, pages 55--70, Athens, Greece, September 2010. Springer.
doi: 10.1007/978-3-642-15497-3_4.
BibTex | DOI | Web page | PS | PDF ]
[BBM10a]
P. Bouyer, R. Brenguier, and N. Markey. Computing Equilibria in Two-Player Timed Games via Turn-Based Finite Games. In Proceedings of the 8th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'10), volume 6246 of Lecture Notes in Computer Science, pages 62--76, Vienna, Austria, September 2010. Springer.
doi: 10.1007/978-3-642-15297-9_7.
BibTex | DOI | Web page | PDF ]
[BCH10]
S. Balaguer, Th. Chatain, and S. Haar. A Concurrency-Preserving Translation from Time Petri Nets to Networks of Timed Automata. In Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), pages 77--84, Paris, France, September 2010. IEEE Computer Society Press.
doi: 10.1109/TIME.2010.12.
BibTex | DOI | Web page | PDF ]
[BHS10]
B. Bérard, S. Haddad, and M. Sassolas. Real Time Properties for Interrupt Timed Automata. In Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), pages 69--76, Paris, France, September 2010. IEEE Computer Society Press.
doi: 10.1109/TIME.2010.11.
BibTex | DOI | Web page | PDF ]
[BKM10]
B. Bollig, D. Kuske, and I. Meinecke. Propositional Dynamic Logic for Message-Passing Systems. Logical Methods in Computer Science, 6(3:16), September 2010.
doi: 10.2168/LMCS-6(3:16)2010.
BibTex | DOI | Web page | PDF ]
[DL10]
S. Demri and D. Lugiez. Complexity of Modal Logics with Presburger Constraints. Journal of Applied Logic, 8(3):233--252, September 2010.
doi: 10.1016/j.jal.2010.03.001.
BibTex | DOI | Web page | PDF ]
[San10]
O. Sankur. Model-checking robuste des automates temporisés via les machines à canaux. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Sou10a]
R. Soulat. Améliorations algorithmiques d'un moteur de model-checking et études de cas. Rapport de Master, Master 2 Recherche Informatique Paris Sud 11, September 2010.
BibTex | Web page | PDF ]
[Boi10]
A. Boiret. Grammaires context-free pour les arbres sans rang. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Dim10]
J. Dimino. Sur les arbres de rang non borné avec données. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Mon10]
B. Monmege. Propriétés quantitatives des mots et des arbres -- Applications aux langages XML. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[ABMG10]
S. Abiteboul, P. Bourhis, B. Marinoiu, and A. Galland. AXART -- Enabling Collaborative Work with AXML Artifacts. In Proceedings of the 36th International Conference on Very Large Data Bases (VLDB'10), volume 3 of Proceedings of the VLDB Endowment, pages 1553--1556, Singapore, September 2010. ACM Press.
BibTex | Web page | PDF ]
[BBC+10a]
P. Baldan, A. Bruni, A. Corradini, B. König, and S. Schwoon. On the Computation of McMillan's Prefix for Contextual Nets and Graph Grammars. In Proceedings of the 5th International Conference on Graph Transformations (ICGT'10), volume 6372 of Lecture Notes in Computer Science, pages 91--106, Enschede, The Netherlands, September-October 2010. Springer.
doi: 10.1007/978-3-642-15928-2_7.
BibTex | DOI | Web page | PDF ]
[Cyr10b]
A. Cyriac. Temporal Logics for Concurrent Recursive Programs. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010.
BibTex | Web page | PDF ]
[Haa10b]
S. Haar. What Topology Tells us about Diagnosability in Partial Order Semantics. In Proceedings of the 10th Workshop on Discrete Event Systems (WODES'10), pages 221--226, Berlin, Germany, August-September 2010. IFAC.
BibTex | Web page | PDF ]
[GL10]
P. Gastin and F. Laroussinie, editors. Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science. Springer, August-September 2010.
doi: 10.1007/978-3-642-15375-4.
BibTex | DOI | Web page ]
[FHL10]
D. Figueira, P. Hofman, and S. Lasota. Relating timed and register automata. In Proceedings of the 17th International Workshop on Expressiveness in Concurrency (EXPRESS'10), volume 41 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Paris, France, August 2010.
doi: 10.4204/EPTCS.41.5.
BibTex | DOI | Web page | PDF ]
[DKRS10b]
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A Formal Analysis of Authentication in the TPM (short paper). In Preliminary Proceedings of the 8th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'10), Paris, France, August 2010.
BibTex | Web page | PS | PDF ]
[Sch10c]
Ph. Schnoebelen. Lossy Counter Machines Decidability Cheat Sheet. In Proceedings of the 4th Workshop on Reachability Problems in Computational Models (RP'10), volume 6227 of Lecture Notes in Computer Science, pages 51--75, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15349-5_4.
BibTex | DOI | Web page | PDF ]
[AF10a]
É. André and L. Fribourg. Behavioral Cartography of Timed Automata. In Proceedings of the 4th Workshop on Reachability Problems in Computational Models (RP'10), volume 6227 of Lecture Notes in Computer Science, pages 76--90, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15349-5_5.
BibTex | DOI | Web page | PDF ]
[DDG+10]
A. Degorre, L. Doyen, R. Gentilini, J.-F. Raskin, and S. Toruńczyk. Energy and Mean-Payoff Games with Imperfect Information. In Proceedings of the 19th Annual EACSL Conference on Computer Science Logic (CSL'10), volume 6247 of Lecture Notes in Computer Science, pages 260--274, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15205-4_22.
BibTex | DOI | Web page | PDF ]
[Sch10d]
Ph. Schnoebelen. Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 616--628, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_54.
BibTex | DOI | Web page | PDF ]
[CDGH10]
K. Chatterjee, L. Doyen, H. Gimbert, and Th. A. Henzinger. Randomness for Free. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 246--257, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_23.
BibTex | DOI | Web page | PDF ]
[FP10]
G. Fontaine and Th. Place. Classes of trees definable in the μ-calculus. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 381--392, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_34.
BibTex | DOI | Web page | PDF ]
[CDH10b]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. Qualitative Analysis of Partially-observable Markov Decision Processes. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 258--269, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_24.
BibTex | DOI | Web page | PDF ]
[OU10]
J. Olschewski and M. Ummels. The Complexity of Finding Reset Words in Finite Automata. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 568--579, Brno, Czech Republic, August 2010. Springer.
doi: 10.1007/978-3-642-15155-2_50.
BibTex | DOI | Web page | PDF ]
[CDE+10]
K. Chatterjee, L. Doyen, H. Edelsbrunner, Th. A. Henzinger, and P. Rannou. Mean-Payoff Automaton Expressions. In Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science, pages 269--283, Paris, France, August-September 2010. Springer.
doi: 10.1007/978-3-642-15375-4_19.
BibTex | DOI | Web page | PDF ]
[BBM10b]
P. Bouyer, R. Brenguier, and N. Markey. Nash Equilibria for Reachability Objectives in Multi-player Timed Games. In Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science, pages 192--206, Paris, France, August-September 2010. Springer.
doi: 10.1007/978-3-642-15375-4_14.
BibTex | DOI | Web page | PDF ]
[CS10a]
P. Chambart and Ph. Schnoebelen. Computing blocker sets for the Regular Post Embedding Problem. In Proceedings of the 14th International Conference on Developments in Language Theory (DLT'10), volume 6224 of Lecture Notes in Computer Science, pages 136--147, London, Ontario, Canada, August 2010. Springer.
doi: 10.1007/978-3-642-14455-4_14.
BibTex | DOI | Web page | PDF ]
[HNS10]
P.-C. Héam, C. Nicaud, and S. Schmitz. Parametric Random Generation of Deterministic Tree Automata. Theoretical Computer Science, 411(38-39):3469--3480, August 2010.
doi: 10.1016/j.tcs.2010.05.036.
BibTex | DOI | Web page | PDF ]
[JR10]
F. Jacquemard and M. Rusinowitch. Rewrite-based verification of XML updates. In Proceedings of the 12th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP'10), pages 119--130, Hagenberg, Austria, July 2010. ACM Press.
doi: 10.1145/1836089.1836105.
BibTex | DOI | Web page | PDF ]
[NSV10]
A. Nash, L. Segoufin, and V. Vianu. Views and queries: Determinacy and rewriting. ACM Transactions on Database Systems, 35(3), July 2010.
doi: 10.1145/1806907.1806913.
BibTex | DOI | Web page | PDF ]
[Car10]
J.-L. Carré. Analyse statique de programmes multi-thread pour l'embarqué. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2010.
BibTex | Web page | PDF ]
[Aks10]
S. Akshay. Spécification et vérification pour des systèmes distribués et temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2010.
BibTex | Web page | PDF ]
[DDS10b]
M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the Workshop on Foundations of Security and Privacy (FCS-PrivMod'10), pages 55--70, Edinburgh, Scotland, UK, July 2010.
doi: 10.1007/978-3-642-15497-3_4.
BibTex | DOI | Web page | PS | PDF ]
[Sch10b]
S. Schmitz. On the Computational Complexity of Dominance Links in Grammatical Formalisms. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics (ACL'10), pages 514--524, Uppsala, Sweden, July 2010. Association for Computational Linguistics.
BibTex | Web page | PDF ]
[CCD10]
V. Cheval, H. Comon-Lundh, and S. Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), volume 6173 of Lecture Notes in Artificial Intelligence, pages 412--426, Edinburgh, Scotland, UK, July 2010. Springer-Verlag.
doi: 10.1007/978-3-642-14203-1_35.
BibTex | DOI | Web page | PDF ]
[Gou10c]
J. Goubault-Larrecq. Noetherian Spaces in Verification. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 2--21, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_2.
BibTex | DOI | Web page | PDF ]
[CS10b]
P. Chambart and Ph. Schnoebelen. Pumping and Counting on the Regular Post Embedding Problem. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 64--75, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_6.
BibTex | DOI | Web page | PDF ]
[CD10b]
K. Chatterjee and L. Doyen. Energy Parity Games. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 599--610, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_50.
BibTex | DOI | Web page | PDF ]
[BGMZ10]
B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Pebble weighted automata and transitive closure logics. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 587--598, Bordeaux, France, July 2010. Springer.
doi: 10.1007/978-3-642-14162-1_49.
BibTex | DOI | Web page | PDF ]
[CC10]
S. Ciobâcă and V. Cortier. Protocol composition for arbitrary primitives. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 322--336, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/CSF.2010.29.
BibTex | DOI | Web page | PDF ]
[ACD10]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 59--74, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/CSF.2010.12.
BibTex | DOI | Web page | PDF ]
[BKK+10]
B. Bollig, J.-P. Katoen, C. Kern, M. Leucker, D. Neider, and D. R. Piegdon. libalf: the Automata Learning Framework. In Proceedings of the 22nd International Conference on Computer Aided Verification (CAV'10), volume 6174 of Lecture Notes in Computer Science, pages 360--364, Edinburgh, Scotland, UK, July 2010. Springer.
doi: 10.1007/978-3-642-14295-6_32.
BibTex | DOI | Web page | PDF ]
[SS10]
N. Schweikardt and L. Segoufin. Addition-invariant FO and regularity. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 273--282, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.16.
BibTex | DOI | Web page | PDF ]
[PS10]
Th. Place and L. Segoufin. Deciding definability in FO_2(<) on trees. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 253--262, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.17.
BibTex | DOI | Web page | PDF ]
[Gou10d]
J. Goubault-Larrecq. ωQRB-Domains and the Probabilistic Powerdomain. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 352--361, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.50.
BibTex | DOI | Web page | PDF ]
[BCG+10]
L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and C. Vacher. The Emptiness Problem for Tree Automata with Global Constraints. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 263--272, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press.
doi: 10.1109/LICS.2010.28.
BibTex | DOI | Web page | PDF ]
[GK10]
P. Gastin and D. Kuske. Uniform satisfiability problem for local temporal logics over Mazurkiewicz traces. Information and Computation, 208(7):797--816, July 2010.
doi: 10.1016/j.ic.2009.12.003.
BibTex | DOI | Web page | PDF ]
[Cyr10a]
A. Cyriac. A New Version of Focus Games for LTL Satisfiability. In Proceedings of the Workshop on Comparing Logical Decision Methods (CLoDeM'10), Edinburgh, Scotland, UK, July 2010.
BibTex | Web page | PDF ]
[BJL+10]
Th. Brihaye, M. Jungers, S. Lasaulce, N. Markey, and G. Oreiby. Using Model Checking for Analyzing Distributed Power Control Problems. EURASIP Journal on Wireless Communications and Networking, 2010(861472), June 2010.
doi: 10.1155/2010/861472.
BibTex | DOI | Web page | PDF ]
[DHLN10]
L. Doyen, Th. A. Henzinger, A. Legay, and D. Nickovic. Robustness of Sequential Circuits. In Proceedings of the 10th International Conference on Application of Concurrency to System Design (ACSD'10), pages 77--84, Braga, Portugal, June 2010. IEEE Computer Society Press.
doi: 10.1109/ACSD.2010.26.
BibTex | DOI | Web page | PDF ]
[EHH10]
D. El Hog-Benzina, S. Haddad, and R. Hennicker. Process Refinement and Asynchronous Composition with Modalities. In Proceedings of the 2nd International Workshop on Abstractions for Petri Nets and Other Models of Concurrency (APNOC'10), Braga, Portugal, June 2010.
BibTex | Web page | PDF ]
[HMY10a]
S. Haddad, L. Mokdad, and S. Youcef. Response time of BPEL4WS constructors. In Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC'10), pages 695--700, Riccione, Italy, June 2010. IEEE Computer Society Press.
doi: 10.1109/ISCC.2010.5546538.
BibTex | DOI | Web page | PDF ]
[CF10]
Th. Chatain and É. Fabre. Factorization Properties of Symbolic Unfoldings of Colored Petri Nets. In Proceedings of the 31st International Conference on Applications and Theory of Petri Nets (PETRI NETS'10), volume 6128 of Lecture Notes in Computer Science, pages 165--184, Braga, Portugal, June 2010. Springer.
doi: 10.1007/978-3-642-13675-7_11.
BibTex | DOI | Web page | PDF ]
[LS10b]
L. Libkin and C. Sirangelo. Reasoning about XML with temporal logics and automata. Journal of Applied Logic, 8(2):210--232, June 2010.
doi: 10.1016/j.jal.2009.09.005.
BibTex | DOI | Web page | PDF ]
[BH10b]
B. Bollig and L. Hélouët. Realizability of Dynamic MSC Languages. In Proceedings of the 5th International Computer Science Symposium in Russia (CSR'10), volume 6072 of Lecture Notes in Computer Science, pages 48--59, Kazan, Russia, June 2010. Springer.
doi: 10.1007/978-3-642-13182-0_5.
BibTex | DOI | Web page | PDF ]
[BKKL10a]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Learning Communicating Automata from MSCs. IEEE Transactions on Software Engineering, 36(3):390--408, May-June 2010.
doi: 10.1109/TSE.2009.89.
BibTex | DOI | Web page | PDF ]
[CJ10]
Th. Chatain and C. Jard. Sémantique concurrente symbolique des réseaux de Petri saufs et dépliages finis des réseaux temporels. In Actes de la 10ème Conférence Internationale sur les NOuvelles TEchnologies de la RÉpartition (NOTERE'10), Tozeur, Tunisia, May-June 2010. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[DKR10b]
S. Delaune, S. Kremer, and M. D. Ryan. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. In Towards Trustworthy Elections -- New Directions in Electronic Voting, volume 6000 of Lecture Notes in Computer Science, pages 289--309. Springer, May 2010.
doi: 10.1007/978-3-642-12980-3_18.
BibTex | DOI | Web page | PDF ]
[DLS10]
S. Demri, R. Lazić, and A. Sangnier. Model checking memoryful linear-time logics over one-counter automata. Theoretical Computer Science, 411(22-24):2298--2316, May 2010.
doi: 10.1016/j.tcs.2010.02.021.
BibTex | DOI | Web page | PDF ]
[BFLM10]
P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey. Timed Automata with Observers under Energy Constraints. In Proceedings of the 13th International Conference on Hybrid Systems: Computation and Control (HSCC'10), pages 61--70, Stockholm, Sweden, April 2010. ACM Press.
doi: 10.1145/1755952.1755963.
BibTex | DOI | Web page | PDF ]
[Gou10a]
J. Goubault-Larrecq. De Groot Duality and Models of Choice: Angels, Demons, and Nature. Mathematical Structures in Computer Science, 20(2):169--237, April 2010.
doi: 10.1017/S0960129509990363.
