@phdthesis{GL:hab, author = {Goubault{-}Larrecq, Jean}, title = {Logique, complexit{\'e}, d{\'e}monstration automatique et th{\`e}mes connexes}, type = {M{\'e}moire d'habilitation}, year = {1997}, month = sep, school = {Universit{\'e} Paris~9 (Dauphine), Paris, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Gou-habil97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-habil97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Gou-habil97.pdf}, lsv-lang = {FR} }

@book{GLM:proof, author = {Goubault{-}Larrecq, Jean and Mackie, Ian}, title = {Proof Theory and Automated Deduction}, volume = {6}, series = {Applied Logic Series}, year = {1997}, publisher = {Kluwer Academic Publishers}, month = may, isbn = {0-7923-4593-2} }

@techreport{JGL:S4:IIIb, author = {Goubault{-}Larrecq, Jean}, title = {On Computational Interpretations of the Modal Logic {S4}~--- {IIIb}.~{C}onfluence, Termination of the {{\(\lambda\)}}{\(\mathtt{ev}{Q}_{H}\)}-Calculus}, type = {Research Report}, number = {RR-3164}, year = {1997}, month = may, institution = {INRIA Rocquencourt, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RR-3164.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-3164.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RR-3164.pdf} }

@inproceedings{JGL:ramified:HOU, address = {Warsaw, Poland}, month = jul, year = 1997, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'97}, booktitle = {{P}roceedings of the 12th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'97)}, author = {Goubault{-}Larrecq, Jean}, title = {Ramified Higher-Order Unification}, pages = {410-421}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Gou-lics97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-lics97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Gou-lics97.pdf} }

@inproceedings{SGL:PLTL1, address = {Enschede, The Netherlands}, month = apr, year = 1997, volume = 1217, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Brinksma, Ed}, acronym = {{TACAS}'97}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'97)}, author = {Schmitt, Peter H. and Goubault{-}Larrecq, Jean}, title = {A Tableau System for Linear-{TIME} Temporal Logic}, pages = {130-144}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SchGou-tacas97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/SchGou-tacas97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SchGou-tacas97.pdf} }

@techreport{JGL:SKInT:conj:long, author = {Goubault{-}Larrecq, Jean}, title = {A~Few Remarks on {SKI}n{T}}, type = {Research Report}, number = {RR-3475}, year = {1998}, month = aug, institution = {INRIA Rocquencourt, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-3475.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-3475.ps} }

@inproceedings{JGL:lamsigma:wterm, address = {Aussois, France}, year = 1998, volume = 1512, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gim{\'e}nez, Eduardo and Paulin{-}Mohring, {\relax Ch}ristine}, acronym = {{TYPES}'96}, booktitle = {{S}elected {P}apers from the {I}nternational {W}orkshop on {T}ypes for {P}roofs and {P}rograms ({TYPES}'96)}, author = {Goubault{-}Larrecq, Jean}, title = {A Proof of Weak Termination of Typed {{\(\lambda-\sigma\)}}-Calculi}, pages = {134-151}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-types96.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-types96.ps} }

@inproceedings{GGL:S4:models, address = {Trento, Italy}, month = jul, year = 1999, editor = {Fairtlough, Matt and Mendler, Michael}, acronym = {{IMLA}'99}, booktitle = {{P}roceedings of the 1st {W}orkshop on {I}ntuitionistic {M}odal {L}ogics and {A}pplications ({IMLA}'99)}, author = {Goubault{-}Larrecq, Jean and Goubault, {\'E}ric}, title = {Order-Theoretic, Geometric and Combinatorial Models of Intuitionistic {S4} Proofs}, missingpages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GouGou-imla99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GouGou-imla99.ps} }

@inproceedings{JGL:SKInT:conj, address = {Kloster Irsee, Germany}, year = 1999, volume = 1657, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Altenkirch, {\relax Th}orsten and Naraschewski, Wolfgang and Reus, Bernhard}, acronym = {{TYPES}'98}, booktitle = {{S}elected {P}apers from the {I}nternational {W}orkshop on {T}ypes for {P}roofs and {P}rograms ({TYPES}'98)}, author = {Goubault{-}Larrecq, Jean}, title = {Conjunctive Types and {SKI}n{T}}, pages = {106-120}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-types98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-types98.ps} }

@inproceedings{JGL:freecons, address = {Saratoga Springs, New York, USA}, month = jun, year = 1999, volume = 1617, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Murray, Neil V.}, acronym = {{TABLEAUX}'99}, booktitle = {{P}roceedings of the 8th {I}nternational {W}orkshop on {T}heorem {P}roving with {A}nalytic {T}ableaux and {R}elated {M}ethods ({TABLEAUX}'99)}, author = {Goubault{-}Larrecq, Jean}, title = {A Simple Sequent System for First-Order Logic with Free Constructors}, pages = {202-216} }

@techreport{JGL:freecons:ind, author = {Goubault{-}Larrecq, Jean}, title = {A Simple Deduction System for First-Order Logic with Equality, Free Constructors and Induction}, type = {Research Report}, number = {RR-3653}, year = {1999}, month = mar, institution = {INRIA Rocquencourt, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-3653.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-3653.ps} }

@article{GGL:SKIn, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goguen, Healfdene and Goubault{-}Larrecq, Jean}, title = {Sequent Combinators: {A} {H}ilbert System for the Lambda Calculus}, volume = {10}, number = {1}, pages = {1-79}, year = {2000}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GogGou-MSCS2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GogGou-MSCS2000.ps} }

@misc{GL:ASPROM, author = {Goubault{-}Larrecq, Jean}, title = {Analyse de protocoles cryptographiques}, year = {2000}, month = oct, howpublished = {Invited lecture, Journ{\'e}es {ASPROM}, Paris, France}, lsv-lang = {FR} }

@inproceedings{JGL:crypto:orPTA, address = {Cancun, Mexico}, month = may, year = 2000, volume = 1800, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rolim, Jos{\'e} D. P.}, booktitle = {{P}roceedings of the Workshops of the 15th {I}nternational {P}arallel and {D}istributed {P}rocessing {S}ymposium}, author = {Goubault{-}Larrecq, Jean}, title = {A Method for Automatic Cryptographic Protocol Verification (Extended Abstract)}, pages = {977-984}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-fmppta2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-fmppta2000.ps} }