BibTex | DOI | Web page | PDF ]
[CKW10]
V. Cortier, S. Kremer, and B. Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. Journal of Automated Reasoning, 46(3-4):225--259, April 2010.
doi: 10.1007/s10817-010-9187-9.
BibTex | DOI | Web page | PDF ]
[BH10a]
M. Ben Hmida and S. Haddad. Client Synthesis for Aspect Oriented Web Services. In Revised Selected Papers of the 15th Monterey Workshop on Foundations of Computer Software (MONTEREY'08), volume 6028 of Lecture Notes in Computer Science, pages 24--42, Budapest, Hungary, April 2010. Springer.
doi: 10.1007/978-3-642-12566-9_2.
BibTex | DOI | Web page | PDF ]
[RHS10]
L. Recalde, S. Haddad, and M. Silva. Continuous Petri Nets: Expressive Power and Decidability Issues. International Journal of Foundations of Computer Science, 21(2):235--256, April 2010.
doi: 10.1142/S0129054110007222.
BibTex | DOI ]
[VLC10]
J. Villard, É. Lozes, and C. Calcagno. Tracking Heaps that Hop with Heap-Hop. In Proceedings of the 16th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'10), volume 6015 of Lecture Notes in Computer Science, pages 275--279, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12002-2_23.
BibTex | DOI | Web page | PDF ]
[DS10]
S. Demri and A. Sangnier. When Model-Checking Freeze LTL over Counter Machines Becomes Decidable. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 176--190, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12032-9_13.
BibTex | DOI | Web page | PDF ]
[tCF10]
B. ten Cate and G. Fontaine. An Easy Completeness Proof for the Modal μ-Calculus on Finite Trees. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 161--175, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12032-9_12.
BibTex | DOI | Web page | PDF ]
[CS10c]
P. Chambart and Ph. Schnoebelen. Toward a compositional theory of leftist grammars and transformations. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 237--251, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12032-9_17.
BibTex | DOI | Web page | PDF ]
[DKR10a]
S. Delaune, S. Kremer, and M. D. Ryan. Symbolic bisimulation for the applied pi calculus. Journal of Computer Security, 18(2):317--377, March 2010.
doi: 10.3233/JCS-2010-0363.
BibTex | DOI | Web page | PDF ]
[Bon10]
R. Bonnet. Well-structured Petri-nets extensions with data. Rapport de Master, Master Computer Science, EPFL, Lausanne, Switzerland, March 2010.
BibTex | Web page | PDF ]
[tCS10]
B. ten Cate and L. Segoufin. Transitive Closure Logic, Nested Tree Walking Automata, and XPath. Journal of the ACM, 57(3), March 2010.
doi: 10.1145/1706591.1706598.
BibTex | DOI | Web page | PDF ]
[Seg10]
L. Segoufin, editor. Proceedings of the 13th International Conference on Database Theory (ICDT'10), March 2010.
BibTex | Web page ]
[ACK+10]
S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and P. Senellart. Aggregate queries for discrete and continuous probabilistic XML. In Proceedings of the 13th International Conference on Database Theory (ICDT'10), pages 50--61, Lausanne, Switzerland, March 2010. ACM Press.
doi: 10.1145/1804669.1804679.
BibTex | DOI | Web page | PDF ]
[Fig10a]
D. Figueira. Forward-XPath and extended register automata on data-trees. In Proceedings of the 13th International Conference on Database Theory (ICDT'10), pages 230--240, Lausanne, Switzerland, March 2010. ACM Press.
doi: 10.1145/1804669.1804699.
BibTex | DOI | Web page | PS | PDF ]
[DR10b]
L. Doyen and J.-F. Raskin. Antichains Algorithms for Finite Automata. In Proceedings of the 16th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'10), volume 6015 of Lecture Notes in Computer Science, pages 2--22, Paphos, Cyprus, March 2010. Springer.
doi: 10.1007/978-3-642-12002-2_2.
BibTex | DOI | Web page | PS | PDF ]
[BCM10]
P. Bouyer, F. Chevalier, and N. Markey. On the Expressiveness of TPTL and MTL. Information and Computation, 208(2):97--116, February 2010.
doi: 10.1016/j.ic.2009.10.004.
BibTex | DOI | Web page | PDF ]
[AHL+10]
A. Antonik, M. Huth, K. G. Larsen, U. Nyman, and A. Wąsowski. Modal and mixed specifications: key decision problems and their complexities. Mathematical Structures in Computer Science, 10(1):75--103, February 2010.
doi: 10.1017/S0960129509990260.
BibTex | DOI | Web page | PDF ]
[GAMS10]
A. Galland, S. Abiteboul, A. Marian, and P. Senellart. Corroborating information from disagreeing views. In Proceedings of the 3rd International Conference on Web Search and Web Data Mining (WSDM'10), pages 131--140, New York, New York, USA, February 2010. ACM Press.
doi: 10.1145/1718487.1718504.
BibTex | DOI | Web page | PDF ]
[Sch10a]
S. Schmitz. An Experimental Ambiguity Detection Tool. Science of Computer Programming, 75(1-2):71--84, January 2010.
doi: 10.1016/j.scico.2009.07.002.
BibTex | DOI | Web page | PDF ]
[CLPV10]
R. Chadha, A. Legay, P. Prabhakar, and M. Viswanathan. Complexity bounds for the verification of real-time software. In Proceedings of the 11th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'10), volume 5944 of Lecture Notes in Computer Science, pages 95--111, Madrid, Spain, January 2010. Springer.
doi: 10.1007/978-3-642-11319-2_10.
BibTex | DOI | Web page | PDF ]
[BBC10b]
P. Bouyer, Th. Brihaye, and F. Chevalier. O-Minimal Hybrid Reachability Games. Logical Methods in Computer Science, 6(1:1), January 2010.
doi: 10.2168/LMCS-6(1:1)2010.
BibTex | DOI | Web page | PDF ]
[FS10]
A. Finkel and A. Sangnier. Mixing coverability and reachability to analyze VASS with one zero-test. In Proceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'10), volume 5901 of Lecture Notes in Computer Science, pages 394--406, Špindlerův Mlýn, Czech Republic, January 2010. Springer.
doi: 10.1007/978-3-642-11266-9_33.
BibTex | DOI | Web page | PS | PDF ]
[BKKL10b]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. SMA---The Smyle Modeling Approach. Computing and Informatics, 29(1):45--72, 2010.
BibTex | Web page | PDF ]
[ZBH10]
M. Zargayouna, F. Balbo, and S. Haddad. Agents Secure Interaction in Data Driven Languages. In Revised Selected Papers of the 2nd Workshop on LAnguages, methodologies and Development tools for multi-agent systemS (LADS'09), volume 6039 of Lecture Notes in Computer Science, pages 72--91, Turin, Italy, 2010. Springer.
doi: 10.1007/978-3-642-13338-1_5.
BibTex | DOI | Web page | PDF ]
[CCZ10]
H. Comon-Lundh, V. Cortier, and E. Zălinescu. Deciding security properties for cryptographic protocols. Application to key cycles. ACM Transactions on Computational Logic, 11(2), January 2010.
doi: 10.1145/1656242.1656244.
BibTex | DOI | Web page | PDF ]
[AF10b]
P. Arnoux and A. Finkel. Using mental imagery processes for teaching and research in mathematics and computer science. International Journal of Mathematical Education in Science and Technology, 41(2):229--242, January 2010.
doi: 10.1080/00207390903372429.
BibTex | DOI | Web page | PDF ]
[Ber10]
D. Berwanger. Infinite Coordination Games. In Logic and the Foundations of Game and Decision Theory (LOFT8), volume 6006 of Lecture Notes in Artificial Intelligence, pages 1--19. Springer, 2010.
doi: 10.1007/978-3-642-15164-4_1.
BibTex | DOI | Web page | PDF ]
[CDH10c]
K. Chatterjee, L. Doyen, and Th. A. Henzinger. Quantitative Languages. ACM Transactions on Computational Logic, 11(4), 2010.
BibTex | Web page | PS | PDF ]
[MLRS10]
N. Markey, S. Li, J.-F. Raskin, and M. Stoelinga. Synthesizing controllers with bounded resources. Deliverable QUASIMODO 3.4 (ICT-FP7-STREP-214755), January 2010.
BibTex ]
[LS10a]
L. Libkin and C. Sirangelo. Disjoint pattern matching and implication in strings. Information Processing Letters, 110(4):143--147, January 2010.
doi: 10.1016/j.ipl.2009.11.009.
BibTex | DOI | Web page | PDF ]
[DFGvD10]
S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen. Model-checking CTL^* over Flat Presburger Counter Systems. Journal of Applied Non-Classical Logics, 20(4):313--344, 2010.
doi: 10.3166/jancl.20.313-344.
BibTex | DOI | Web page | PDF ]
[CDMP09]
F. Chevalier, D. D'Souza, R. M. Matteplackel, and P. Prabhakar. Automata and logics over finitely varying functions. Annals of Pure and Applied Logics, 161(3):324--336, December 2009.
doi: 10.1016/j.apal.2009.07.007.
BibTex | DOI | Web page | PDF ]
[Mer09]
A. Mercier. Contributions à l'analyse automatique des protocoles cryptographiques en présence de propriétés algébriques : protocoles de groupe, équivalence statique. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2009.
BibTex | Web page | PDF ]
[Bur09a]
S. Bursuc. Contraintes de déductibilité dans une algèbre quotient: réduction de modèles et applications à la sécurité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2009.
BibTex | Web page | PDF ]
[Gou09a]
J. Goubault-Larrecq. Logic Wins!. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 1--16, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10622-4_1.
BibTex | DOI | Web page | PDF ]
[DJLL09]
S. Demri, M. Jurdziński, O. Lachish, and R. Lazić. The covering and boundedness problems for branching vector addition systems. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), volume 4 of Leibniz International Proceedings in Informatics, pages 181--192, Kanpur, India, December 2009. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2009.2317.
BibTex | DOI | Web page | PDF ]
[DKP09]
S. Delaune, S. Kremer, and O. Pereira. Simulation based security in the applied pi calculus. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), volume 4 of Leibniz International Proceedings in Informatics, pages 169--180, Kanpur, India, December 2009. Leibniz-Zentrum für Informatik.
doi: 10.4230/LIPIcs.FSTTCS.2009.2316.
BibTex | DOI | Web page | PDF ]
[VLC09]
J. Villard, É. Lozes, and C. Calcagno. Proving Copyless Message Passing. In Proceedings of the 7th Asian Symposium on Programming Languages and Systems (APLAS'09), volume 5904 of Lecture Notes in Computer Science, pages 194--209, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10672-9_15.
BibTex | DOI | Web page | PDF ]
[BBC09]
P. Bouyer, Th. Brihaye, and F. Chevalier. Weighted O-Minimal Hybrid Systems. Annals of Pure and Applied Logics, 161(3):268--288, December 2009.
doi: 10.1016/j.apal.2009.07.014.
BibTex | DOI | Web page | PDF ]
[KMT09a]
S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 94--108, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10622-4_8.
BibTex | DOI | Web page | PS | PDF ]
[BDC09]
S. Bursuc, S. Delaune, and H. Comon-Lundh. Deducibility constraints. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 24--38, Seoul, Korea, December 2009. Springer.
doi: 10.1007/978-3-642-10622-4_3.
BibTex | DOI | Web page | PS | PDF ]
[BDL09]
R. Brochenin, S. Demri, and É. Lozes. Reasoning about sequences of memory states. Annals of Pure and Applied Logics, 161(3):305--323, December 2009.
doi: 10.1016/j.apal.2009.07.004.
BibTex | DOI | Web page | PDF ]
[DG09a]
S. Demri and R. Gascon. The Effects of Bounding Syntactic Resources on Presburger LTL. Journal of Logic and Computation, 19(6):1541--1575, December 2009.
doi: 10.1093/logcom/exp037.
BibTex | DOI | Web page | PDF ]
[ASV09b]
S. Abiteboul, L. Segoufin, and V. Vianu. Static Analysis of Active XML Systems. ACM Transactions on Database Systems, 34(4), December 2009.
doi: 10.1145/1620585.1620590.
BibTex | DOI | Web page | PDF ]
[Haa09]
S. Haar. Qualitative Diagnosability of Labeled Petri Nets Revisited. In Proceedings of the Joint 48th IEEE Conference on Decision and Control (CDC'09) and 28th Chinese Control Conference (CCC'09), pages 1248--1253, Shanghai, China, December 2009. IEEE Control System Society.
doi: 10.1109/CDC.2009.5400917.
BibTex | DOI | Web page | PDF ]
[Bou09a]
F. Bouchy. Logiques et modèles pour la vérification de systèmes infinis. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2009.
BibTex | Web page | PDF ]
[Szn09]
N. Sznajder. Synthèse de systèmes distribués ouverts. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2009.
BibTex | Web page | PDF ]
[SRKK09]
B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh. Election verifiability in electronic voting protocols (Preliminary version). In Proceedings of the 4th Benelux Workshop on Information and System Security (WISSEC'09), Louvain-la-Neuve, Belgium, November 2009.
BibTex | Web page | PDF ]
[BFS09a]
F. Bouchy, A. Finkel, and P. San Pietro. Dense-choice Counter Machines Revisited. In Proceedings of the 11th International Workshops on Verification of Infinite State Systems (INFINITY'09), volume 10 of Electronic Proceedings in Theoretical Computer Science, pages 3--22, Bologna, Italy, November 2009.
doi: 10.4204/EPTCS.10.1.
BibTex | DOI | Web page | PDF ]
[AF09a]
É. André and L. Fribourg. An Inverse Method for Policy-Iteration Based Algorithms. In Proceedings of the 11th International Workshops on Verification of Infinite State Systems (INFINITY'09), volume 10 of Electronic Proceedings in Theoretical Computer Science, pages 44--61, Bologna, Italy, November 2009.
doi: 10.4204/EPTCS.10.4.
BibTex | DOI | Web page | PDF ]
[HMY09]
S. Haddad, L. Mokdad, and S. Youcef. Bornes du temps de réponse des services Web composites. In Actes du 7ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'09), volume 43 of Journal Européen des Systèmes Automatisés, pages 969--983, Nantes, France, November 2009. Hermès.
BibTex | Web page | PDF ]
[ACD+09a]
É. André, Th. Chatain, O. De Smet, L. Fribourg, and S. Ruel. Synthèse de contraintes temporisées pour une architecture d'automatisation en réseau. In Actes du 7ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'09), volume 43 of Journal Européen des Systèmes Automatisés, pages 1049--1064, Nantes, France, November 2009. Hermès.
BibTex | Web page | PDF ]
[Ste09b]
G. Steel. Towards a Formal Analysis of the SeVeCoM API. In Proceedings of the 7th Conference on Embedded Security in Cars (ESCAR'09), Düsseldorf, Germany, November 2009.
BibTex | Web page | PDF ]
[LCE+09]
LIAFA, CRIL, EDF, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F2.2 : Algorithmes de vérification -- Rapport final, November 2009. 25 pages.
BibTex | Web page | PDF ]
[FLS09a]
A. Finkel, É. Lozes, and A. Sangnier. Towards Model Checking Pointer Systems. In Revised Selected Papers of the International Conference on Infinity in Logic & Computation (ILC'07), volume 5489 of Lecture Notes in Artificial Intelligence, pages 56--82, Cape Town, South Africa, October 2009. Springer-Verlag.
doi: 10.1007/978-3-642-03092-5_6.
BibTex | DOI | Web page | PS | PDF ]
[AKSS09]
S. Abiteboul, B. Kimelfeld, Y. Sagiv, and P. Senellart. On the expressiveness of probabilistic XML models. The VLDB Journal, 18(5):1041--1064, October 2009.
doi: 10.1007/s00778-009-0146-1.
BibTex | DOI | Web page | PDF ]
[CM09]
F. Cassez and N. Markey. Control of Timed Systems. In Communicating Embedded Systems -- Software and Design, chapter 3, pages 83--120. Wiley-ISTE, October 2009.
BibTex | Web page ]
[DH09]
S. Donatelli and S. Haddad. Quantitative Verification of Markov Chains. In Communicating Embedded Systems -- Software and Design, chapter 5, pages 139--163. Wiley-ISTE, October 2009.
BibTex | Web page ]
[Cha09]
N. Chamseddine. Analyse quantitative parametrée d'automates temporisés probabilistes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2009.
BibTex | Web page | PDF ]
[CCD09]
V. Cheval, H. Comon-Lundh, and S. Delaune. A decision procedure for proving observational equivalence. In Preliminary Proceedings of the 7th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'09), Bologna, Italy, October 2009.
BibTex | Web page | PDF ]
[Dim09]
J. Dimino. Les systèmes à canaux non-fiables vus comme des transducteurs. Rapport de stage de M1, Master Parisien de Recherche en Informatique, Paris, France, October 2009.
BibTex | Web page | PDF ]
[FLS09b]
R. Focardi, F. L. Luccio, and G. Steel. Blunting Differential Attacks on PIN Processing APIs. In Proceedings of the 14th Nordic Workshop on Secure IT Systems (NordSec'09), volume 5838 of Lecture Notes in Computer Science, pages 88--103, Oslo, Norway, October 2009. Springer.
doi: 10.1007/978-3-642-04766-4_7.
BibTex | DOI | Web page | PDF ]
[BCHK09]
Y. Boichut, R. Courbis, P.-C. Héam, and O. Kouchnarenko. Handling Non-left Linear Rules when Completing Tree Automata. International Journal of Foundations of Computer Science, 20(5):837--849, October 2009.
doi: 10.1142/S0129054109006917.
BibTex | DOI | Web page | PDF ]
[ACEF09]
É. André, Th. Chatain, E. Encrenaz, and L. Fribourg. An Inverse Method for Parametric Timed Automata. International Journal of Foundations of Computer Science, 20(5):819--836, October 2009.
doi: 10.1142/S0129054109006905.
BibTex | DOI | Web page | PDF ]
[DHL09]
F. Dadeau, P.-C. Héam, and J. Levrey. On the Use of Uniform Random Generation of Automata for Testing. In Proceedings of the 5th Workshop on Model-Based Testing (MBT'09), volume 253 of Electronic Notes in Theoretical Computer Science, pages 37--51, York, UK, October 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.09.050.
BibTex | DOI | Web page | PDF ]
[BS09a]
M. Benedikt and L. Segoufin. Regular tree languages definable in FO and in FO_mod. ACM Transactions on Computational Logic, 11(1), October 2009.
doi: 10.1145/1614431.1614435.
BibTex | DOI | Web page | PDF ]
[DBB+09]
A. David, G. Behrmann, P. Bulychev, J. Byg, Th. Chatain, K. G. Larsen, P. Pettersson, J. I. Rasmussen, J. Srba, W. Yi, K. Y. Joergensen, D. Lime, M. Magnin, O. H. Roux, and L.-M. Traonouez. Tools for Model-Checking Timed Systems. In Communicating Embedded Systems -- Software and Design, chapter 6, pages 165--225. Wiley-ISTE, October 2009.
BibTex | Web page ]
[ASV09a]
S. Abiteboul, L. Segoufin, and V. Vianu. Modeling and Verifying Active XML Artifacts. IEEE Data Engineering Bulletin, 32(3):10--15, September 2009.
BibTex | DOI | Web page | PDF ]
[Che09]
V. Cheval. Algorithme de décision de l'équivalence symbolique de systèmes de contraintes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2009.
BibTex | Web page | PDF ]
[Bre09]
R. Brenguier. Calcul des équilibres de Nash dans les jeux temporisés. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2009.
BibTex | Web page | PS | PDF ]
[BCH+09]
C. Boutrous-Saab, D. Coulibaly, S. Haddad, T. Melliti, P. Moreaux, and S. Rampacek. An Integrated Framework for Web Services Orchestration. International Journal of Web Services Research, 6(4):1--29, September 2009.
BibTex | Web page | PDF ]
[AFS09]
É. André, L. Fribourg, and J. Sproston. An Extension of the Inverse Method to Probabilistic Timed Automata. In Proceedings of the 9th International Workshop on Automated Verification of Critical Systems (AVoCS'09), volume 23 of Electronic Communications of the EASST, Swansea, UK, September 2009. European Association of Software Science and Technology.
BibTex | Web page | PDF ]
[CDL09]
Th. Chatain, A. David, and K. G. Larsen. Playing Games with Timed Games. In Proceedings of the 3rd IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'09), Zaragoza, Spain, September 2009.
BibTex | Web page | PDF ]
[BHK09]
Y. Boichut, P.-C. Héam, and O. Kouchnarenko. How to Tackle Integer Weighted Automata Positivity. In Proceedings of the 3rd Workshop on Reachability Problems in Computational Models (RP'09), volume 5797 of Lecture Notes in Computer Science, pages 79--92, Palaiseau, France, September 2009. Springer.
doi: 10.1007/978-3-642-04420-5_9.
BibTex | DOI | Web page | PDF ]
[BCDL09]
P. Bulychev, Th. Chatain, A. David, and K. G. Larsen. Checking simulation relation between timed game automata. In Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813 of Lecture Notes in Computer Science, pages 73--87, Budapest, Hungary, September 2009. Springer.
doi: 10.1007/978-3-642-04368-0_8.
BibTex | DOI | Web page | PDF ]
[HP09]
S. Haddad and N. Pekergin. Using Stochastic Comparison for Efficient Model Checking of Uncertain Markov Chains. In Proceedings of the 6th International Conference on Quantitative Evaluation of Systems (QEST'09), pages 177--186, Budapest, Hungary, September 2009. IEEE Computer Society Press.
doi: 10.1109/QEST.2009.42.
BibTex | DOI | Web page | PDF ]
[CFLS09]
M. Centenaro, R. Focardi, F. L. Luccio, and G. Steel. Type-based Analysis of PIN Processing APIs. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 53--68, Saint Malo, France, September 2009. Springer.
doi: 10.1007/978-3-642-04444-1_4.
BibTex | DOI | Web page | PDF ]
[CS09]
V. Cortier and G. Steel. A generic security API for symmetric key management on cryptographic devices. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 605--620, Saint Malo, France, September 2009. Springer.
doi: 10.1007/978-3-642-04444-1_37.
BibTex | DOI | Web page | PDF ]
[CAM09]
B. Cautis, S. Abiteboul, and T. Milo. Reasoning about XML update constraints. Journal of Computer and System Sciences, 75(6):336--358, September 2009.
doi: 10.1016/j.jcss.2009.02.001.
BibTex | DOI | Web page | PDF ]
[BHR09a]
A. Bouillard, S. Haar, and S. Rosario. Critical paths in the Partial Order Unfolding of a Stochastic Petri Net. In Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813 of Lecture Notes in Computer Science, pages 43--57, Budapest, Hungary, September 2009. Springer.
doi: 10.1007/978-3-642-04368-0_6.
BibTex | DOI | Web page | PDF ]
[BDMR09]
P. Bouyer, M. Duflot, N. Markey, and G. Renault. Measuring Permissivity in Finite Games. In Proceedings of the 20th International Conference on Concurrency Theory (CONCUR'09), volume 5710 of Lecture Notes in Computer Science, pages 196--210, Bologna, Italy, September 2009. Springer.
doi: 10.1007/978-3-642-04081-8_14.
BibTex | DOI | Web page | PDF ]
[CC09]
S. Ciobâcă and V. Cortier. Algorithmes pour l'équivalence statique. Deliverable AVOTE 2.1 (ANR-07-SESU-002), September 2009. 17 pages.
BibTex | Web page | PDF ]
[BK09]
M. Boreale and S. Kremer, editors. Proceedings of the 7th International Workshop on Security Issues in Concurrency (SecCo'09), volume 7 of Electronic Proceedings in Theoretical Computer Science, Bologna, Italy, August 2009.
doi: 10.4204/EPTCS.7.
BibTex | DOI | Web page ]
[FS09a]
D. Figueira and L. Segoufin. Future-looking logics on data words and trees. In Proceedings of the 34th International Symposium on Mathematical Foundations of Computer Science (MFCS'09), volume 5734 of Lecture Notes in Computer Science, pages 331--343, Novy Smokovec, Slovakia, August 2009. Springer.
doi: 10.1007/978-3-642-03816-7_29.
BibTex | DOI | Web page | PS | PDF ]
[KAS09]
G. Keighren, D. Aspinall, and G. Steel. Towards a Type System for Security APIs. In Revised Selected Papers of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in Computer Science, pages 173--192, York, UK, August 2009. Springer.
doi: 10.1007/978-3-642-03459-6_12.
BibTex | DOI | Web page | PDF ]
[FS09b]
S. Fröschle and G. Steel. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. In Revised Selected Papers of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in Computer Science, pages 92--106, York, UK, August 2009. Springer.
doi: 10.1007/978-3-642-03459-6_7.
BibTex | DOI | Web page | PDF ]
[LA09]
D. Longuet and M. Aiguier. Integration Testing from Structured First-Order Specifications via Deduction Modulo. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture Notes in Computer Science, pages 261--276, Kuala Lumpur, Malaysia, August 2009. Springer.
doi: 10.1007/978-3-642-03466-4_17.
BibTex | DOI | Web page | PDF ]
[And09b]
É. André. IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture Notes in Computer Science, pages 336--342, Kuala Lumpur, Malaysia, August 2009. Springer.
doi: 10.1007/978-3-642-03466-4_22.
BibTex | DOI | Web page | PDF ]
[CDK09c]
S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), volume 5663 of Lecture Notes in Computer Science, pages 355--370, Montreal, Canada, August 2009. Springer.
doi: 10.1007/978-3-642-02959-2_27.
BibTex | DOI | Web page | PDF ]
[KP09]
S. Kremer and P. Panangaden, editors. Proceedings of the 6th International Workshop on Security Issues in Concurrency (SecCo'08), volume 242 of Electronic Notes in Theoretical Computer Science, Toronto, Canada, August 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.07.077.
BibTex | DOI | Web page ]
[EF09]
E. Encrenaz and A. Finkel. Automatic verification of counter systems with ranking functions. In Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science, pages 85--103. Elsevier Science Publishers, July 2009.
doi: 10.1016/j.entcs.2009.05.032.
BibTex | DOI | Web page | PS | PDF ]
[DKR09]
S. Delaune, S. Kremer, and M. D. Ryan. Verifying Privacy-type Properties of Electronic Voting Protocols. Journal of Computer Security, 17(4):435--487, July 2009.
doi: 10.3233/JCS-2009-0340.
BibTex | DOI | Web page | PS | PDF ]
[BFS09b]
F. Bouchy, A. Finkel, and A. Sangnier. Reachability in Timed Counter Systems. In Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science, pages 167--178. Elsevier Science Publishers, July 2009.
doi: 10.1016/j.entcs.2009.05.038.
BibTex | DOI | Web page | PDF ]
[HV09a]
P. Habermehl and T. Vojnar, editors. Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science. Elsevier Science Publishers, July 2009.
doi: 10.1016/j.entcs.2009.05.026.
BibTex | DOI ]
[And09a]
É. André. Everything You Always Wanted to Know About IMITATOR (But Were Afraid to Ask). Research Report LSV-09-20, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 11 pages.
BibTex | Web page | PDF ]
[AF09b]
C. Areces and D. Figueira. Which Semantics for Neighbourhood Semantics? In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI'09), pages 671--676, Pasadena, California, USA, July 2009. AAAI Press.
BibTex | Web page | PS | PDF ]
[BHS09]
B. Bérard, S. Haddad, and M. Sassolas. Verification on Interrupt Timed Automata. Research Report LSV-09-16, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 16 pages.
BibTex | Web page | PDF ]
[HN09]
P.-C. Héam and C. Nicaud. Seed: an Easy-to-Use Random Generator of Recursive Data Structures for Testing. Research Report LSV-09-15, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 16 pages.
BibTex | Web page | PDF ]
[CDK09b]
S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pages 47--58, Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PDF ]
[ACD09b]
M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocol. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pages 33--46, Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PS | PDF ]
[KMT09b]
S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence (Preliminary Version). In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PS | PDF ]
[AFGM09]
C. Areces, D. Figueira, D. Gorín, and S. Mera. Tableaux and Model Checking for Memory Logics. In Proceedings of the 18th International Workshop on Theorem Proving with Analytic Tableaux and Related Methods (TABLEAUX'09), volume 5607 of Lecture Notes in Artificial Intelligence, pages 47--61, Oslo, Norway, July 2009. Springer.
doi: 10.1007/978-3-642-02716-1_5.
BibTex | DOI | Web page | PS | PDF ]
[CHK09]
R. Courbis, P.-C. Héam, and O. Kouchnarenko. TAGED Approximations for Veriying Temporal Patterns. In Proceedings of the 14th International Conference on Implementation and Application of Automata (CIAA'09), volume 5642 of Lecture Notes in Computer Science, pages 135--144, Sydney, Australia, July 2009. Springer-Verlag.
doi: 10.1007/978-3-642-02979-0_17.
BibTex | DOI | Web page | PDF ]
[HNS09]
P.-C. Héam, C. Nicaud, and S. Schmitz. Random Generation of Deterministic Tree (Walking) Automata. In Proceedings of the 14th International Conference on Implementation and Application of Automata (CIAA'09), volume 5642 of Lecture Notes in Computer Science, pages 115--124, Sydney, Australia, July 2009. Springer-Verlag.
doi: 10.1007/978-3-642-02979-0_15.
BibTex | DOI | Web page | PDF ]
[PS09]
Th. Place and L. Segoufin. A decidable characterization of Locally Testable Tree Languages. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 285--296, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_24.
BibTex | DOI | Web page | PDF ]
[FG09b]
A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part II: Complete WSTS. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 188--199, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_16.
BibTex | DOI | Web page | PDF ]
[BBBB09]
C. Baier, N. Bertrand, P. Bouyer, and Th. Brihaye. When are Timed Automata Determinizable? In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 43--54, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_4.
BibTex | DOI | Web page | PDF ]
[BF09]
P. Bouyer and V. Forejt. Reachability in Stochastic Timed Games. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 103--114, Rhodes, Greece, July 2009. Springer.
doi: 10.1007/978-3-642-02930-1_9.
BibTex | DOI | Web page | PDF ]
[CD09a]
V. Cortier and S. Delaune. A method for proving observational equivalence. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), pages 266--276, Port Jefferson, New York, USA, July 2009. IEEE Computer Society Press.
doi: 10.1109/CSF.2009.9.
BibTex | DOI | Web page | PDF ]
[BHKL09]
B. Bollig, P. Habermehl, C. Kern, and M. Leucker. Angluin-Style Learning of NFA. In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI'09), pages 1004--1009, Pasadena, California, USA, July 2009. AAAI Press.
BibTex | Web page | PDF ]
[Ste09a]
G. Steel. Computational Soundness for APIs. In Proceedings of the 5th Workshop on Formal and Computational Cryptography (FCC'09), Port Jefferson, New York, USA, July 2009.
BibTex | Web page | PDF ]
[LS09]
L. Libkin and C. Sirangelo. Open and closed world assumptions in data exchange. In Proceedings of the 22nd International Workshop Description Logic (DL'09), volume 477 of CEUR Workshop Proceedings, pages 1--6, Oxford, UK, July 2009. RWTH Aachen, Germany.
BibTex | Web page | PDF ]
[BYBJ09]
N. Ben Youssef, A. Bouhoula, and F. Jacquemard. Automatic Verification of Conformance of Firewall Configurations to Security Policies. In Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pages 526 -- 531, Sousse, Tunisia, July 2009. IEEE Computer Society Press.
doi: 10.1109/ISCC.2009.5202309.
BibTex | DOI | Web page | PDF ]
[LVN09]
F. Laroussinie, F. Vaandrager, and M. Neuhäußer. Extended timed automata for scheduling. Deliverable QUASIMODO 3.5 (ICT-FP7-STREP-214755), July 2009.
BibTex ]
[MBD+09]
N. Markey, J. Berendsen, A. David, T. Han, H. Hermanns, K. G. Larsen, and M. Neuhäußer. Symbolic data structures and analysis of models with multiple quantitative aspects. Deliverable QUASIMODO 2.2 (ICT-FP7-STREP-214755), July 2009.
BibTex ]
[ABGM09]
S. Abiteboul, P. Bourhis, A. Galland, and B. Marinoiu. The AXML Artifact Model. In Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME'09), pages 11--17, Brixen-Bressanone, Italy, July 2009. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[AP09]
S. Abiteboul and N. Polyzotis. Searching Shared Content in Communities with the Data Ring. IEEE Data Engineering Bulletin, 32(2):44--51, June 2009.
BibTex | DOI | Web page | PDF ]
[AEF09]
É. André, E. Encrenaz, and L. Fribourg. Synthesizing Parametric Constraints on Various Case Studies Using IMITATOR. Research Report LSV-09-13, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2009. 18 pages.
BibTex | Web page | PDF ]
[ABC09]
M. Abadi, B. Blanchet, and H. Comon-Lundh. Models and Proofs of Protocol Security: A Progress Report. In Proceedings of the 21st International Conference on Computer Aided Verification (CAV'09), volume 5643 of Lecture Notes in Computer Science, pages 35--49, Grenoble, France, June-July 2009. Springer.
doi: 10.1007/978-3-642-02658-4_5.