@inproceedings{VGLPAK:BDDinCoq, address = {Penang, Malaysia}, month = nov, year = 2000, volume = 1961, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {He, Jifeng and Sato, Masahito}, acronym = {{ASIAN} 2000}, booktitle = {{P}roceedings of the 6th {A}sian {C}omputing {S}cience {C}onference ({ASIAN} 2000)}, author = {Verma, Kumar N. and Goubault{-}Larrecq, Jean and Prasad, Sanjiva and Arun{-}Kumar, S.}, title = {Reflecting {BDD}s in {C}oq}, pages = {162-181}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VGPA-asian2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VGPA-asian2000.ps} }

@inproceedings{GL:WFRR, address = {Paris, France}, month = sep, year = 2001, volume = 2142, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Fribourg, Laurent}, acronym = {{CSL}'01}, booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'01)}, author = {Goubault{-}Larrecq, Jean}, title = {Well-Founded Recursive Relations}, pages = {484-497}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-csl2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-csl2001.ps} }

@techreport{JGL:eva:propal, author = {Goubault{-}Larrecq, Jean}, title = {Une proposition de langage de description de protocoles cryptographiques}, year = {2001}, month = jul, type = {Contract Report}, number = 2, institution = {projet RNTL~EVA}, note = {12 pages}, missingcomprehension = {Je ne comprends pas pourquoi cette entree est en RC et pas en wwwpublic, alors que d'autres contrats EVA sont en TR et wwwpublic public} }

@techreport{JGL:eva:sem, author = {Goubault{-}Larrecq, Jean}, title = {Les syntaxes et la s{\'e}mantique du langage de sp{\'e}cification~{EVA}}, year = {2001}, month = nov, type = {Contract Report}, number = 3, institution = {projet RNTL~EVA}, note = {32 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR3.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR3.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/EVA-TR4.ps} }

@techreport{LSV:01:9, author = {Goubault{-}Larrecq, Jean}, title = {Higher-Order Automata, Pushdown Systems, and Set Constraints}, type = {Research Report}, number = {LSV-01-9}, year = {2001}, month = nov, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {15 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2001-9.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2001-9.rr.ps} }

@inproceedings{RGL:TAinCoq, address = {Edinburgh, Scotland, UK}, month = sep, year = 2001, volume = 2152, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Boulton, Richard J. and Jackson, Paul B.}, acronym = {{TPHOLs}'01}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {T}heorem {P}roving in {H}igher {O}rder {L}ogics ({TPHOLs}'01)}, author = {Rival, Xavier and Goubault{-}Larrecq, Jean}, title = {Experiments with Finite Tree Automata in {C}oq}, pages = {362-377}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RivGou-tphol01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RivGou-tphol01.ps} }

@inproceedings{RGL:log-art, address = {Cape Breton, Nova Scotia, Canada}, month = jun, year = 2001, publisher = {{IEEE} Computer Society Press}, acronym = {{CSFW}'01}, booktitle = {{P}roceedings of the 14th {IEEE} {C}omputer {S}ecurity {F}oundations {W}orkshop ({CSFW}'01)}, author = {Roger, Muriel and Goubault{-}Larrecq, Jean}, title = {Log Auditing through Model Checking}, pages = {220-236}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RogGou-csfw01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RogGou-csfw01.ps} }

@inproceedings{GLLN-csl2002, address = {Edinburgh, Scotland, UK}, month = sep, year = 2002, volume = 2471, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bradfield, Julian C.}, acronym = {{CSL}'02}, booktitle = {{P}roceedings of the 16th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'02)}, author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir and Nowak, David}, title = {Logical Relations for Monadic Types}, pages = {553-568}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLN-csl2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLN-csl2002.ps} }

@misc{JG:EVA:trans, author = {Goubault{-}Larrecq, Jean}, title = {The {EVA} Parser and Translator}, year = {2002}, missingmonth = {}, missingnmonth = {}, howpublished = {Available at \url{http://www.lsv.ens-cachan.fr/~goubault/EVA.html}}, note = {Started 2001. Written in C (1327 lines), OCaml (361 lines), HimML (see~\cite{JG:HimML:dwnld}) (3454 lines).}, url = {http://www.lsv.ens-cachan.fr/~goubault/EVA.html} }

@inproceedings{JGL-csl2002, address = {Edinburgh, Scotland, UK}, month = sep, year = 2002, volume = 2471, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bradfield, Julian C.}, acronym = {{CSL}'02}, booktitle = {{P}roceedings of the 16th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'02)}, author = {Goubault{-}Larrecq, Jean}, title = {Higher-Order Positive Set Constraints}, pages = {473-489}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-6.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-6.rr.ps} }

@misc{JGL:Csur, author = {Goubault{-}Larrecq, Jean and Parrennes, Fabrice}, title = {{Csur}: {S}tatic Analysis of {C}~Code}, year = {2004}, missingmonth = {}, missingnmonth = {}, nohowpublished = {Available at \url{http://www.lsv.ens-cachan.fr/Software/csur/}}, nmnote = {Written in OCaml (12648 lines)}, url = {http://www.lsv.ens-cachan.fr/Software/csur/}, oldurl = {http://www.lsv.ens-cachan.fr/~goubault/Csur/csur.html} }

@techreport{JGL:EVA:CPV/2, author = {Goubault{-}Larrecq, Jean}, title = {Outils {CPV} et {CPV2}}, year = {2002}, month = may, type = {Contract Report}, number = 8, institution = {Projet RNTL~EVA}, oldhowpublished = {Rapport num{\'e}ro 8 du projet RNTL EVA}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR8.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR8.pdf}, note = {7 pages} }

@article{JGL:JTIT, address = {Warsaw, Poland}, publisher = {Instytut {\L}{\k a}csno{\'s}ci}, journal = {Journal of Telecommunications and Information Technology}, author = {Goubault{-}Larrecq, Jean}, editor = {Goubault{-}Larrecq, Jean}, title = {Special Issue on Models and Methods for Cryptographic Protocol Verification}, volume = {4/2002}, year = {2002}, missingmonth = {}, missingnmonth = {}, url = {http://www.nit.eu/archive?view=kwartalrok&rok=2002&kwartal=4} }

@inproceedings{JGL:SECI:pirates, address = {Tunis, Tunisia}, month = sep, year = 2002, publisher = {INRIA}, editor = {Goubault{-}Larrecq, Jean}, acronym = {{SECI}'02}, booktitle = {{A}ctes du 1er {W}orkshop {I}nternational sur la {S}{\'e}curit{\'e} des {C}ommunications sur {I}nternet ({SECI}'02)}, author = {Goubault{-}Larrecq, Jean}, title = {{V}{\'e}rification de protocoles cryptographiques: la logique {\`a} la rescousse!}, pages = {119-152}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-seci.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-seci.ps} }

@article{JGL:crypto:modeles, address = {Bordeaux, France}, publisher = {Groupe Pr{\'e}ventique}, journal = {Ph{\oe}bus, la revue de la s{\^u}ret{\'e} de fonctionnement}, author = {Goubault{-}Larrecq, Jean}, title = {{S}{\'e}curit{\'e}, mod{\'e}lisation et analyse de protocoles cryptographiques}, missingpages = {??}, volume = {20}, year = {2002}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/DOC/GL-Phoebus2002.doc} }

@techreport{JGL:dico:3.1, author = {Goubault{-}Larrecq, Jean and Pouzol, Jean-{\relax Ph}ilippe and Demri, St{\'e}phane and M{\'e}, Ludovic and Carle, P.}, missingauthor = {}, title = {Langages de d{\'e}tection d'attaques par signatures}, year = {2002}, month = jun, type = {Contract Report}, number = {(Sous-projet~3, livrable~1)}, institution = {Projet RNTL DICO}, oldhowpublished = {Sous-projet 3, livrable 1 du projet RNTL DICO. Version 1}, note = {30 pages} }

@techreport{LSV:02:11, author = {Goubault{-}Larrecq, Jean and Verma, Kumar N.}, title = {Alternating Two-Way {AC}-Tree Automata}, type = {Research Report}, number = {LSV-02-11}, year = {2002}, month = sep, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {21 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-11.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-11.rr.ps} }

@techreport{LSV:02:18, author = {Goubault{-}Larrecq, Jean}, title = {Un algorithme pour l'analyse de logs}, type = {Research Report}, number = {LSV-02-18}, year = {2002}, month = nov, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {33 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-18.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-18.rr.ps} }

@techreport{LSV:02:7, author = {Goubault{-}Larrecq, Jean}, title = {{SKInT} Labels}, type = {Research Report}, number = {LSV-02-7}, year = {2002}, month = jul, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {15 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-7.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-7.rr.ps} }

@techreport{LSV:02:8, author = {Goubault{-}Larrecq, Jean}, title = {A Note on the Completeness of Certain Refinements of Resolution}, type = {Research Report}, number = {LSV-02-8}, year = {2002}, month = jul, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {16 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-8.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-8.rr.ps} }

@article{JGL:S4:geometry, lsv-note = {Published in partnership with International Press}, publisher = {HHA Publications}, journal = {Homology, Homotopy and Applications}, author = {Goubault{-}Larrecq, Jean and Goubault, {\'E}ric}, title = {On the Geometry of Intuitionistic {S4} Proofs}, volume = {5}, number = {2}, pages = {137-209}, year = {2003}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/S4G.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/S4G.ps} }

@techreport{JGL:dico:3.3, author = {Demri, St{\'e}phane and Ducass{\'e}, Mireille and Goubault{-}Larrecq, Jean and M{\'e}, Ludovic and Olivain, Julien and Picaronny, Claudine and Pouzol, Jean-{\relax Ph}ilippe and Totel, {\'E}ric and Vivinis, Bernard}, title = {Algorithmes de d{\'e}tection et langages de signatures}, year = {2003}, month = oct, type = {Contract Report}, number = {(Sous-projet~3, livrable~3)}, institution = {projet RNTL DICO}, oldhowpublished = {Sous-projet 3, livrable 3 du projet RNTL DICO. Version~1}, note = {72~pages} }

@inproceedings{GLNZ-csl2004, address = {Karpacz, Poland}, month = sep, year = 2004, volume = {3210}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Marcinkowski, Jerzy and Tarlecki, Andrzej}, acronym = {{CSL}'04}, booktitle = {{P}roceedings the 18th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'04)}, author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir and Nowak, David and Zhang, Yu}, title = {Complete Lax Logical Relations for Cryptographic Lambda-Calculi}, pages = {400-414}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLNZ-csl04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLNZ-csl04.ps} }

@article{GLRV:acm, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Programming}, author = {Goubault{-}Larrecq, Jean and Roger, Muriel and Verma, Kumar N.}, title = {Abstraction and Resolution Modulo~{AC}: {H}ow to Verify {D}iffie-{H}ellman-like Protocols Automatically}, volume = 64, number = 2, pages = {219-251}, year = {2005}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLRV-acm.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLRV-acm.ps}, doi = {10.1016/j.jlap.2004.09.004} }

@inproceedings{JGL:JFLA04, address = {Sainte-Marie-de-R{\'e}, France}, month = jan, year = 2004, publisher = {INRIA}, editor = {M{\'e}nissier-Morain, Val{\'e}rie}, acronym = {{JFLA}'04}, booktitle = {{A}ctes des 15{\`e}mes {J}ourn{\'e}es {F}rancophones sur les {L}angages {A}pplicatifs ({JFLA}'04)}, author = {Goubault{-}Larrecq, Jean}, title = {Une fois qu'on n'a pas trouv{\'e} de preuve, comment le faire comprendre {\`a} un assistant de preuve~?}, pages = {1-40}, oldpublisher = {INRIA, collection didactique}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-JFLA2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-JFLA2004.ps} }

@misc{JGL:wlp04, author = {Goubault{-}Larrecq, Jean}, title = {On Computational Interpretations of the Modal Logic~{S4}}, year = 2004, month = jul, howpublished = {Invited talk, 2nd {W}orkshop on the {L}ogic for {P}ragmatics ({WoLP}'04), Cr{\'e}teil, France}, futureslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/JGL-talk_.pdf} }