BibTex | DOI | Web page | PDF ]
[BRBH09]
A. Bouillard, S. Rosario, A. Benveniste, and S. Haar. Monotonicity in Service Orchestrations. In Proceedings of the 30th International Conference on Applications and Theory of Petri Nets (PETRI NETS'09), volume 5606 of Lecture Notes in Computer Science, pages 263--282, Paris, France, June 2009. Springer.
doi: 10.1007/978-3-642-02424-5_16.
BibTex | DOI | Web page | PDF ]
[HKP+09]
S. Haddad, F. Kordon, L. Petrucci, J.-F. Pradat-Peyre, and N. Trèves. Efficient State-Based Analysis by Introducing Bags in Petri Nets Color Domains. In Proceedings of the 28th American Control Conference (ACC'09), pages 5018--5025, Saint Louis, Missouri, USA, June 2009.
doi: 10.1109/ACC.2009.5160020.
BibTex | DOI | Web page | PDF ]
[BG09]
B. Bollig and P. Gastin. Weighted versus Probabilistic Logics. In Proceedings of the 13th International Conference on Developments in Language Theory (DLT'09), volume 5583 of Lecture Notes in Computer Science, pages 18--38, Stuttgart, Germany, June-July 2009. Springer.
doi: 10.1007/978-3-642-02737-6_2.
BibTex | DOI | Web page | PDF ]
[AGM09]
S. Abiteboul, G. Gottlob, and M. Manna. Distributed XML Design. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 247--258, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559833.
BibTex | DOI | Web page | PDF ]
[ABM09b]
S. Abiteboul, P. Bourhis, and B. Marinoiu. Satisfiability and relevance for queries over active documents. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 87--96, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559810.
BibTex | DOI | Web page | PDF ]
[BLPS09]
P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo. XML with Incomplete Information: Models, Properties, and Query Answering. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 237--246, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559832.
BibTex | DOI | Web page | PDF ]
[Fig09]
D. Figueira. Satisfiability of Downward XPath with Data Equality Tests. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 197--206, Providence, Rhode Island, USA, June-July 2009. ACM Press.
doi: 10.1145/1559795.1559827.
BibTex | DOI | Web page | PS | PDF ]
[CDK09a]
R. Chadha, S. Delaune, and S. Kremer. Epistemic Logic for the Applied Pi Calculus. In Proceedings of IFIP International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE'09), volume 5522 of Lecture Notes in Computer Science, pages 182--197, Lisbon, Portugal, June 2009. Springer.
doi: 10.1007/978-3-642-02138-1_12.
BibTex | DOI | Web page | PS | PDF ]
[BC09a]
S. Bursuc and H. Comon-Lundh. Protocol security and algebraic properties: decision results for a bounded number of sessions. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 133--147, Brasília, Brazil, June-July 2009. Springer.
doi: 10.1007/978-3-642-02348-4_10.
BibTex | DOI | Web page | PDF ]
[GJ09]
G. Godoy and F. Jacquemard. Unique Normalization for Shallow TRS. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 63--77, Brasília, Brazil, June-July 2009. Springer.
doi: 10.1007/978-3-642-02348-4_5.
BibTex | DOI | Web page | PDF ]
[BCD09a]
M. Baudet, V. Cortier, and S. Delaune. YAPA: A generic tool for computing intruder knowledge. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 148--163, Brasília, Brazil, June-July 2009. Springer.
doi: 10.1007/978-3-642-02348-4_11.
BibTex | DOI | Web page | PDF ]
[GSZ09]
P. Gastin, N. Sznajder, and M. Zeitoun. Distributed synthesis for well-connected architectures. Formal Methods in System Design, 34(3):215--237, June 2009.
doi: 10.1007/s10703-008-0064-7.
BibTex | DOI | Web page | PDF ]
[BFCH09]
M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and S. Haddad. Parametric NdRFT for the derivation of optimal repair strategies. In Proceedings of the 39th Annual IEEEashIFIP International Conference on Dependable Systems and Networks (DSN'09), pages 399--408, Estoril, Portugal, June-July 2009. IEEE Computer Society Press.
doi: 10.1109/DSN.2009.5270312.
BibTex | DOI | Web page | PDF ]
[AC09]
R. Affeldt and H. Comon-Lundh. Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. In Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, pages 1--20. Springer, May 2009.
doi: 10.1007/978-3-642-02002-5_1.
BibTex | DOI | Web page | PDF ]
[Gou09b]
J. Goubault-Larrecq. On a Generalization of a Result by Valk and Jantzen. Research Report LSV-09-09, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2009. 18 pages.
BibTex | Web page | PDF ]
[BMSS09]
M. Bojańczyk, A. Muscholl, Th. Schwentick, and L. Segoufin. Two-variable logic on data trees and applications to XML reasoning. Journal of the ACM, 56(3), May 2009.
doi: 10.1145/1516512.1516515.
BibTex | DOI | Web page | PDF ]
[GGJ09]
A. Gascón, G. Godoy, and F. Jacquemard. Closure of Tree Automata Languages under Innermost Rewriting. In Proceedings of the 8th International Workshop on Reduction Strategies in Rewriting and Programming (WRS'08), volume 237 of Electronic Notes in Theoretical Computer Science, pages 23--38, Castle of Hagenberg, Austria, April 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.03.033.
BibTex | DOI | Web page | PDF ]
[Bur09b]
E. Bursztein. Extending Anticipation Games with Location, Penalty and Timeline. In Revised Selected Papers of the 5th International Workshop on Formal Aspects in Security and Trust (FAST'08), volume 5491 of Lecture Notes in Computer Science, pages 272--286, Malaga, Spain, April 2009. Springer.
doi: 10.1007/978-3-642-01465-9_18.
BibTex | DOI | Web page | PDF ]
[DL09]
S. Demri and R. Lazić. LTL with the freeze quantifier and register automata. ACM Transactions on Computational Logic, 10(3), April 2009.
doi: 10.1145/1507244.1507246.
BibTex | DOI | Web page | PDF ]
[EFSH09]
A. El Fallah Seghrouchni and S. Haddad. Interopérabilité des systèmes multi-agents à l'aide des services web. In Technologies des systèmes multi-agents et applications industrielles, chapter 3, pages 77--99. Hermès, April 2009.
BibTex | Web page ]
[JKV09]
F. Jacquemard, F. Klay, and C. Vacher. Rigid Tree Automata. In Proceedings of the 3rd International Conference on Language and Automata Theory and Applications (LATA'09), volume 5457 of Lecture Notes in Computer Science, pages 446--457, Tarragona, Spain, April 2009. Springer.
doi: 10.1007/978-3-642-00982-2_38.
BibTex | DOI | Web page | PDF ]
[BCK09]
M. Baudet, V. Cortier, and S. Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Information and Computation, 207(4):496--520, April 2009.
doi: 10.1016/j.ic.2008.12.005.
BibTex | DOI | Web page | PDF ]
[Bou09c]
P. Bouyer. Model-Checking Timed Temporal Logics. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science, pages 323--341, Cachan, France, March 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.02.044.
BibTex | DOI | Web page | PDF ]
[AD09]
C. Areces and S. Demri, editors. Proceedings of the 5th International Workshop on Methods for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science, Cachan, France, March 2009. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2009.02.025.
BibTex | DOI | Web page ]
[ABM09a]
S. Abiteboul, P. Bourhis, and B. Marinoiu. Efficient maintenance techniques for views over active documents. In Advances in Database Technology --- Proceedings of the 12th International Conference on Extending Database Technology (EDBT'09), ACM International Conference Proceeding Series, pages 1076--1087, Saint Petersburg, Russia, March 2009. Springer.
doi: 10.1145/1516360.1516483.
BibTex | DOI | Web page | PDF ]
[AGMP09]
S. Abiteboul, O. Greenshpan, T. Milo, and N. Polyzotis. MatchUp: Autocompletion for Mashups. In Proceedings of the 25th International Conference on Data Engineering (ICDE'09), pages 1479--1482, Shanghai, China, March-April 2009. IEEE Computer Society Press.
doi: 10.1109/ICDE.2009.47.
BibTex | DOI | Web page | PDF ]
[CGM+09]
Th. Chatain, P. Gastin, A. Muscholl, N. Sznajder, I. Walukiewicz, and M. Zeitoun. Distributed control for restricted specifications. Deliverable DOTS 2.2 (ANR-06-SETI-003), March 2009.
BibTex ]
[BLLM09]
P. Bouyer, F. Laroussinie, D. Lime, and N. Markey. Synthesis of timed controllers. Deliverable DOTS 1.2a (ANR-06-SETI-003), March 2009.
BibTex ]
[DHS09]
S. Donatelli, S. Haddad, and J. Sproston. Model Checking Timed and Stochastic Properties with CSLTA. IEEE Transactions on Software Engineering, 35(2):224--240, March-April 2009.
doi: 10.1109/TSE.2008.108.
BibTex | DOI | Web page | PDF ]
[BCD+09b]
D. Berwanger, K. Chatterjee, M. De Wulf, L. Doyen, and Th. A. Henzinger. Alpaga: A Tool for Solving Parity Games with Imperfect Information. In Proceedings of the 15th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'09), volume 5505 of Lecture Notes in Computer Science, pages 58--61, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00768-2_7.
BibTex | DOI | Web page | PDF ]
[BBL09]
K. Bansal, R. Brochenin, and É. Lozes. Beyond Shapes: Lists with Ordered Data. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 425--439, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00596-1_30.
BibTex | DOI | Web page | PDF ]
[BH09]
B. Bérard and S. Haddad. Interrupt Timed Automata. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 197--211, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00596-1_15.
BibTex | DOI | Web page | PDF ]
[BGH09]
B. Bollig, M.-L. Grindei, and P. Habermehl. Realizability of Concurrent Recursive Programs. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 410--424, York, UK, March 2009. Springer.
doi: 10.1007/978-3-642-00596-1_29.
BibTex | DOI | Web page | PDF ]
[BS09b]
M. Benedikt and L. Segoufin. Towards a Characterization of Order-Invariant Queries over Tame Structures. Journal of Symbolic Logic, 74(1):168--186, March 2009.
doi: 10.2178/jsl/1231082307.
BibTex | DOI | Web page | PDF ]
[CEFX09]
R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata. Formal Methods in System Design, 34(1):59--81, February 2009.
doi: 10.1007/s10703-008-0061-x.
BibTex | DOI | Web page | PS | PDF ]
[CD09b]
V. Cortier and S. Delaune. Safely Composing Security Protocols. Formal Methods in System Design, 34(1):1--36, February 2009.
doi: 10.1007/s10703-008-0059-4.
BibTex | DOI | Web page | PS | PDF ]
[BC09b]
S. Bursuc and H. Comon-Lundh. Protocols, insecurity decision and combination of equational theories. Research Report LSV-09-02, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2009. 43 pages.
BibTex | Web page | PDF ]
[FG09a]
A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part I: Completions. In Proceedings of the 26th Annual Symposium on Theoretical Aspects of Computer Science (STACS'09), volume 3 of Leibniz International Proceedings in Informatics, pages 433--444, Freiburg, Germany, February 2009. Leibniz-Zentrum für Informatik.
BibTex | Web page | PDF ]
[DG09c]
M. Droste and P. Gastin. Weighted automata and weighted logics. In Handbook of Weighted Automata, EATCS Monographs in Theoretical Computer Science, chapter 5, pages 175--211. Springer, 2009.
BibTex | Web page | PDF ]
[DG09b]
V. Diekert and P. Gastin. Local safety and local liveness for distributed systems. In Perspectives in Concurrency Theory, IARCS-Universities, pages 86--106. Universities Press, January 2009.
BibTex | Web page | PDF ]
[HI09]
S. Haddad and J.-M. Ilié. Symmetry and Temporal Logic. In Petri Nets: Fundamental Models, Verification and Applications, pages 435--460. Wiley-ISTE, 2009.
BibTex | Web page ]
[HV09c]
S. Haddad and F. Vernadat. Verification of Specific Properties. In Petri Nets: Fundamental Models, Verification and Applications, pages 349--414. Wiley-ISTE, 2009.
BibTex | Web page ]
[HM09c]
S. Haddad and P. Moreaux. Tensor Methods and Stochastic Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 321--346. Wiley-ISTE, 2009.
BibTex | Web page ]
[HM09b]
S. Haddad and P. Moreaux. Stochastic Well-formed Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 303--320. Wiley-ISTE, 2009.
BibTex | Web page ]
[HM09a]
S. Haddad and P. Moreaux. Stochastic Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 269--302. Wiley-ISTE, 2009.
BibTex | Web page ]
[Had09]
S. Haddad. Decidability and Complexity of Petri Net Problems. In Petri Nets: Fundamental Models, Verification and Applications, pages 87--122. Wiley-ISTE, 2009.
BibTex | Web page ]
[HV09b]
S. Haddad and F. Vernadat. Analysis Methods for Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 41--86. Wiley-ISTE, 2009.
BibTex | Web page ]
[BHR09b]
P. Bouyer, S. Haddad, and P.-A. Reynier. Undecidability Results for Timed Automata with Silent Transitions. Fundamenta Informaticae, 92(1-2):1--25, 2009.
BibTex | Web page | PS | PDF ]
[BKL+09]
P. Bouyer, J.-P. Katoen, R. Langerak, F. Laroussinie, N. Markey, and J.-F. Raskin. Transfer of correctness from models to implementation. Deliverable QUASIMODO 3.1 (ICT-FP7-STREP-214755), January 2009.
BibTex ]
[Bou09b]
P. Bouyer. From Qualitative to Quantitative Analysis of Timed Systems. Mémoire d'habilitation, Université Paris 7, Paris, France, January 2009.
BibTex | Web page | PDF ]
[GMNK09]
P. Gastin, M. Mukund, and K. Narayan Kumar. Reachability and boundedness in time-constrained MSC graphs. In Perspectives in Concurrency Theory, IARCS-Universities, pages 157--183. Universities Press, January 2009.
BibTex | Web page | PDF ]
[BP09]
P. Bouyer and A. Petit. On extensions of timed automata. In Perspectives in Concurrency Theory, IARCS-Universities, pages 35--63. Universities Press, January 2009.
BibTex ]
[CGS09]
Th. Chatain, P. Gastin, and N. Sznajder. Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems. In Proceedings of the 35th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'09), volume 5404 of Lecture Notes in Computer Science, pages 141--152, Špindlerův Mlýn, Czech Republic, January 2009. Springer.
doi: 10.1007/978-3-540-95891-8_16.
BibTex | DOI | Web page | PDF ]
[BDLM09]
Th. Brihaye, A. Da Costa, F. Laroussinie, and N. Markey. ATL with Strategy Contexts and Bounded Memory. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'09), volume 5407 of Lecture Notes in Computer Science, pages 92--106, Deerfield Beach, Florida, USA, January 2009. Springer.
doi: 10.1007/978-3-540-92687-0_7.
BibTex | DOI | Web page | PDF ]
[Com08a]
H. Comon-Lundh. About models of security protocols. In Proceedings of the 28th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'08), volume 2 of Leibniz International Proceedings in Informatics, Bangalore, India, December 2008. Leibniz-Zentrum für Informatik.
BibTex | Web page | PDF ]
[Ore08]
G. Oreiby. Logiques temporelles pour le contrôle temporisé. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2008.
BibTex | Web page | PDF ]
[GLN08]
J. Goubault-Larrecq, S. Lasota, and D. Nowak. Logical Relations for Monadic Types. Mathematical Structures in Computer Science, 18(6):1169--1217, December 2008. 81 pages.
doi: 10.1017/S0960129508007172.
BibTex | DOI | Web page | PDF ]
[Bol08]
B. Bollig. On the Expressive Power of 2-Stack Visibly Pushdown Automata. Logical Methods in Computer Science, 4(4:16), December 2008.
doi: 10.2168/LMCS-4(4:16)2008.
BibTex | DOI | Web page | PS | PDF ]
[DG08a]
S. Demri and R. Gascon. Verification of Qualitative Z constraints. Theoretical Computer Science, 409(1):24--40, December 2008.
doi: 10.1016/j.tcs.2008.07.023.
BibTex | DOI | Web page | PDF ]
[DDMR08]
M. De Wulf, L. Doyen, N. Markey, and J.-F. Raskin. Robust Safety of Timed Automata. Formal Methods in System Design, 33(1-3):45--84, December 2008.
doi: 10.1007/s10703-008-0056-7.