@misc{JGL:wcqis04, author = {Goubault{-}Larrecq, Jean}, title = {A Biased Survey of Models and Methods for Verifying Cryptographic Protocols}, year = 2005, month = dec, howpublished = {Invited talk, {W}orkshop on {C}lassical and {Q}uantum {I}nformation {S}ecurity, Pasadena, California, USA}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/JGL-wcqis05.pdf} }

@misc{JGL:SASYFT04, author = {Goubault{-}Larrecq, Jean}, title = {On Cryptographic Protocols, Regular Tree Languages, and Automated Deduction}, year = 2004, month = jun, howpublished = {Invited talk, {W}orkshop on {S}ecurity of {S}ystems: {F}ormalism and {T}ools ({SASYFT}'04), Orleans, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/JGL-talk_sasyft.pdf} }

@article{JGL:val:ext, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Extensions of Valuations}, year = {2005}, volume = 15, number = 2, pages = {271-297}, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-17.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-17.rr.ps}, doi = {10.1017/S096012950400461X} }

@inproceedings{GLP:VMCAI, address = {Paris, France}, month = jan, year = 2005, volume = 3385, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cousot, Radhia}, acronym = {{VMCAI}'05}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'05)}, author = {Goubault{-}Larrecq, Jean and Parrennes, Fabrice}, title = {Cryptographic Protocol Analysis on Real {C}~Code}, pages = {363-379}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf}, doi = {10.1007/b105073}, abstract = {Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e.g., SSL or TLS). We describe how cryptographic protocol verification techniques based on solving clause sets can be applied to detect vulnerabilities of C programs in the Dolev-Yao model, statically. This involves integrating fairly simple pointer analysis techniques with an analysis of which messages an external intruder may collect and forge. This also involves relating concrete run-time data with abstract, logical terms representing messages. To this end, we make use of so-called trust assertions. The output of the analysis is a set of clauses in the decidable class H1, which can then be solved independently. This can be used to establish secrecy properties, and to detect some other bugs. } }

@article{JGL-ipl2005, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Goubault{-}Larrecq, Jean}, title = {Deciding {\(\mathcal{\MakeUppercase{H}}_1\)} by Resolution}, year = {2005}, volume = 95, number = 3, pages = {401-408}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Goubault-h1.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Goubault-h1.pdf}, doi = {10.1016/j.ipl.2005.04.007}, abstract = {Nielson, Nielson and Seidl's class \(\mathcal{H}_1\) is a decidable class of first-order Horn clause sets, describing strongly regular relations. We give another proof of decidability, and of the regularity of the defined languages, based on fairly standard automated deduction techniques. } }

@article{VGL-dmtcs05, journal = {Discrete Mathematics \& Theoretical Computer Science}, author = {Verma, Kumar N. and Goubault{-}Larrecq, Jean}, title = {{K}arp-{M}iller Trees for a Branching Extension of~{VASS}}, volume = 7, number = 1, pages = {217-230}, year = 2005, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VGL-dmtcs05.pdf}, secondurl = {http://www.dmtcs.org/volumes/abstracts/dm070113.abs.html}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VGL-dmtcs05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VGL-dmtcs05.ps}, abstract = {We study BVASS (Branching VASS) which extend VASS (Vector Addition Systems with States) by allowing addition transitions that merge two configurations. Runs in BVASS are tree-like structures instead of linear ones as for VASS. We show that the construction of Karp-Miller trees for VASS can be extended to BVASS. This entails that the coverability set for BVASS is computable. This allows us to obtain decidability results for certain classes of equational tree automata with an associative-commutative symbol. Recent independent work by de Groote \emph{et al.} implies that decidability of reachability in BVASS is equivalent to decidability of provability in MELL (multiplicative exponential linear logic), which is still an open problem. Hence our results are also a step towards answering this question in the affirmative.} }

@inproceedings{Orchids-cav05, address = {Edinburgh, Scotland, UK}, month = jul, year = 2005, volume = 3576, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Etessami, Kousha and Rajamani, Sriram}, acronym = {{CAV}'05}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'05)}, author = {Olivain, Julien and Goubault{-}Larrecq, Jean}, title = {The {O}rchids Intrusion Detection Tool}, pages = {286-290}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf}, doi = {10.1007/11513988_28} }

@incollection{jgl-encyc06, author = {Goubault{-}Larrecq, Jean}, title = {Preuve et v{\'e}rification pour la s{\'e}curit{\'e} et la s{\^u}ret{\'e}}, booktitle = {Encyclop{\'e}die de l'informatique et des syst{\`e}mes d'information}, editor = {Akoka, Jacky and Comyn-Wattiau, Isabelle}, pages = {683-703}, publisher = {Vuibert}, year = 2006, month = dec, chapter = {I.6}, url = {http://www.vuibert.com/livre12401.html}, abstract = {La s\^uret\'e, comme la s\'ecurit\'e, \'enonce qu'un mal n'arrive jamais. Le but de cet article est de d\'efinir la notion de propri\'et\'e de s\^uret\'e, et d'en d\'ecrire quelques techniques de v\'erification et de preuve~: model-checking, interpr\'etation abstraite notamment. Apr\`es avoir remarqu\'e qu'il n'y avait pas de s\'ecurit\'e sans s\^uret\'e, il est expliqu\'e que l'analyse de s\'ecurit\'e d'un syst\`eme repose sur un mod\`ele, des hypoth\`eses, des propri\'et\'es \`a v\'erifier, et une architecture de s\'ecurit\'e. Finalement, il est donn\'e un aper\c{c}u de quelques mod\`eles et m\'ethodes de preuve de protocoles cryptographiques.} }

@techreport{LSV:06:13, author = {Olivain, Julien and Goubault{-}Larrecq, Jean}, title = {Detecting Subverted Cryptographic Protocols by Entropy Checking}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2006, month = jun, type = {Research Report}, number = {LSV-06-13}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-13.pdf}, note = {19~pages}, abstract = {What happens when your implementation of SSL or some other cryptographic protocol is subverted through a buffer overflow attack? You have been hacked, right. Unfortunately, you may be unaware of~it: since normal traffic is encrypted, most IDSs cannot monitor~it. We propose a simple, yet efficient technique to detect such attacks, by computing the entropy of the flow and comparing it against known thresholds. This was implemented in the Net-Entropy sensor.} }