BibTex | DOI | Web page | PDF ]
[ACEF08]
É. André, Th. Chatain, E. Encrenaz, and L. Fribourg. An Inverse Method for Parametric Timed Automata. In Proceedings of the 2nd Workshop on Reachability Problems in Computational Models (RP'08), volume 223 of Electronic Notes in Theoretical Computer Science, pages 29--46, Liverpool, UK, December 2008. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2008.12.029.
BibTex | DOI | Web page | PDF ]
[Bur08a]
E. Bursztein. Anticipation games. Théorie des jeux appliqués à la sécurité réseau. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2008.
BibTex | Web page | PDF ]
[San08]
A. Sangnier. Vérification de systèmes avec compteurs et pointeurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2008.
BibTex | Web page | PS | PDF ]
[Ara08]
M. Arapinis. Sécurité des protocoles cryptographiques : décidabilité et résultats de réduction. Thèse de doctorat, Université Paris 12, Créteil, France, November 2008.
BibTex | Web page | PDF ]
[ADK08]
M. Arapinis, S. Delaune, and S. Kremer. From One Session to Many: Dynamic Tags for Security Protocols. In Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), volume 5330 of Lecture Notes in Artificial Intelligence, pages 128--142, Doha, Qatar, November 2008. Springer.
doi: 10.1007/978-3-540-89439-1_9.
BibTex | DOI | Web page | PDF ]
[AGM08]
S. Abiteboul, O. Greenshpan, and T. Milo. Modeling the mashup space. In Proceedings of the 10th ACM International Workshop on Web Information and Data Management (WIDM'08), pages 87--94, Napa Valley, California, USA, October 2008. ACM Press.
doi: 10.1145/1458502.1458517.
BibTex | DOI | Web page | PDF ]
[DH08]
S. Donatelli and S. Haddad. Vérification quantitative de chaînes de Markov. In Approches formelles des systèmes embarqués communicants, chapter 6, pages 177--198. Hermès, October 2008.
BibTex | Web page ]
[CM08]
F. Cassez and N. Markey. Contrôle des systèmes temporisés. In Approches formelles des systèmes embarqués communicants, chapter 4, pages 105--144. Hermès, October 2008.
BibTex | Web page ]
[CC08]
H. Comon-Lundh and V. Cortier. Computational Soundness of Observational Equivalence. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), pages 109--118, Alexandria, Virginia, USA, October 2008. ACM Press.
doi: 10.1145/1455770.1455786.
BibTex | DOI | Web page | PDF ]
[BCFH08]
M. Beccuti, D. Codetta-Raiteri, G. Franceschinis, and S. Haddad. Non Deterministic Repairable Fault Trees for Computing Optimal Repair Strategy. In Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'08), Athens, Greece, October 2008. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
doi: 10.4108/ICST.VALUETOOLS2008.4411.
BibTex | DOI | Web page | PDF ]
[Bur08c]
E. Bursztein. NetQi: A Model Checker for Anticipation Game. In Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis (ATVA'08), volume 5311 of Lecture Notes in Computer Science, pages 246--251, Seoul, Korea, October 2008. Springer.
doi: 10.1007/978-3-540-88387-6_22.
BibTex | DOI | Web page | PDF ]
[BFLP08]
S. Bardin, A. Finkel, J. Leroux, and L. Petrucci. FAST: Acceleration from theory to practice. International Journal on Software Tools for Technology Transfer, 10(5):401--424, October 2008.
doi: 10.1007/s10009-008-0064-3.
BibTex | DOI | Web page ]
[RBHJ08]
S. Rosario, A. Benveniste, S. Haar, and C. Jard. Probabilistic QoS and Soft Contracts for Transaction-Based Web Services Orchestrations. IEEE Transactions on Services Computing, 1(4):187--200, October-December 2008.
doi: 10.1109/TSC.2008.17.
BibTex | DOI | Web page | PDF ]
[BHK08]
Y. Boichut, P.-C. Héam, and O. Kouchnarenko. Approximation-based Tree Regular Model-Checking. Nordic Journal of Computing, 14(3):216--241, October 2008.
BibTex | Web page | PDF ]
[Cio08]
S. Ciobâcă. Verification of anonymity properties in e-voting protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2008.
BibTex | Web page | PDF ]
[L+08b]
F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 18 mois, September 2008. 5 pages.
BibTex ]
[CLLM08]
F. Cassez, F. Laroussinie, D. Lime, and N. Markey. Quantitative Objectives in Timed Games. Deliverable DOTS 1.1 (ANR-06-SETI-003), September 2008.
BibTex ]
[BBC+08]
B. Bollig, P. Bouyer, F. Cassez, Th. Chatain, P. Gastin, S. Haddad, and C. Jard. Model for distributed timed systems. Deliverable DOTS 3.1 (ANR-06-SETI-003), September 2008.
BibTex ]
[BBJ+08]
P. Bouyer, Th. Brihaye, M. Jurdziński, R. Lazić, and M. Rutkowski. Average-Price and Reachability-Price Games on Hybrid Automata with Strong Resets. In Proceedings of the 6th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215 of Lecture Notes in Computer Science, pages 63--77, Saint-Malo, France, September 2008. Springer.
doi: 10.1007/978-3-540-85778-5_6.
BibTex | DOI | Web page | PDF ]
[BFL+08b]
P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and J. Srba. Infinite Runs in Weighted Timed Automata with Energy Constraints. In Proceedings of the 6th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215 of Lecture Notes in Computer Science, pages 33--47, Saint-Malo, France, September 2008. Springer.
doi: 10.1007/978-3-540-85778-5_4.
BibTex | DOI | Web page | PDF ]
[ABH08]
M. F. Atig, B. Bollig, and P. Habermehl. Emptiness of multi-pushdown automata is 2ETIME-complete. In Proceedings of the 12th International Conference on Developments in Language Theory (DLT'08), volume 5257 of Lecture Notes in Computer Science, pages 121--133, Kyoto, Japan, September 2008. Springer.
doi: 10.1007/978-3-540-85780-8_9.
BibTex | DOI | Web page | PDF ]
[CDF+08]
N. Chamseddine, M. Duflot, L. Fribourg, C. Picaronny, and J. Sproston. Computing Expected Absorption Times for Parametric Determinate Probabilistic Timed Automata. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08), pages 254--263, Saint Malo, France, September 2008. IEEE Computer Society Press.
doi: 10.1109/QEST.2008.34.
BibTex | DOI | Web page | PDF ]
[Pla08]
Th. Place. Characterization of Logics Over Ranked Tree Languages. In Proceedings of the 17th Annual EACSL Conference on Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in Computer Science, pages 401--415, Bertinoro, Italy, September 2008. Springer.
doi: 10.1007/978-3-540-87531-4_29.
BibTex | DOI | Web page | PDF ]
[BDL08]
R. Brochenin, S. Demri, and É. Lozes. On the Almighty Wand. In Proceedings of the 17th Annual EACSL Conference on Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in Computer Science, pages 323--338, Bertinoro, Italy, September 2008. Springer.
doi: 10.1007/978-3-540-87531-4_24.
BibTex | DOI | Web page | PDF ]
[BBBM08]
N. Bertrand, P. Bouyer, Th. Brihaye, and N. Markey. Quantitative Model-Checking of One-Clock Timed Automata under Probabilistic Semantics. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08), pages 55--64, Saint Malo, France, September 2008. IEEE Computer Society Press.
doi: 10.1109/QEST.2008.19.
BibTex | DOI | Web page | PDF ]
[BCH+08]
B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H. Roux. When are Timed Automata Weakly Timed Bisimilar to Time Petri Nets? Theoretical Computer Science, 403(2-3):202--220, September 2008.
doi: 10.1016/j.tcs.2008.03.030.
BibTex | DOI | Web page | PDF ]
[BK08]
B. Bollig and D. Kuske. Muller Message-Passing Automata and Logics. Information and Computation, 206(9-10):1084--1094, September-October 2008.
doi: 10.1016/j.ic.2008.03.010.
BibTex | DOI | Web page | PS | PDF ]
[LHS08]
É. Lozes, D. Hirschkoff, and D. Sangiorgi. Separability in the Ambient Logic. Logical Methods in Computer Science, 4(3:4), September 2008.
doi: 10.2168/LMCS-4(3:4)2008.
BibTex | DOI | Web page | PS | PDF ]
[AAC+08]
S. Abiteboul, T. Allard, Ph. Chatalic, G. Gardarin, A. Ghitescu, F. Goasdoué, I. Manolescu, B. Nguyen, M. Ouazara, A. Somani, N. Travers, G. Vasile, and S. Zoupanos. WebContent: efficient P2P warehousing of web data. In Proceedings of the 34th International Conference on Very Large Data Bases (VLDB'08), volume 1 of Proceedings of the VLDB Endowment, pages 1428--1431, Auckland, New Zealand, August 2008. ACM Press.
BibTex | Web page | PDF ]
[ABM08]
S. Abiteboul, O. Benjelloun, and T. Milo. The Active XML project: an overview. The VLDB Journal, 17(5):1019--1040, August 2008.
doi: 10.1007/s00778-007-0049-y.
BibTex | DOI | Web page | PDF ]
[Mar08]
N. Markey. Infinite Runs In Weighted Times Games with Energy Constraints. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008.
BibTex ]
[Bou08b]
P. Bouyer. Probabilities in Timed Automata. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008.
BibTex ]
[Sch08]
Ph. Schnoebelen. The complexity of lossy channel systems. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008.
BibTex ]
[Com08b]
H. Comon-Lundh. Challenges in the Automated Verification of Security Protocols. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 396--409, Sydney, Australia, August 2008. Springer-Verlag.
doi: 10.1007/978-3-540-71070-7_34.
BibTex | DOI | Web page | PDF ]
[CS08a]
P. Chambart and Ph. Schnoebelen. Mixing Lossy and Perfect Fifo Channels. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 340--355, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_28.
BibTex | DOI | Web page | PS | PDF ]
[BCHK08]
P. Baldan, Th. Chatain, S. Haar, and B. König. Unfolding-based Diagnosis of Systems with an Evolving Topology. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 203--217, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_19.
BibTex | DOI | Web page | PDF ]
[BKKL08]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Smyle: A Tool for Synthesizing Distributed Models from Scenarios by Learning. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 162--166, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_15.
BibTex | DOI | Web page | PDF ]
[LV08]
É. Lozes and J. Villard. A Spatial Equational Logic for the Applied π-Calculus. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 387--401, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_31.
BibTex | DOI | Web page | PDF ]
[ABG+08]
S. Akshay, B. Bollig, P. Gastin, M. Mukund, and K. Narayan Kumar. Distributed Timed Automata with Independently Evolving Clocks. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 82--97, Toronto, Canada, August 2008. Springer.
doi: 10.1007/978-3-540-85361-9_10.
BibTex | DOI | Web page | PDF ]
[FS08]
A. Finkel and A. Sangnier. Reversal-bounded Counter Machines Revisited. In Proceedings of the 33rd International Symposium on Mathematical Foundations of Computer Science (MFCS'08), volume 5162 of Lecture Notes in Computer Science, pages 323--334, Toruń, Poland, August 2008. Springer.
doi: 10.1007/978-3-540-85238-4_26.
BibTex | DOI | Web page | PS | PDF ]
[BJ08]
A. Bouhoula and F. Jacquemard. Automated Induction with Constrained Tree Automata. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 539--553, Sydney, Australia, August 2008. Springer-Verlag.
doi: 10.1007/978-3-540-71070-7_44.
BibTex | DOI | Web page | PDF ]
[KMT08]
S. Kremer, A. Mercier, and R. Treinen. Proving Group Protocols Secure Against Eavesdroppers. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 116--131, Sydney, Australia, August 2008. Springer-Verlag.
doi: 10.1007/978-3-540-71070-7_9.
BibTex | DOI | Web page | PDF ]
[AMZ08b]
S. Abiteboul, I. Manolescu, and S. Zoupanos. OptimAX: Optimizing Distributed ActiveXML Applications. In Proceedings of the 8th International Conference on Web Engineering (ICWE'08), pages 299--310, Yorktown Heights, New York, USA, July 2008. IEEE Computer Society Press.
doi: 10.1109/ICWE.2008.11.
BibTex | DOI | Web page | PDF ]
[JR08]
F. Jacquemard and M. Rusinowitch. Closure of Hedge-Automata Languages by Hedge Rewriting. In Proceedings of the 19th International Conference on Rewriting Techniques and Applications (RTA'08), volume 5117 of Lecture Notes in Computer Science, pages 157--171, Hagenberg, Austria, July 2008. Springer.
doi: 10.1007/978-3-540-70590-1_11.
BibTex | DOI | Web page | PDF ]
[BHH+08b]
A. Bouajjani, P. Habermehl, L. Holík, T. Touili, and T. Vojnar. Antichain-based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata. In Proceedings of the 13th International Conference on Implementation and Application of Automata (CIAA'08), volume 5148 of Lecture Notes in Computer Science, pages 57--67, San Francisco, California, USA, July 2008. Springer-Verlag.
doi: 10.1007/978-3-540-70844-5_7.
BibTex | DOI | Web page | PDF ]
[AFFM08]
C. Areces, D. Figueira, S. Figueira, and S. Mera. Expressive Power and Decidability for Memory Logics. In Proceedings of the 15th Workshop on Logic, Language, Information and Computation (WoLLIC'08), volume 5110 of Lecture Notes in Computer Science, pages 56--68, Edinburgh, Scotland, UK, July 2008. Springer.
doi: 10.1007/978-3-540-69937-8_7.
BibTex | DOI | Web page | PDF ]
[BS08]
M. Bojańczyk and L. Segoufin. Tree languages defined in first-order logic with one quantifier alternation. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) -- Part II, volume 5126 of Lecture Notes in Computer Science, pages 233--245, Reykjavik, Iceland, July 2008. Springer.
doi: 10.1007/978-3-540-70583-3_20.
BibTex | DOI | Web page | PDF ]
[BMOW08]
P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. On Expressiveness and Complexity in Real-time Model Checking. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) -- Part II, volume 5126 of Lecture Notes in Computer Science, pages 124--135, Reykjavik, Iceland, July 2008. Springer.
doi: 10.1007/978-3-540-70583-3_11.
BibTex | DOI | Web page | PDF ]
[HMY08]
S. Haddad, L. Mokdad, and S. Youcef. Response Time Analysis of Composite Web Services. In Proceedings of the 6th Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP'08), pages 506--510, Graz, Austria, July 2008. IEEE Computer Society Press.
BibTex | Web page | PDF ]
[Gou08a]
J. Goubault-Larrecq. A Cone-Theoretic Krein-Milman Theorem. Research Report LSV-08-18, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2008. 8 pages.
BibTex | Web page | PDF ]
[CJP08]
H. Comon-Lundh, F. Jacquemard, and N. Perrin. Visibly Tree Automata with Memory and Constraints. Logical Methods in Computer Science, 4(2:8), June 2008.
doi: 10.2168/LMCS-4(2:8)2008.
BibTex | DOI | Web page | PDF ]
[DJ08]
S. Demri and Ch. S. Jensen, editors. Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), Montréal, Canada, June 2008. IEEE Computer Society Press.
BibTex ]
[tCS08]
B. ten Cate and L. Segoufin. XPath, Transitive Closure Logic, and Nested Tree Walking Automata. In Proceedings of the 27th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'08), pages 251--260, Vancouver, Canada, June 2008. ACM Press.
doi: 10.1145/1376916.1376952.
BibTex | DOI | Web page | PDF ]
[ASV08]
S. Abiteboul, L. Segoufin, and V. Vianu. Static Analysis of Active XML Systems. In Proceedings of the 27th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'08), pages 221--230, Vancouver, Canada, June 2008. ACM Press.
doi: 10.1145/1376916.1376948.
BibTex | DOI | Web page | PDF ]
[BLM08]
P. Bouyer, K. G. Larsen, and N. Markey. Model Checking One-clock Priced Timed Automata. Logical Methods in Computer Science, 4(2:9), June 2008.
doi: 10.2168/LMCS-4(2:9)2008.
BibTex | DOI | Web page | PDF ]
[Gou08d]
J. Goubault-Larrecq. Towards Producing Formally Checkable Security Proofs, Automatically. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 224--238, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/CSF.2008.21.
BibTex | DOI | Web page | PDF ]
[DKR08]
S. Delaune, S. Kremer, and M. D. Ryan. Composition of Password-based Protocols. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 239--251, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/CSF.2008.6.
BibTex | DOI | Web page | PDF ]
[DKS08a]
S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 331--344, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/CSF.2008.16.