@misc{JGL:aarcs06, author = {Goubault{-}Larrecq, Jean}, title = {The {ORCHIDS} Intrusion Prevention System}, month = nov, year = {2006}, howpublished = {Invited talk, {A}nnual {A}daptive and {R}esilient {C}omputing {S}ystems {W}orkshop (AARCS'06), Santa Fe, New Mexico, USA}, url = {http://www.lsv.ens-cachan.fr/~goubault/aarcs06_orchids.pdf} }

@inproceedings{Gou-fossacs08b, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Goubault{-}Larrecq, Jean}, title = {Simulation Hemi-Metrics Between Infinite-State Stochastic Games}, pages = {50-65}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-34.pdf}, doi = {10.1007/978-3-540-78499-9_5}, abstract = {We investigate simulation hemi-metrics between certain forms of turn-based \(2\frac{1}{2}\)-player games played on infinite topological spaces. They have the desirable property of bounding the difference in payoffs obtained by starting from one state or another. All constructions are described as the special case of a unique one, which we call the Hutchinson hemi-metric on various spaces of continuous previsions. We show a directed form of the Kantorovich-Rubinstein theorem, stating that the Hutchinson hemi-metric on spaces of continuous probability valuations coincides with a notion of trans-shipment hemi-metric. We also identify the class of so-called sym-compact spaces as the right class of topological spaces, where the theory works out as nicely as possible.} }

@inproceedings{Gou-fossacs08a, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Goubault{-}Larrecq, Jean}, title = {Prevision Domains and Convex Powercones}, pages = {318-333}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-33.pdf}, doi = {10.1007/978-3-540-78499-9_23}, abstract = {Two recent semantic families of models for mixed probabilistic and non-deterministic choice over a space~\(X\) are the convex powercone models, due independently to Mislove, and to Tix, Keimel, and Plotkin, and the continuous prevision model of the author. We show that, up to some minor details, these models are isomorphic whenever \(X\) is a continuous, coherent cpo, and whether the particular brand of non-determinism we focus on is demonic, angelic, or chaotic. The construction also exhibits domains of continuous previsions as retracts of well-known continuous cpos, providing simple bases for the various continuous cpos of continuous previsions. This has practical relevance to computing approximations of operations on previsions.} }

@inproceedings{BG-asian07, address = {Doha, Qatar}, month = dec, year = 2007, volume = 4846, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cervesato, Iliano}, acronym = {{ASIAN}'07}, booktitle = {{P}roceedings of the 12th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'07)}, author = {Bursztein, Elie and Goubault{-}Larrecq, Jean}, title = {A Logical Framework for Evaluating Network Resilience Against Faults and Attacks}, pages = {212-227}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGL-asian07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGL-asian07.pdf}, doi = {10.1007/978-3-540-76929-3_20}, abstract = {We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faults. Our model uses a two-layered presentation of dependencies between files and services, and of timed games to represent not just incidents, but also the dynamic responses from administrators and their respective delays. We demonstrate that a variant TATL\(\Diamond\) of timed alternating-time temporal logic is a convenient language to express several desirable properties of networks, including several forms of survivability. We illustrate this on a simple redundant Web service architecture, and show that checking such timed games against the so-called TATL\(\Diamond\) variant of the timed alternating time temporal logic TATL is EXPTIME-complete.} }

@inproceedings{GPT-aplas07, address = {Singapore}, month = nov # {-} # dec, year = 2007, volume = 4807, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Shao, Zhong}, acronym = {{APLAS}'07}, booktitle = {{P}roceedings of the 5th {A}sian {S}ymposium on {P}rogramming {L}anguages and {S}ystems ({APLAS}'07)}, author = {Goubault{-}Larrecq, Jean and Palamidessi, Catuscia and Troina, Angelo}, title = {A Probabilistic Applied Pi-Calculus}, pages = {175-290}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GPT-aplas07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GPT-aplas07.pdf}, doi = {10.1007/978-3-540-76637-7_12}, abstract = {We propose an extension of the Applied Pi-calculus by introducing nondeterministic and probabilistic choice operators. The semantics of the resulting model, in which probability and nondeterminism are combined, is given by Segala's Probabilistic Automata driven by schedulers which resolve the nondeterministic choice among the probability distributions over target states. Notions of static and observational equivalence are given for the enriched calculus. In order to model the possible interaction of a process with its surrounding environment a labeled semantics is given together with a notion of weak bisimulation which is shown to coincide with the observational equivalence. Finally, we prove that results in the probabilistic framework are preserved in a purely nondeterministic setting.} }

@inproceedings{Gou-csl07, address = {Lausanne, Switzerland}, month = sep, year = 2007, volume = 4646, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Duparc, Jacques and Henzinger, {\relax Th}omas A.}, acronym = {{CSL}'07}, booktitle = {{P}roceedings of the 16th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'07)}, author = {Goubault{-}Larrecq, Jean}, title = {Continuous Previsions}, pages = {542-557}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-csl07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-csl07.pdf}, doi = {10.1007/978-3-540-74915-8_40}, abstract = {We define strong monads of continuous (lower, upper) previsions, and of forks, modeling both probabilistic and non-deterministic choice. This is an elegant alternative to recent proposals by Mislove, Tix, Keimel, and Plotkin. We show that our monads are sound and complete, in the sense that they model exactly the interaction between probabilistic and (demonic, angelic, chaotic) choice.} }

@inproceedings{JGL-icalp07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, volume = 4596, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arge, Lars and Cachin, {\relax Ch}ristian and Jurdzi{\'n}ski, Tomasz and Tarlecki, Andrzej}, acronym = {{ICALP}'07}, booktitle = {{P}roceedings of the 34th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'07)}, author = {Goubault{-}Larrecq, Jean}, title = {Continuous Capacities on Continuous State Spaces}, pages = {764-776}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-icalp07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-icalp07.pdf}, doi = {10.1007/978-3-540-73420-8_66}, abstract = {We propose axiomatizing some stochastic games, in a continuous state space setting, using continuous belief functions, resp. plausibilities, instead of measures. Then, stochastic games are just variations on continuous Markov chains. We argue that drawing at random along a belief function is the same as letting the probabilistic player~\(P\) play first, then letting the non-deterministic player~\(C\) play demonically. The same holds for an angelic~\(C\), using plausibilities instead. We then define a simple modal logic, and characterize simulation in terms of formulae of this logic. Finally, we show that (discounted) payoffs are defined and unique, where in the demonic case, \(P\)~maximizes payoff, while \(C\)~minimizes it} }

@inproceedings{Gou-lics07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'07}, booktitle = {{P}roceedings of the 22nd {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'07)}, author = {Goubault{-}Larrecq, Jean}, title = {On {N}oetherian Spaces}, pages = {453-462}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-lics07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-lics07.pdf}, doi = {10.1109/LICS.2007.34}, abstract = {A topological space is Noetherian iff every open is compact. Our~starting point is that this notion generalizes that of well-quasi order, in the sense that an Alexandroff-discrete space is Noetherian iff its specialization quasi-ordering is well. For~more general spaces, this opens the way to verifying infinite transition systems based on non-well quasi ordered sets, but where the preimage operator satisfies an additional continuity assumption. The technical development rests heavily on techniques arising from topology and domain theory, including sobriety and the de Groot dual of a stably compact space. We~show that the category Nthr of Noetherian spaces is finitely complete and finitely cocomplete. Finally, we note that if \(X\)~is a Noetherian space, then the set of all (even infinite) subsets of~\(X\) is again Noetherian, a~result that fails for well-quasi orders.} }

@techreport{LSV:07:03, author = {Goubault{-}Larrecq, Jean}, title = {Believe It Or Not, {GOI}~is a Model of Classical Linear Logic}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = jan, type = {Research Report}, number = {LSV-07-03}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-03.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-03.pdf}, note = {18~pages}, othernote = {a draft of the longer version of this report is available at http://www.lsv.ens-cachan.fr/~goubault/isg.pdf}, abstract = {We introduce the Danos-R\'egnier category \(\mathcal{DR}(M)\) of a linear inverse monoid~\(M\), a categorical description of geometries of interaction~(GOI). The usual setting for GOI is that of a weakly Cantorian linear inverse monoid. It is well-known that GOI is perfectly suited to describe the multiplicative fragment of linear logic, and indeed \(\mathcal{DR}(M)\) will be a \(*\)-autonomous category in this case. It is also well-known that the categorical interpretation of the other linear connectives conflicts with GOI interpretations. We make this precise, and show that \(\mathcal{DR}(M)\) has no terminal object, no cartesian product, and no exponential---whatever \(M\) is, unless \(M\) is trivial. However, a form of coherence completion of~\(\mathcal{DR}(M)\) \`a la Hu-Joyal provides a model of full classical linear logic, as soon as \(M\) is weakly Cantorian.} }

@article{VG-icomp2007, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Verma, Kumar N. and Goubault{-}Larrecq, Jean}, title = {Alternating Two-Way {AC}-Tree Automata}, pages = {817-869}, year = {2007}, month = jun, volume = 205, number = 6, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VG-icomp07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VG-icomp07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VG-icomp07.ps}, doi = {10.1016/j.ic.2006.12.006}, abstract = {We explore the notion of alternating two-way tree automata modulo the theory of finitely many associative-commutative (AC) symbols. This was prompted by questions arising in cryptographic protocol verification, in~particular in modeling group key agreement schemes based on Diffie-Hellman-like functions, where the emptiness question for intersections of such automata is fundamental. This also has independent interest. We~show that the use of general push clauses, or of alternation, leads to undecidability, already in the case of one AC symbol, with only functions of arity zero. On~the other hand, emptiness is decidable in the general case of several function symbols, including several AC symbols, provided push clauses are unconditional and intersection clauses are final. This class of automata is also shown to be closed under intersection.} }

@misc{JGL:H1, author = {Goubault{-}Larrecq, Jean}, title = {The {\ttfamily h1} Tool Suite}, year = {2008}, month = jan, nmnote = {See~\cite{JGL:JFLA04} for description. Written in HimML (15746 lines) and C (1823 lines)}, nmnote-fr = {Voir~\cite{JGL:JFLA04} pour la description. \'Ecrit en HimML (15746 lignes) et C (1823 lignes)}, url = {http://www.lsv.ens-cachan.fr/~goubault/H1.dist/dh1index.html} }

@misc{JG:HimML:dwnld, author = {Goubault{-}Larrecq, Jean}, title = {{HimML}: {\bfseries \MakeUppercase{H}}im{ML} {\bfseries i}s a {\bfseries m}ap-oriented {\bfseries \MakeUppercase{ML}}}, year = {2008}, month = dec, number = {v\(\alpha\)18r3}, nohowpublished = {An extension of core Standard ML, available at \url{http://www.lsv.ens-cachan.fr/~goubault/himml-dwnld.html}}, nmnote = {Version 1.0 alpha 17. Written in C (108948 lines), Emacs-Lisp (1850 lines). Documentation: 91 pages}, url = {http://www.lsv.ens-cachan.fr/~goubault/himml-dwnld.html} }

@article{GLLN-mscs08, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir and Nowak, David}, title = {Logical Relations for Monadic Types}, volume = 18, number = 6, pages = {1169-1217}, month = dec, year = 2008, note = {81~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLLN-arxiv05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLLN-arxiv05.pdf}, doi = {10.1017/S0960129508007172}, abstract = {Logical relations and their generalisations are a fundamental tool in proving properties of lambda calculi, for example, for yielding sound principles for observational equivalence. We propose a natural notion of logical relations that is able to deal with the monadic types of Moggi's computational lambda calculus. The treatment is categorical, and is based on notions of subsconing, mono factorisation systems and monad morphisms. Our approach has a number of interesting applications, including cases for lambda calculi with non-determinism (where being in a logical relation means being bisimilar), dynamic name creation and probabilistic systems.} }

@techreport{LSV:08:18, author = {Goubault{-}Larrecq, Jean}, title = {A Cone-Theoretic {K}rein-{M}ilman Theorem}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2008, month = jun, type = {Research Report}, number = {LSV-08-18}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-18.pdf}, note = {8~pages}, abstract = {We prove the following analogue of the Krein-Milman Theorem: in any locally convex \(T_{0}\) topological cone, every convex compact saturated subset is the compact saturated convex hull of its extreme points.} }