BibTex | DOI | Web page | PDF ]
[BSS08]
M. Bojańczyk, L. Segoufin, and H. Straubing. Piecewise Testable Tree Languages. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 442--451, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/LICS.2008.46.
BibTex | DOI | Web page | PDF ]
[CS08c]
P. Chambart and Ph. Schnoebelen. The Ordinal Recursive Complexity of Lossy Channel Systems. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 205--216, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/LICS.2008.47.
BibTex | DOI | Web page | PDF ]
[BBB+08]
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and M. Größer. Almost-Sure Model Checking of Infinite Paths in One-Clock Timed Automata. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 217--226, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press.
doi: 10.1109/LICS.2008.25.
BibTex | DOI | Web page | PDF ]
[DRS08]
S. Delaune, M. D. Ryan, and B. Smyth. Automatic verification of privacy properties in the applied pi-calculus. In Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM'08), volume 263 of IFIP Conference Proceedings, pages 263--278, Trondheim, Norway, June 2008. Springer.
BibTex | Web page | PS | PDF ]
[BFL08a]
F. Bouchy, A. Finkel, and J. Leroux. Decomposition of Decidable First-Order Logics over Integers and Reals. In Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), pages 147--155, Montréal, Canada, June 2008. IEEE Computer Society Press.
doi: 10.1109/TIME.2008.22.
BibTex | DOI | Web page | PDF ]
[BGMR08]
Th. Brihaye, M. Ghannem, N. Markey, and L. Rieg. Good friends are hard to find! In Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), pages 32--40, Montréal, Canada, June 2008. IEEE Computer Society Press.
doi: 10.1109/TIME.2008.10.
BibTex | DOI | Web page | PDF ]
[DGK08]
V. Diekert, P. Gastin, and M. Kufleitner. A Survey on Small Fragments of First-Order Logic over Finite Words. International Journal of Foundations of Computer Science, 19(3):513--548, June 2008.
doi: 10.1142/S0129054108005802.
BibTex | DOI | Web page | PDF ]
[DG08c]
M. Droste and P. Gastin. On aperiodic and star-free formal power series in partially commuting variables. Theory of Computing Systems, 42(4):608--631, May 2008.
doi: 10.1007/s00224-007-9064-z.
BibTex | DOI | Web page | PS | PDF ]
[LMO08]
F. Laroussinie, N. Markey, and G. Oreiby. On the Expressiveness and Complexity of ATL. Logical Methods in Computer Science, 4(2:7), May 2008.
doi: 10.2168/LMCS-4(2:7)2008.
BibTex | DOI | Web page | PDF ]
[BHH+08a]
B. Bérard, S. Haddad, L. M. Hillah, F. Kordon, and Y. Thierry-Mieg. Collision Avoidance in Intelligent Transport Systems: Towards an Application of Control Theory. In Proceedings of the 9th Workshop on Discrete Event Systems (WODES'08), pages 346--351, Gothenburg, Sweden, May 2008.
doi: 10.1109/WODES.2008.4605970.
BibTex | DOI | Web page | PDF ]
[Bur08e]
E. Bursztein. Probabilistic Protocol Identification for Hard to Classify Protocol. In Proceedings of the 2nd International Workshop on Information Security Theory and Practices (WISTP'08), volume 5019 of Lecture Notes in Computer Science, pages 49--63, Sevilla, Spain, May 2008. Springer. Best paper award.
doi: 10.1007/978-3-540-79966-5_4.
BibTex | DOI | Web page | PDF ]
[JRV08]
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Tree automata with equality constraints modulo equational theories. Journal of Logic and Algebraic Programming, 75(2):182--208, April 2008.
doi: 10.1016/j.jlap.2007.10.006.
BibTex | DOI | Web page | PDF ]
[AMP+08]
S. Abiteboul, I. Manolescu, N. Polyzotis, N. Preda, and C. Sun. XML processing in DHT networks. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 606--615, Cancun, Mexico, April 2008. IEEE Computer Society Press.
doi: 10.1109/ICDE.2008.4497469.
BibTex | DOI | Web page | PDF ]
[AMZ08a]
S. Abiteboul, I. Manolescu, and S. Zoupanos. OptimAX: efficient support for data-intensive mash-ups. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1564--1567, Cancun, Mexico, April 2008. IEEE Computer Society Press.
doi: 10.1109/ICDE.2008.4497622.
BibTex | DOI | Web page | PDF ]
[AMB08]
S. Abiteboul, B. Marinoiu, and P. Bourhis. Distributed Monitoring of Peer-to-Peer Systems. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1572--1575, Cancun, Mexico, April 2008. IEEE Computer Society Press.
doi: 10.1109/ICDE.2008.4497624.
BibTex | DOI | Web page | PDF ]
[EF08]
E. Encrenaz and L. Fribourg. Time Separation of Events: An Inverse Method. In Proceedings of the LIX Colloquium on Emerging Trends in Concurrency Theory (LIX'06), volume 209 of Electronic Notes in Theoretical Computer Science, pages 135--148, Palaiseau, France, April 2008. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2008.04.008.
BibTex | DOI | Web page | PDF ]
[DLS08]
S. Demri, R. Lazić, and A. Sangnier. Model checking freeze LTL over one-counter automata. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 490--504, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_34.
BibTex | DOI | Web page | PS | PDF ]
[HIV08]
P. Habermehl, R. Iosif, and T. Vojnar. What else is decidable about arrays? In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 474--489, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_33.
BibTex | DOI | Web page | PDF ]
[BMR08]
P. Bouyer, N. Markey, and P.-A. Reynier. Robust Analysis of Timed Automata via Channel Machines. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 157--171, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_12.
BibTex | DOI | Web page | PS | PDF ]
[CS08b]
P. Chambart and Ph. Schnoebelen. The ω-Regular Post Embedding Problem. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 97--111, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_8.
BibTex | DOI | Web page | PS | PDF ]
[Gou08c]
J. Goubault-Larrecq. Simulation Hemi-Metrics Between Infinite-State Stochastic Games. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 50--65, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_5.
BibTex | DOI | Web page ]
[Gou08b]
J. Goubault-Larrecq. Prevision Domains and Convex Powercones. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 318--333, Budapest, Hungary, March-April 2008. Springer.
doi: 10.1007/978-3-540-78499-9_23.
BibTex | DOI | Web page ]
[L+08a]
F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 12 mois, March 2008. 6 pages.
BibTex ]
[VLT08]
J. Villard, É. Lozes, and R. Treinen. A Spatial Equational Logic for the Applied pi-calculus. Research Report LSV-08-10, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2008. 44 pages.
BibTex | Web page | PDF ]
[GO08]
J. Goubault-Larrecq and J. Olivain. A Smell of Orchids. In Proceedings of the 8th Workshop on Runtime Verification (RV'08), volume 5289 of Lecture Notes in Computer Science, pages 1--20, Budapest, Hungary, March 2008. Springer.
doi: 10.1007/978-3-540-89247-2_1.
BibTex | DOI | Web page | PDF ]
[FL08]
A. Finkel and J. Leroux. Presburger Functions are Piecewise Linear. Research Report LSV-08-08, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2008. 9 pages.
BibTex | Web page | PDF ]
[DKS08b]
S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pages 267--278, Taipei, Taiwan, March 2008.
BibTex | Web page | PDF ]
[Bou08a]
P. Bouyer. Model-Checking Timed Temporal Logics. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pages 132--142, Taipei, Taiwan, March 2008.
BibTex | Web page | PDF ]
[BMO+08]
P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen, and J. Worrell. On Termination for Faulty Channel Machines. In Proceedings of the 25th Annual Symposium on Theoretical Aspects of Computer Science (STACS'08), volume 1 of Leibniz International Proceedings in Informatics, pages 121--132, Bordeaux, France, February 2008. Leibniz-Zentrum für Informatik.
BibTex | Web page | PS | PDF ]
[DLLT08]
S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 206(2-4):312--351, February-April 2008.
doi: 10.1016/j.ic.2007.07.005.
BibTex | DOI | Web page | PDF ]
[BBL08]
P. Bouyer, E. Brinksma, and K. G. Larsen. Optimal Infinite Scheduling for Multi-Priced Timed Automata. Formal Methods in System Design, 32(1):2--23, February 2008.
doi: 10.1007/s10703-007-0043-4.
BibTex | DOI | Web page | PS | PDF ]
[Bur08d]
E. Bursztein. Network Administrator and Intruder Strategies. Research Report LSV-08-02, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2008. 23 pages.
BibTex | Web page | PDF ]
[PPS+08]
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun, and J.-P. Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking. IEEE Communications Magazine, 46(2):132--139, February 2008.
doi: 10.1109/MCOM.2008.4473095.
BibTex | DOI | Web page | PDF ]
[BC08]
V. Bernat and H. Comon-Lundh. Normal proofs in intruder theories. In Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer Science, pages 151--166, Tokyo, Japan, January 2008. Springer.
doi: 10.1007/978-3-540-77505-8_12.
BibTex | DOI | Web page | PDF ]
[LNY08]
S. Lasota, D. Nowak, and Z. Yu. On completeness of logical relations for monadic types. In Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer Science, pages 223--230, Tokyo, Japan, January 2008. Springer.
doi: 10.1007/978-3-540-77505-8_17.
BibTex | DOI | Web page | PDF ]
[Kre08]
S. Kremer. Computational soundness of equational theories (Tutorial). In Revised Selected Papers from the 3rd Symposium on Trustworthy Global Computing (TGC'07), volume 4912 of Lecture Notes in Computer Science, pages 363--382, Sophia-Antipolis, France, 2008. Springer.
doi: 10.1007/978-3-540-78663-4.
BibTex | DOI | Web page | PDF ]
[TED08]
S. Taktak, E. Encrenaz, and J.-L. Desbarbieux. A tool for automatic detection of deadlocks in wormhole networks on chip. ACM Transactions on Design Automation of Electronic Systems, 13(1), January 2008.
doi: 10.1145/1297666.1297672.
BibTex | DOI | Web page | PS | PDF ]
[BHR08]
P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. Information and Computation, 206(1):73--107, January 2008.
doi: 10.1016/j.ic.2007.10.004.
BibTex | DOI | Web page | PDF ]
[SAG08]
P. Senellart, S. Abiteboul, and R. Gilleron. Understanding the Hidden Web. ERCIM News, 72:32--33, January 2008.
BibTex | Web page ]
[CKR08]
L. Chen, S. Kremer, and M. D. Ryan, editors. Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2008.
BibTex | Web page ]
[HM08]
S. Haddad and P. Moreaux. Verification of Probabilistic Systems Methods and Tools. In Modeling and Verification of Real-Time Systems, pages 289--318. ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008.
BibTex | Web page ]
[BL08]
P. Bouyer and F. Laroussinie. Model Checking Timed Automata. In Modeling and Verification of Real-Time Systems, pages 111--140. ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008.
BibTex | Web page | PDF ]
[Bur08b]
E. Bursztein. NetAnalyzer v0.7.5, January 2008. Written in C and Perl (about 25000 lines).
BibTex ]
[DG08b]
V. Diekert and P. Gastin. First-order definable languages. In Logic and Automata: History and Perspectives, volume 2 of Texts in Logic and Games, pages 261--306. Amsterdam University Press, 2008.
BibTex | Web page | PDF ]
[BG07]
E. Bursztein and J. Goubault-Larrecq. A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. In Proceedings of the 12th Asian Computing Science Conference (ASIAN'07), volume 4846 of Lecture Notes in Computer Science, pages 212--227, Doha, Qatar, December 2007. Springer.
doi: 10.1007/978-3-540-76929-3_20.
BibTex | DOI | Web page | PDF ]
[ABG07]
S. Akshay, B. Bollig, and P. Gastin. Automata and Logics for Timed Message Sequence Charts. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 290--302, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_24.
BibTex | DOI | Web page | PS | PDF ]
[CS07]
P. Chambart and Ph. Schnoebelen. Post Embedding Problem is not Primitive Recursive, with Applications to Channel Systems. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 265--276, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_22.
BibTex | DOI | Web page | PS | PDF ]
[CDD07]
V. Cortier, J. Delaitre, and S. Delaune. Safely Composing Security Protocols. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 352--363, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_29.
BibTex | DOI | Web page | PDF ]
[BBB+07]
C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and M. Größer. Probabilistic and Topological Semantics for Timed Automata. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 179--191, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_15.
BibTex | DOI | Web page | PDF ]
[BKM07]
B. Bollig, D. Kuske, and I. Meinecke. Propositional Dynamic Logic for Message-Passing Systems. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 303--315, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_25.
BibTex | DOI | Web page | PS | PDF ]
[DKR07]
S. Delaune, S. Kremer, and M. D. Ryan. Symbolic Bisimulation for the Applied Pi-Calculus. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 133--145, New Delhi, India, December 2007. Springer.
doi: 10.1007/978-3-540-77050-3_11.
BibTex | DOI | Web page | PDF ]
[BBS07]
C. Baier, N. Bertrand, and Ph. Schnoebelen. Verifying nondeterministic probabilistic channel systems against ω-regular linear-time properties. ACM Transactions on Computational Logic, 9(1), December 2007.
doi: 10.1145/1297658.1297663.
BibTex | DOI | Web page | PS | PDF ]
[Car07]
J.-L. Carré. Réécriture, confluence. Course notes, Préparation à l'agrégation, ENS Cachan, France, December 2007.
BibTex ]
[Bur07a]
E. Bursztein. NetQi v1rc1. Available at http://www.netqi.org/, December 2007. Written in C and Java (about 10000 lines).
BibTex | Web page ]
[Gas07a]
R. Gascon. Spécification et vérification de propriétés quantitatives sur des automates à contraintes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2007.
BibTex | Web page | PS | PDF ]
[GPT07]
J. Goubault-Larrecq, C. Palamidessi, and A. Troina. A Probabilistic Applied Pi-Calculus. In Proceedings of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07), volume 4807 of Lecture Notes in Computer Science, pages 175--290, Singapore, November-December 2007. Springer.
doi: 10.1007/978-3-540-76637-7_12.
BibTex | DOI | Web page | PDF ]
[GK07]
P. Gastin and D. Kuske. Uniform satisfiability in PSPACE for local temporal logics over Mazurkiewicz traces. Fundamenta Informaticae, 80(1-3):169--197, November 2007.
BibTex | Web page | PDF ]
[CDG+07]
H. Comon-Lundh, M. Dauchet, R. Gilleron, C. Löding, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. November 2007.
BibTex | Web page ]
[Gas07b]
P. Gastin. Algorithmique. Course notes, Magistère STIC, ENS Cachan, France, November 2007.
BibTex ]
[Bur07b]
E. Bursztein. Time has something to tell us about network address translation. In Proceedings of the 12th Nordic Workshop on Secure IT Systems (NordSec'07), Reykjavik, Iceland, October 2007.
BibTex | Web page | PDF ]
[JR07]
F. Jacquemard and M. Rusinowitch. Rewrite Closure of Hedge-Automata Languages. Research Report LSV-07-31, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2007. 22 pages.
BibTex | Web page | PDF ]
[HIRV07]
P. Habermehl, R. Iosif, A. Rogalewicz, and T. Vojnar. Proving Termination of Tree Manipulating Programs. In Proceedings of the 5th International Symposium on Automated Technology for Verification and Analysis (ATVA'07), volume 4762 of Lecture Notes in Computer Science, pages 145--161, Tokyo, Japan, October 2007. Springer.
doi: 10.1007/978-3-540-75596-8_12.
BibTex | DOI | Web page | PS | PDF ]
[DR07]
S. Demri and A. Rabinovich. The complexity of temporal logic with until and since over ordinals. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 531--545, Yerevan, Armenia, October 2007. Springer.
doi: 10.1007/978-3-540-75560-9_38.
BibTex | DOI | Web page | PDF ]
[DLL07]
S. Delaune, H. Lin, and Ch. Lynch. Protocol verification via rigidashflexible resolution. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 242--256, Yerevan, Armenia, October 2007. Springer.
doi: 10.1007/978-3-540-75560-9_19.
BibTex | DOI | Web page | PDF ]
[CD07]
V. Cortier and S. Delaune. Deciding Knowledge in Security Protocols for Monoidal Equational Theories. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 196--210, Yerevan, Armenia, October 2007. Springer.
doi: 10.1007/978-3-540-75560-9_16.
BibTex | DOI | Web page | PS | PDF ]
[CDP07]
F. Chevalier, D. D'Souza, and P. Prabhakar. Counter-free Input Determined Timed Automata. In Proceedings of the 5th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763 of Lecture Notes in Computer Science, pages 82--97, Salzburg, Austria, October 2007. Springer.
doi: 10.1007/978-3-540-75454-1_8.
BibTex | DOI | Web page | PS | PDF ]
[BM07b]
P. Bouyer and N. Markey. Costs are Expensive! In Proceedings of the 5th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763 of Lecture Notes in Computer Science, pages 53--68, Salzburg, Austria, October 2007. Springer.
doi: 10.1007/978-3-540-75454-1_6.
BibTex | DOI | Web page | PS | PDF ]
[Laf07d]
P. Lafourcade. Rapport final d'activité à 11 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, October 2007. 6 pages.
BibTex | Web page | PS ]
[BGP07]
B. Bérard, P. Gastin, and A. Petit. Timed substitutions for regular signal-event languages. Formal Methods in System Design, 31(2):101--134, October 2007.
doi: 10.1007/s10703-007-0034-5.
BibTex | DOI | Web page | PDF ]
[BBBR07]
P. Bouyer, Th. Brihaye, V. Bruyère, and J.-F. Raskin. On the optimal reachability problem on weighted timed automata. Formal Methods in System Design, 31(2):135--175, October 2007.
doi: 10.1007/s10703-007-0035-4.
BibTex | DOI | Web page | PS | PDF ]
[Pro07]
A. ProNoBis. ProNoBis: Probability and Nondeterminism, Bisimulations and Security -- Rapport Final, October 2007.
BibTex | Web page | PDF ]
[GL07]
J. Goubault-Larrecq. Pronobis: Probability and nondeterminism, bisimulations and security. Rapport final ARC ProNoBis, October 2007.
BibTex ]
[Cha07]
P. Chambart. Canaux fiables et non-fiables : frontières de la décidabilité. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[Da 07]
A. Da Costa. Propriétés de jeux multi-agents. Rapport de Master, Master de Logique Mathématique et Fondements de l'Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[Vil07]
J. Villard. Logique spatiale pour le pi-calcul appliqué. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[Vac07]
C. Vacher. Accessibilité inverse dans les automates d'arbres à mémoire d'ordre supérieur. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007.
BibTex | Web page | PDF ]
[CL07]
C. Cremers and P. Lafourcade. Comparing State Spaces in Automatic Security Protocol Verification. In Pre-proceedings of the 7th International Workshop on Automated Verification of Critical Systems (AVoCS'07), Oxford, UK, September 2007.
BibTex | Web page | PDF ]
[AMNK07]
S. Akshay, M. Mukund, and K. Narayan Kumar. Checking Coverage for Infinite Collections of Timed Scenarios. In Proceedings of the 18th International Conference on Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in Computer Science, pages 181--196, Lisbon, Portugal, September 2007. Springer.
doi: 10.1007/978-3-540-74407-8_13.
BibTex | DOI | Web page | PDF ]
[ACD07]
M. Arnaud, V. Cortier, and S. Delaune. Combining algorithms for deciding knowledge in security protocols. In Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), volume 4720 of Lecture Notes in Artificial Intelligence, pages 103--117, Liverpool, UK, September 2007. Springer.
doi: 10.1007/978-3-540-74621-8_7.
BibTex | DOI | Web page | PS | PDF ]
[KM07]
S. Kremer and L. Mazaré. Adaptive Soundness of Static Equivalence. In Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS'07), volume 4734 of Lecture Notes in Computer Science, pages 610--625, Dresden, Germany, September 2007. Springer.
doi: 10.1007/978-3-540-74835-9_40.
BibTex | DOI | Web page | PDF ]
[BLMO07]
Th. Brihaye, F. Laroussinie, N. Markey, and G. Oreiby. Timed Concurrent Game Structures. In Proceedings of the 18th International Conference on Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in Computer Science, pages 445--459, Lisbon, Portugal, September 2007. Springer.
doi: 10.1007/978-3-540-74407-8_30.
BibTex | DOI | Web page | PS | PDF ]
[Gou07c]
J. Goubault-Larrecq. Continuous Previsions. In Proceedings of the 16th Annual EACSL Conference on Computer Science Logic (CSL'07), volume 4646 of Lecture Notes in Computer Science, pages 542--557, Lausanne, Switzerland, September 2007. Springer.
doi: 10.1007/978-3-540-74915-8_40.
BibTex | DOI | Web page | PDF ]
[OBRS07]
A. Ourghanlian, M. Bozga, A. Roglewicz, and A. Sangnier. Projet RNTL Averiles -- Fourniture F1.6 : Expérimentation, September 2007. 16 pages.
BibTex | Web page | PDF ]
[LLV07]
LIAFA, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.4 : Prototypes d'outil, September 2007. 3 pages.
BibTex | Web page | PDF ]
[LCE+07c]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.3 : Algorithmes de vérification, September 2007. 19 pages.
BibTex | Web page | PDF ]
[LCE+07b]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.2 : Extraction de modèles, September 2007. 19 pages.
BibTex | Web page | PDF ]
[LCE+07a]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.1 : Modèles, September 2007. 6 pages.
BibTex | Web page | PDF ]
[LCE+07d]
LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Rapport à mi-parcours du projet RNTL Averiles (analyse et vérification de logiciels embarqués avec structures de mémoire dynamique, September 2007. 4 pages.
BibTex | Web page | PDF ]
[BHJS07]
A. Bouajjani, P. Habermehl, Y. Jurski, and M. Sighireanu. Rewriting Systems with Data -- A Framework for Reasoning About Systems with Unbounded Structures over Infinite Data Domains. In Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture Notes in Computer Science, pages 1--22, Budapest, Hungary, August 2007. Springer.
doi: 10.1007/978-3-540-74240-1_1.
BibTex | DOI | Web page | PS | PDF ]
[BGMNK07]
P. Bhateja, P. Gastin, M. Mukund, and K. Narayan Kumar. Local testing of message sequence charts is difficult. In Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture Notes in Computer Science, pages 76--87, Budapest, Hungary, August 2007. Springer.
doi: 10.1007/978-3-540-74240-1_8.
BibTex | DOI | Web page | PDF ]
[L+07]
F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 6 mois, August 2007. 7 pages.
BibTex ]
[GO07]
P. Gastin and D. Oddoux. LTL2BA v1.1, August 2007. Written in C++ (about 4000 lines).
BibTex | Web page ]
[Laf07a]
P. Lafourcade. Intruder Deduction for the Equational Theory of phExclusive-or with Commutative and Distributive Encryption. In Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), volume 171 of Electronic Notes in Theoretical Computer Science, pages 37--57, Venice, Italy, July 2007. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2007.02.054.
BibTex | DOI | Web page | PS | PDF ]
[BJ07b]
A. Bouhoula and F. Jacquemard. Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction. In Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07), pages 27--44, Wroclaw, Poland, July 2007.
BibTex | Web page | PDF ]
[BE07]
C. Braunstein and E. Encrenaz. Using CTL formulae as component abstraction in a design and verification flow. In Proceedings of the 7th International Conference on Application of Concurrency to System Design (ACSD'07), pages 80--89, Bratislava, Slovak Republik, July 2007. IEEE Computer Society Press.
doi: 10.1109/ACSD.2007.76.
BibTex | DOI | Web page | PDF ]
[NT07]
M. Nesi and R. Treinen, editors. Preliminary Proceedings of the 2nd International Workshop on Security and Rewriting Techniques (SecReT'07), Paris, France, July 2007.
BibTex ]
[GM07]
P. Gastin and P. Moro. Minimal counter-example generation for SPIN. In Proceedings of the 14th International SPIN Workshop on Model Checking Software (SPIN'07), volume 4595 of Lecture Notes in Computer Science, pages 24--38, Berlin, Germany, July 2007. Springer.
doi: 10.1007/978-3-540-73370-6_4.
BibTex | DOI | Web page | PS | PDF ]
[Gou07b]
J. Goubault-Larrecq. Continuous Capacities on Continuous State Spaces. In Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07), volume 4596 of Lecture Notes in Computer Science, pages 764--776, Wroclaw, Poland, July 2007. Springer.
doi: 10.1007/978-3-540-73420-8_66.
BibTex | DOI | Web page | PDF ]
[BHPR07]
Th. Brihaye, Th. A. Henzinger, V. Prabhu, and J.-F. Raskin. Minimum-Time Reachability in Timed Games. In Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07), volume 4596 of Lecture Notes in Computer Science, pages 825--837, Wroclaw, Poland, July 2007. Springer.
doi: 10.1007/978-3-540-73420-8_71.
BibTex | DOI | Web page | PS | PDF ]
[CDS07]
V. Cortier, S. Delaune, and G. Steel. A Formal Theory of Key Conjuring. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07), pages 79--93, Venice, Italy, July 2007. IEEE Computer Society Press.
doi: 10.1109/CSF.2007.5.
BibTex | DOI | Web page | PS | PDF ]
[Gou07d]
J. Goubault-Larrecq. On Noetherian Spaces. In Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), pages 453--462, Wroclaw, Poland, July 2007. IEEE Computer Society Press.
doi: 10.1109/LICS.2007.34.
BibTex | DOI | Web page | PDF ]
[BMOW07]
P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. The Cost of Punctuality. In Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), pages 109--118, Wroclaw, Poland, July 2007. IEEE Computer Society Press.
doi: 10.1109/LICS.2007.49.
BibTex | DOI | Web page | PS | PDF ]
[SC07]
G. Steel and J. Courant. A formal model for detecting parallel key search attacks. In Proceedings of the 3rd Workshop on Formal and Computational Cryptography (FCC'07), Venice, Italy, July 2007.
BibTex | Web page | PDF ]
[Sch07]
Ph. Schnoebelen. Model Checking Branching-Time Logics. In Proceedings of the 14th International Symposium on Temporal Representation and Reasoning (TIME'07), page 5, Alicante, Spain, June 2007. IEEE Computer Society Press.
doi: 10.1109/TIME.2007.52.
BibTex | DOI | Web page | PS | PDF ]
[BCD07b]
S. Bursuc, H. Comon-Lundh, and S. Delaune. Deducibility Constraints, Equational Theory and Electronic Money. In Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of Lecture Notes in Computer Science, pages 196--212, Cachan, France, June 2007. Springer.
doi: 10.1007/978-3-540-73147-4_10.
BibTex | DOI | Web page | PS ]
[CKK07]
H. Comon-Lundh, C. Kirchner, and H. Kirchner, editors. Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of Lecture Notes in Computer Science, Cachan, France, June 2007. Springer.
doi: 10.1007/978-3-540-73147-4.
BibTex | DOI | Web page ]
[Che07]
F. Chevalier. Logiques pour les systèmes temporisés : contrôle et expressivité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2007.
BibTex | Web page | PS | PDF ]
[Rey07b]
P.-A. Reynier. Vérification de systèmes temporisés et distribués : modèles, algorithmes et implémentabilité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2007.
BibTex | Web page | PS | PDF ]
[Dem07]
S. Demri. Logiques pour la spécification et vérification. Mémoire d'habilitation, Université Paris 7, Paris, France, June 2007.
BibTex | Web page | PDF ]
[Enc07]
E. Encrenaz-Tiphène. Contributions pour la conception et la vérification de systèmes matériels embarqués. Mémoire d'habilitation, Université Paris 6, Paris, France, June 2007.
BibTex | Web page | PDF ]
[Boz07]
L. Bozzelli. Complexity results on branching-time pushdown model checking. Theoretical Computer Science, 379(1-2):286--297, June 2007.
doi: 10.1016/j.tcs.2007.03.049.
BibTex | DOI | Web page | PDF ]
[DG07a]
S. Demri and R. Gascon. The Effects of Bounding Syntactic Resources on Presburger LTL (Extended Abstract). In Proceedings of the 14th International Symposium on Temporal Representation and Reasoning (TIME'07), pages 94--104, Alicante, Spain, June 2007. IEEE Computer Society Press.
doi: 10.1109/TIME.2007.63.
BibTex | DOI | Web page | PDF ]
[BDL07b]
R. Brochenin, S. Demri, and É. Lozes. Reasoning about sequences of memory states. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 100--114, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_8.
BibTex | DOI | Web page | PDF ]
[LS07]
F. Laroussinie and J. Sproston. State Explosion in Almost-Sure Probabilistic Reachability. Information Processing Letters, 102(6):236--241, June 2007.
doi: 10.1016/j.ipl.2007.01.003.
BibTex | DOI | Web page | PDF ]
[BM07a]
B. Bollig and I. Meinecke. Weighted Distributed Systems and Their Logics. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 54--68, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_5.
BibTex | DOI | Web page | PS | PDF ]
[DDG07]
S. Demri, D. D'Souza, and R. Gascon. Decidable Temporal Logic with Repeating Values. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 180--194, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_13.
BibTex | DOI | Web page | PDF ]
[BBC07]
P. Bouyer, Th. Brihaye, and F. Chevalier. Weighted O-Minimal Hybrid Systems are more Decidable than Weighted Timed Automata! In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 69--83, New York, New York, USA, June 2007. Springer.
doi: 10.1007/978-3-540-72734-7_6.
BibTex | DOI | Web page | PS | PDF ]
[VG07]
K. N. Verma and J. Goubault-Larrecq. Alternating Two-Way AC-Tree Automata. Information and Computation, 205(6):817--869, June 2007.
doi: 10.1016/j.ic.2006.12.006.
BibTex | DOI | Web page | PS | PDF ]
[DG07b]
M. Droste and P. Gastin. Weighted automata and weighted logics. Theoretical Computer Science, 380(1-2):69--86, June 2007.
doi: 10.1016/j.tcs.2007.02.055.
BibTex | DOI | Web page | PS | PDF ]
[DK07]
S. Delaune and F. Klay. Synthèse des expérimentations. Technical Report 10, projet RNTL PROUVÉ, May 2007. 10 pages.
BibTex | Web page | PDF ]
[CDFP07]
N. Chamseddine, M. Duflot, L. Fribourg, and C. Picaronny. Determinate Probabilistic Timed Automata as Markov Chains with Parametric Costs. Research Report LSV-07-21, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2007. 17 pages.
BibTex | Web page | PDF ]
[Bre07]
R. Bresciani. The ZRTP Protocol --- Security Considerations. Research Report LSV-07-20, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2007. 23 pages.
BibTex | Web page | PS | PDF ]
[Gas07c]
P. Gastin. Langages formels. Course notes, Magistère STIC, ENS Cachan, France, May 2007.
BibTex ]
[Laf07c]
P. Lafourcade. Rapport d'activités à 6 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, April 2007. 5 pages.
BibTex | Web page | PS ]
[LLT07]
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for the Equational Theory of Abelian Groups with Distributive Encryption. Information and Computation, 205(4):581--623, April 2007.
doi: 10.1016/j.ic.2006.10.008.
BibTex | DOI | Web page | PS | PDF ]
[BDL07a]
R. Brochenin, S. Demri, and É. Lozes. Reasoning about Sequences of Memory States. In Proceedings of the 1st Workshop on Heap Analysis and Verification (HAV'07), Braga, Portugal, March 2007.
BibTex | Web page | PDF ]
[Maz07]
L. Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. In Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS'07), pages 6--21, Braga, Portugal, March 2007.
BibTex | Web page | PDF ]
[BK07]
B. Bollig and D. Kuske. Muller Message-Passing Automata and Logics. In Preliminary Proceedings of the 1st International Conference on Language and Automata Theory and Applications (LATA'07), Tarragona, Spain, March-April 2007.
BibTex | Web page | PS | PDF ]
[JLS07]
M. Jurdziński, F. Laroussinie, and J. Sproston. Model Checking Probabilistic Timed Automata with One or Two Clocks. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 170--184, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71209-1_15.
BibTex | DOI | Web page | PDF ]
[DDSS07]
D. D'Aprile, S. Donatelli, A. Sangnier, and J. Sproston. From Time Petri Nets to Timed Automata: An Untimed Approach. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 216--230, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71209-1_18.
BibTex | DOI | Web page | PS | PDF ]
[BKKL07]
B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Replaying Play in and Play out: Synthesis of Design Models from Scenarios by Learning. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 435--450, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71209-1_33.
BibTex | DOI | Web page | PS | PDF ]
[CJP07]
H. Comon-Lundh, F. Jacquemard, and N. Perrin. Tree Automata with Memory, Visibility and Structural Constraints. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 168--182, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71389-0_13.
BibTex | DOI | Web page | PDF ]
[LMO07]
F. Laroussinie, N. Markey, and G. Oreiby. On the Expressiveness and Complexity of ATL. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 243--257, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71389-0_18.
BibTex | DOI | Web page | PS | PDF ]
[BLM07]
P. Bouyer, K. G. Larsen, and N. Markey. Model-Checking One-Clock Priced Timed Automata. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 108--122, Braga, Portugal, March 2007. Springer.
doi: 10.1007/978-3-540-71389-0_9.