@inproceedings{JGL:badweeds, address = {Budapest, Hungary}, month = mar, year = 2008, volume = 5289, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Leucker, Martin}, acronym = {{RV}'08}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}untime {V}erification ({RV}'08)}, author = {Goubault{-}Larrecq, Jean and Olivain, Julien}, title = {A Smell of Orchids}, pages = {1-20}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/go-rv08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/go-rv08.pdf}, doi = {10.1007/978-3-540-89247-2_1}, abstract = {Orchids is an intrusion detection tool based on techniques for fast, on-line model-checking. Orchids detects complex, correlated strands of events with very low overhead in practice, although its detec- tion algorithm has worst-case exponential time complexity.\par The purpose of this paper is twofold. First, we explain the salient features of the basic model-checking algorithm in an intuitive way, as a form of dynamically-spawned monitors. One distinctive feature of the Orchids algorithm is that fresh monitors need to be spawned at a pos- sibly alarming rate.\par The second goal of this paper is therefore to explain how we tame the complexity of the procedure, using abstract interpretation techniques to safely kill useless monitors. This includes monitors which will provably detect nothing, but also monitors that are subsumed by others, in the sense that they will definitely fail the so-called shortest run criterion. We take the opportunity to show how the Orchids algorithm maintains its monitors sorted in such a way that the subsumption operation is effected with no overhead, and we correct a small, but definitely annoying bug in its core algorithm, as it was published in~2001.} }

@inproceedings{JGL-csf08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'08}, booktitle = {{P}roceedings of the 21st {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'08)}, author = {Goubault{-}Larrecq, Jean}, title = {Towards Producing Formally Checkable Security Proofs, Automatically}, pages = {224-238}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-15.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-15.pdf}, doi = {10.1109/CSF.2008.21}, abstract = {First-order logic models of security for cryptographic protocols, based on variants of the Dolev-Yao model, are now well-established tools. Given that we have checked a given security protocol~\(\pi\) using a given first-order prover, how hard is it to extract a formally checkable proof of~it, as~required in, e.g., common criteria at evaluation level~\(7\)? We~demonstrate that this is surprisingly hard: the problem is non-recursive in general. On~the practical side, we show how we can extract finite models~\(\mathcal{M}\) from a set~\(\mathcal{S}\) of clauses representing~\(\pi\), automatically, in two ways. We~then define a model-checker testing \(\mathcal{M} \models \mathcal{S}\), and show how we can instrument it to output a formally checkable proof, e.g., in~Coq. This was implemented in the \texttt{h1} tool suite. Experience on a number of protocols shows that this is practical.} }

@article{JGL-mscs09, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {{D}e~{G}root Duality and Models of Choice: Angels, Demons, and Nature}, volume = {20}, number = 2, pages = {169-237}, month = apr, year = 2010, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-mscs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-mscs09.pdf}, doi = {10.1017/S0960129509990363}, abstract = {We introduce convex-concave duality for various models of non-deterministic choice, probabilistic choice, and the two of them together. This complements the well-known duality of stably compact spaces in a pleasing way: convex-concave duality swaps angelic and demonic choice, and leaves probabilistic choice invariant.} }

@inproceedings{JGL-asian09, address = {Seoul, Korea}, month = dec, year = 2009, volume = 5913, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Datta, Anupam}, acronym = {{ASIAN}'09}, booktitle = {{P}roceedings of the 13th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'09)}, author = {Goubault{-}Larrecq, Jean}, title = {{\textquotedbl}{L}ogic Wins!{\textquotedbl}}, pages = {1-16}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-asian09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-asian09.pdf}, doi = {10.1007/978-3-642-10622-4_1}, abstract = {Clever algorithm design is sometimes superseded by simple encodings into logic. We apply this motto to a few case studies in the formal verification of security properties. In particular, we examine confidentiality objectives in hardware circuit descriptions written in VHDL.} }

@techreport{LSV:09:09, author = {Goubault{-}Larrecq, Jean}, title = {On a Generalization of a Result by {V}alk and {J}antzen}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = may, type = {Research Report}, number = {LSV-09-09}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-09.pdf}, note = {18~pages}, abstract = {We~show that, under mild assumptions on the effective, well quasi-ordered set~\(X\), one~can compute a finite basis of an upward-closed subset~\(U\) of~\(X\) if and only if one can decide whether \(U \cap \downarrow z\) is empty for every \(z \in \widehat{X}\). Here \(\widehat{X}\) is the completion of \(X\) as defined in Finkel and Goubault-Larrecq, {\em Forward Analysis for WSTS, Part~{I:} Completions}, STACS'09, pages 433-444, 2009. This generalizes a useful result proved by Valk and Jantzen in~1985, which is the case \(X = \\mathbb{N}^k\).} }

@article{goubault-jcs09, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Goubault{-}Larrecq, Jean}, title = {Finite Models for Formal Security Proofs}, volume = 18, number = 6, pages = {1247-1299}, year = 2010, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-jcs09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-jcs09.pdf}, doi = {10.3233/JCS-2009-0395}, abstract = {First-order logic models of security for cryptographic protocols, based on variants of the Dolev-Yao model, are now well-established tools. Given that we have checked a given security protocol using a given first-order prover, how hard is it to extract a formally checkable proof of it, as required in, \textit{e.g.}, common criteria at the highest evaluation level~(EAL7)? We~demonstrate that this is surprisingly hard in the general case: the problem is non-recursive. Nonetheless, we show that we can instead extract finite models~\(\mathcal{M}\) from a set~\(S\) of clauses representing~\(\pi\), automatically, and give two ways of doing~so. We~then define a model-checker testing \(\mathcal{M} \models S\), and show how we can instrument it to output a formally checkable proof, \textit{e.g.}, in~Coq. Experience on a number of protocols shows that this is practical, and that even complex (secure) protocols modulo equational theories have small finite models, making our approach suitable.} }