BibTex | DOI | Web page | PS | PDF ]
[DD07]
S. Demri and D. D'Souza. An automata-theoretic approach to constraint LTL. Information and Computation, 205(3):380--415, March 2007.
doi: 10.1016/j.ic.2006.09.006.
BibTex | DOI | Web page | PDF ]
[BJ07a]
A. Bouhoula and F. Jacquemard. Tree Automata, Implicit Induction and Explicit Destructors for Security Protocol Verification. Research Report LSV-07-10, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2007. 21 pages.
BibTex | Web page | PDF ]
[KL07]
B. Ksieżopolski and P. Lafourcade. Attack and Revison of an Electronic Auction Protocol using OFMC. Technical Report 549, Department of Computer Science, ETH Zurich, Switzerland, February 2007. 13 pages.
BibTex | Web page | PDF ]
[DN07]
S. Demri and D. Nowak. Reasoning about transfinite sequences. International Journal of Foundations of Computer Science, 18(1):87--112, February 2007.
doi: 10.1142/S0129054107004589.
BibTex | DOI | Web page | PS | PDF ]
[BCD07a]
S. Bursuc, H. Comon-Lundh, and S. Delaune. Associative-Commutative Deducibility Constraints. In Proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science (STACS'07), volume 4393 of Lecture Notes in Computer Science, pages 634--645, Aachen, Germany, February 2007. Springer.
doi: 10.1007/978-3-540-70918-3_54.
BibTex | DOI | Web page | PS | PDF ]
[Laf07b]
P. Lafourcade. Rapport d'activités à 3 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, January 2007. 3 pages.
BibTex | Web page | PS ]
[Gou07a]
J. Goubault-Larrecq. Believe It Or Not, GOI is a Model of Classical Linear Logic. Research Report LSV-07-03, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. 18 pages.
BibTex | Web page | PDF ]
[DO07]
S. Demri and E. Orlowska. Relative Nondeterministic Information Logic is EXPTIME-complete. Fundamenta Informaticae, 75(1-4):163--178, 2007.
BibTex | Web page | PDF ]
[Rey07a]
P.-A. Reynier. Diagonal constraints handled efficiently in UPPAAL. Research Report LSV-07-02, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. 4 pages.
BibTex | Web page | PS | PDF ]
[Bau07]
M. Baudet. Sécurité des protocoles cryptographiques : aspects logiques et calculatoires. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007.
BibTex | Web page | PS | PDF ]
[DLN07]
S. Demri, R. Lazić, and D. Nowak. On the freeze quantifier in constraint LTL: Decidability and complexity. Information and Computation, 205(1):2--24, January 2007.
doi: 10.1016/j.ic.2006.08.003.
BibTex | DOI | Web page | PDF ]
[Com07]
H. Comon-Lundh. Soundness of abstract cryptography, 2007. Course notes (part 1), Symposium on Cryptography and Information Security (SCIS2008), Tokai, Japan.
BibTex | Web page | PDF ]
[Gou06]
J. Goubault-Larrecq. Preuve et vérification pour la sécurité et la sûreté. In Encyclopédie de l'informatique et des systèmes d'information, chapter I.6, pages 683--703. Vuibert, December 2006.
BibTex | Web page ]
[BKŘS06]
L. Bozzelli, M. Křetínský, V. Řehák, and J. Strejček. On Decidability of LTL Model Checking for Process Rewrite Systems. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 248--259, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_24.
BibTex | DOI | Web page | PDF ]
[BLMR06]
P. Bouyer, K. G. Larsen, N. Markey, and J. I. Rasmussen. Almost Optimal Strategies in One-Clock Priced Timed Automata. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 345--356, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_32.
BibTex | DOI | Web page | PS | PDF ]
[Che06]
F. Chevalier. Decision procedures for timed logics. Invited talk, Advances and Issues in Timed Systems, Kolkata, India, December 2006.
BibTex ]
[Gas06c]
P. Gastin. Refinements and Abstractions of Signal-Event (Timed) Languages. Invited talk, Advances and Issues in Timed Systems, Kolkata, India, December 2006.
BibTex ]
[GSZ06]
P. Gastin, N. Sznajder, and M. Zeitoun. Distributed synthesis for well-connected architectures. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 321--332, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_30.
BibTex | DOI | Web page | PDF ]
[CDP06]
F. Chevalier, D. D'Souza, and P. Prabhakar. On continuous timed automata with input-determined guards. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 369--380, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_34.
BibTex | DOI | Web page | PS | PDF ]
[CKKW06]
V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 176--187, Kolkata, India, December 2006. Springer.
doi: 10.1007/11944836_18.
BibTex | DOI | Web page | PS | PDF ]
[Del06b]
S. Delaune. An Undecidability Result for AGh. Theoretical Computer Science, 368(1-2):161--167, December 2006.
doi: 10.1016/j.tcs.2006.08.018.
BibTex | DOI | Web page | PS | PDF ]
[BBS06b]
C. Baier, N. Bertrand, and Ph. Schnoebelen. On Computing Fixpoints in Well-Structured Regular Model Checking, with Applications to Lossy Channel Systems. In Proceedings of the 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 347--361, Phnom Penh, Cambodia, November 2006. Springer.
doi: 10.1007/11916277_24.
BibTex | DOI | Web page | PS | PDF ]
[BG06]
L. Bozzelli and R. Gascon. Branching Time Temporal Logic Extended with Presburger Constraints. In Proceedings of the 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 197--211, Phnom Penh, Cambodia, November 2006. Springer.
doi: 10.1007/11916277_14.
BibTex | DOI | Web page | PS | PDF ]
[TED06]
S. Taktak, E. Encrenaz, and J.-L. Desbarbieux. A Tool for Automatic Detection of Deadlock in Wormhole Networks on Chip. In Proceedings of the IEEE High Level Design Verification and Test Workshop (HLDVT'06), pages 203--210, Monterey, California, USA, November 2006. IEEE Computer Society Press.
doi: 10.1109/HLDVT.2006.319992.
BibTex | DOI | Web page | PDF ]
[DG06b]
V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. Information and Computation, 204(11):1597--1619, November 2006.
doi: 10.1016/j.ic.2006.07.002.
BibTex | DOI | Web page | PDF ]
[Sch06]
Ph. Schnoebelen. De nouvelles applications pour le model-checking. Invited lecture, Journées à l'occasion des 20 ans du LIPN, Villetaneuse, France, November 2006.
BibTex ]
[KBL+06]
F. Klay, L. Bozga, Y. Lakhnech, L. Mazaré, S. Delaune, and S. Kremer. Retour d'expérience sur la validation du vote électronique. Technical Report 9, projet RNTL PROUVÉ, November 2006. 47 pages.
BibTex | Web page | PDF ]
[B+06]
P. Bouyer et al. ACI Sécurité Informatique CORTOS --- Rapport final, November 2006. 17 pages.
BibTex | Web page | PDF ]
[SBS06]
Ph. Schnoebelen, A. Bouajjani, and G. Sutre. ACI Sécurité Informatique PERSÉE --- Rapport final, November 2006. 12 pages.
BibTex | Web page | PDF ]
[Gas06b]
P. Gastin. GasTEX: Graphs and Automata Simplified in TEX (v2.8), November 2006. Written in TEX(about 2000 lines).
BibTex | Web page ]
[BBBL06]
H. Bel mokadem, B. Bérard, P. Bouyer, and F. Laroussinie. Timed temporal logics for abstracting transient states. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 337--351, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_26.
BibTex | DOI | Web page | PDF ]
[BHR06c]
P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Unfoldings for Networks of Timed Automata. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 292--306, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_23.
BibTex | DOI | Web page | PS | PDF ]
[DFGvD06]
S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen. Towards a model-checker for counter systems. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 493--507, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_36.
BibTex | DOI | Web page | PDF ]
[BGM06]
P. Bhateja, P. Gastin, and M. Mukund. A fresh look at testing for asynchronous communication. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 369--383, Beijing, China, October 2006. Springer.
doi: 10.1007/11901914_28.
BibTex | DOI | Web page | PS | PDF ]
[Mar06]
N. Markey. Verification of Multi-Agent Systems with ATL. Invited talk, FNRS meeting on "Synthesis and Verification", October 2006.
BibTex ]
[Ber06b]
N. Bertrand. Modèles stochastiques pour les pertes de messages dans les protocoles asynchrones et techniques de vérification automatique. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2006.
BibTex | Web page | PS | PDF ]
[G+06]
P. Gastin et al. ACI Sécurité Informatique VERSYDIS --- Rapport final, October 2006. 10 pages.
BibTex | Web page | PDF ]
[BBS06c]
C. Baier, N. Bertrand, and Ph. Schnoebelen. Symbolic verification of communicating systems with probabilistic message losses: liveness and fairness. In Proceedings of 26th IFIP WG6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE'06), volume 4229 of Lecture Notes in Computer Science, pages 212--227, Paris, France, September 2006. Springer.
doi: 10.1007/11888116_17.
BibTex | DOI | Web page | PS | PDF ]
[MBDC+06]
F. Mancinelli, J. Boender, R. Di Cosmo, J. Vouillon, B. Durak, X. Leroy, and R. Treinen. Managing the Complexity of Large Free and Open Source Package-Based Software Distributions. In Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pages 199--208, Tokyo, Japan, September 2006. IEEE Computer Society Press.
doi: 10.1109/ASE.2006.49.
BibTex | DOI | Web page | PDF ]
[AB06]
E. Asarin and P. Bouyer, editors. Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, Paris, France, September 2006. Springer.
doi: 10.1007/11867340.
BibTex | DOI | Web page ]
[BGP06b]
B. Bérard, P. Gastin, and A. Petit. Refinements and abstractions of signal-event (timed) languages. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 67--81, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_6.
BibTex | DOI | Web page | PS | PDF ]
[BGP06a]
B. Bérard, P. Gastin, and A. Petit. Intersection of regular signal-event (timed) languages. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 52--66, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_5.
BibTex | DOI | Web page | PS | PDF ]
[CEFX06b]
R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 113--127, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_9.
BibTex | DOI | Web page | PS | PDF ]
[LMO06]
F. Laroussinie, N. Markey, and G. Oreiby. Model Checking Timed ATL for Durational Concurrent Game Structures. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 245--259, Paris, France, September 2006. Springer.
doi: 10.1007/11867340_18.
BibTex | DOI | Web page | PS | PDF ]
[MOJ06]
I. Mitsuhashi, M. Oyamaguchi, and F. Jacquemard. The Confluence Problem for Flat TRSs. In Proceedings of the 8th International Conference on Artificial Intelligence and Symbolic Computation (AISC'06), volume 4120 of Lecture Notes in Artificial Intelligence, pages 68--81, Beijing, China, September 2006. Springer.
doi: 10.1007/11856290_8.
BibTex | DOI | Web page | PDF ]
[Laf06]
P. Lafourcade. Vérification des protocoles cryptographiques en présence de théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006. 209 pages.
BibTex | Web page | PS | PDF ]
[Bel06]
H. Bel mokadem. Vérification des propriétés temporisées des automates programmables industriels. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006.
BibTex | Web page | PDF ]
[Nav06]
G. Naves. Accessibilité dans les automates temporisés à deux horloges. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2006.
BibTex | Web page | PS | PDF ]
[Aks06]
S. Akshay. Formal Specification and Verification of Timed Communicating Systems. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2006.
BibTex | Web page | PDF ]
[Bur06]
S. Bursuc. Contraintes de déductibilité modulo Associativité-Commutativité. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2006.
BibTex | Web page | PDF ]
[BP06]
M. Baclet and C. Pagetti. Around Hopcroft's Algorithm. In Proceedings of the 11th International Conference on Implementation and Application of Automata (CIAA'06), volume 4094 of Lecture Notes in Computer Science, pages 114--125, Taipei, Taiwan, August 2006. Springer-Verlag.
doi: 10.1007/11812128_12.
BibTex | DOI | Web page | PDF ]
[BM06]
P. Bouyer and P. Madhusudan, editors. Proceedings of the 3rd Workshop on Games in Design and Verification (GDV'06), Seattle, Washington, USA, August 2006.
BibTex ]
[BBC06a]
P. Bouyer, L. Bozzelli, and F. Chevalier. Controller Synthesis for MTL Specifications. In Proceedings of the 17th International Conference on Concurrency Theory (CONCUR'06), volume 4137 of Lecture Notes in Computer Science, pages 450--464, Bonn, Germany, August 2006. Springer.
doi: 10.1007/11817949_30.
BibTex | DOI | Web page | PS | PDF ]
[BBC06b]
P. Bouyer, Th. Brihaye, and F. Chevalier. Control in o-Minimal Hybrid Systems. In Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science (LICS'06), pages 367--378, Seattle, Washington, USA, August 2006. IEEE Computer Society Press.
doi: 10.1109/LICS.2006.22.
BibTex | DOI | Web page | PS | PDF ]
[BLP06]
S. Bardin, J. Leroux, and G. Point. FAST Extended Release. In Proceedings of the 18th International Conference on Computer Aided Verification (CAV'06), volume 4144 of Lecture Notes in Computer Science, pages 63--66, Seattle, Washington, USA, August 2006. Springer.
doi: 10.1007/11817963_9.
BibTex | DOI | Web page | PS | PDF ]
[DL06a]
S. Demri and R. Lazić. LTL with the freeze quantifier and register automata. In Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science (LICS'06), pages 17--26, Seattle, Washington, USA, August 2006. IEEE Computer Society Press.
doi: 10.1109/LICS.2006.31.
BibTex | DOI | Web page | PDF ]
[DL06b]
S. Demri and D. Lugiez. Presburger Modal Logic is Only PSPACE-complete. In Proceedings of the 3rd International Joint Conference on Automated Reasoning (IJCAR'06), volume 4130 of Lecture Notes in Artificial Intelligence, pages 541--556, Seattle, Washington, USA, August 2006. Springer-Verlag.
doi: 10.1007/11814771_44.
BibTex | DOI | Web page ]
[Dem06b]
S. Demri. LTL over integer periodicity constraints. Theoretical Computer Science, 360(1-3):96--123, August 2006.
doi: 10.1016/j.tcs.2006.02.019.
BibTex | DOI | Web page | PDF ]
[JRV06]
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Tree automata with equality constraints modulo equational theories. In Proceedings of the 3rd International Joint Conference on Automated Reasoning (IJCAR'06), volume 4130 of Lecture Notes in Artificial Intelligence, pages 557--571, Seattle, Washington, USA, August 2006. Springer-Verlag.
doi: 10.1007/11814771_45.
BibTex | DOI | Web page ]
[KS06]
A. Kučera and Ph. Schnoebelen. A General Approach to Comparing Infinite-State Systems with Their Finite-State Specifications. Theoretical Computer Science, 358(2-3):315--333, August 2006.
doi: 10.1016/j.tcs.2006.01.021.
BibTex | DOI | Web page | PS | PDF ]
[LLT06]
P. Lafourcade, D. Lugiez, and R. Treinen. ACUNh: Unification and Disunification Using Automata Theory. In Proceedings of the 20th International Workshop on Unification (UNIF'06), pages 6--20, Seattle, Washington, USA, August 2006.
BibTex | Web page | PS | PDF ]
[BJ06a]
A. Bouhoula and F. Jacquemard. Automating Sufficient Completeness Check for Conditional and Constrained TRS. In Proceedings of the 20th International Workshop on Unification (UNIF'06), Seattle, Washington, USA, August 2006.
BibTex | Web page | PDF ]
[MR06]
N. Markey and J.-F. Raskin. Model Checking Restricted Sets of Timed Paths. Theoretical Computer Science, 358(2-3):273--292, August 2006.
doi: 10.1016/j.tcs.2006.01.019.
BibTex | DOI | Web page | PS | PDF ]
[BJ06b]
A. Bouhoula and F. Jacquemard. Security Protocols Verification with Implicit Induction and Explicit Destructors. In Preliminary Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), pages 37--44, Venice, Italy, July 2006.
BibTex | Web page | PDF ]
[BHR06b]
P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) --- Part II, volume 4052 of Lecture Notes in Computer Science, pages 420--431, Venice, Italy, July 2006. Springer.
doi: 10.1007/11787006_36.
BibTex | DOI | Web page | PS | PDF ]
[BS06]
N. Bertrand and Ph. Schnoebelen. A short visit to the STS hierarchy. In Proceedings of the 12th International Workshop on Expressiveness in Concurrency (EXPRESS'05), volume 154 of Electronic Notes in Theoretical Computer Science, pages 59--69, San Francisco, California, USA, July 2006. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2006.05.007.
BibTex | DOI | Web page |