@inproceedings{FGL-icalp09, address = {Rhodes, Greece}, month = jul, year = 2009, volume = 5556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Thomas, Wolfgang}, acronym = {{ICALP}'09}, booktitle = {{P}roceedings of the 36th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'09)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for {WSTS}, Part~{II}: Complete {WSTS}}, pages = {188-199}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-icalp09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-icalp09.pdf}, doi = {10.1007/978-3-642-02930-1_16}, abstract = {We~describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathcal{S}\). This computes the \emph{clover} of a state~\(s_0\) , \textit{i.e.}, a~finite description of the closure of the cover of~\(s_0\) . When \(S\) is the completion of a WSTS~\(\mathcal{X}\), the clover in~\(\mathcal{S}\) is a finite description of the cover in~\(\mathcal{X}\). We~show that this applies exactly when \(\mathcal{X}\) is an \(\omega^2\)-WSTS, a~new robust class of WSTS. We~show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we~apply this to well-structured counter systems.} }

@inproceedings{FGL-stacs2009, address = {Freiburg, Germany}, month = feb, year = 2009, volume = 3, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Albers, Susanne and Marion, Jean-Yves}, acronym = {{STACS}'09}, booktitle = {{P}roceedings of the 26th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'09)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for~{WSTS}, Part~{I}: Completions}, pages = {433-444}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-stacs2009.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-stacs2009.pdf}, abstract = {Well-structured transition systems provide the right foundation to compute a finite basis of the set of predecessors of the upward closure of a state. The~dual problem, to compute a finite representation of the set of successors of the downward closure of a state, is~harder: Until now, the theoretical framework for manipulating downward-closed sets was missing. We~answer this problem, using insights from domain theory (dcpos and ideal completions), from topology (sobrifications), and shed new light on the notion of adequate domains of limits.} }

@inproceedings{BGGLP-scan10, address = {Lyon, France}, month = sep, year = 2010, noeditor = {}, acronym = {SCAN'10}, booktitle = {{P}roceedings of the 14th {GAMM}-{IMACS} {I}nternational {S}ymposium on {S}cientific {C}omputing, {C}omputer {A}rithmetic and {V}alidated {N}umerics ({SCAN}'10)}, author = {Bouissou, Olivier and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean and Putot, Sylvie}, title = {A Generalization of {P}-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs}, nopages = {} }

@article{GLK-mscs10, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean and Keimel, Klaus}, title = {{C}hoquet-{K}endall-{M}atheron Theorems for Non-{H}ausdorff Spaces}, volume = 21, number = 3, pages = {511-561}, month = jun, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf}, doi = {10.1017/S0960129510000617}, abstract = {We establish Choquet-Kendall-Matheron theorems on non-Hausdorff topological spaces. This typical result of random set theory is profitably recast in purely topological terms, using intuitions and tools from domain theory. We obtain three variants of the theorem, each one characterizing distributions, in the form of continuous valuations, over relevant powerdomains of demonic, resp. angelic, resp. erratic non-determinism.} }

@inproceedings{bgl-setop10, address = {Athens, Greece}, month = sep, year = 2010, volume = 6514, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cavalli, Ana and Leneutre, Jean}, acronym = {{DPM}{{\slash}}{SETOP}'10}, booktitle = {{R}evised {S}elected {P}apers of the 5th {I}nternational {W}orkshop on {D}ata {P}rivacy {M}anagement and {A}utonomous {S}pontaneous {S}ecurity ({DPM}'10) and 3rd {I}nternational {W}orkshop on {A}utonomous and {S}pontaneous {S}ecurity ({SETOP}'10)}, author = {Benzina, Hedi and Goubault{-}Larrecq, Jean}, title = {Some Ideas on Virtualized Systems Security, and Monitors}, pages = {244-258}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bgl-setop10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bgl-setop10.pdf}, doi = {10.1007/978-3-642-19348-4_18}, abstract = {Virtualized systems such as Xen, VirtualBox, VMWare or QEmu have been proposed to increase the level of security achievable on personal computers. On the other hand, such virtualized systems are now targets for attacks. We propose an intrusion detection architecture for virtualized systems, and discuss some of the security issues that arise. We argue that a weak spot of such systems is domain zero administration, which is left entirely under the administrator's responsibility, and is in particular vulnerable to trojans. To~avert some of the risks, we~propose to install a role-based access control model with possible role delegation, and to describe all undesired activity ows through simple temporal formulas. We show how the latter are compiled into Orchids rules, via a fragment of linear temporal logic, through a generalization of the so-called history variable mechanism.} }

@inproceedings{JGL-icalp10, address = {Bordeaux, France}, month = jul, year = 2010, volume = 6199, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abramsky, Samson and Meyer{ }auf{ }der{ }Heide, Friedhelm and Spirakis, Paul}, acronym = {{ICALP}'10}, booktitle = {{P}roceedings of the 37th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'10)~-- {P}art~{II}}, author = {Goubault{-}Larrecq, Jean}, title = {Noetherian Spaces in Verification}, pages = {2-21}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-icalp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-icalp10.pdf}, doi = {10.1007/978-3-642-14162-1_2}, abstract = {Noetherian spaces are a topological concept that generalizes well quasiorderings. We explore applications to infinite-state verification problems, and show how this stimulated the search for infinite procedures \`a la Karp-Miller.} }

@inproceedings{JGL-lics10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'10}, booktitle = {{P}roceedings of the 25th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'10)}, author = {Goubault{-}Larrecq, Jean}, title = {{{\(\omega\)}}{\textbf{\MakeUppercase{QRB}}}-Domains and the Probabilistic Powerdomain}, pages = {352-361}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lics10.pdf}, doi = {10.1109/LICS.2010.50}, abstract = {Is there any cartesian-closed category of continuous domains that would be closed under Jones and Plotkin's probabilistic powerdomain construction? This is a major open problem in the area of denotational semantics of probabilistic higher-order languages. We relax the question, and look for quasi-continuous dcpos instead. We introduce a natural class of such quasi-continuous dcpos, the \(\omega\textbf{QRB}\)-domains. We show that they form a category \(\omega\textbf{QRB}\) with pleasing properties: \(\omega\textbf{QRB}\) is closed under the probabilistic powerdomain functor, has all finite products, all bilimits, and is stable under retracts, and even under so-called quasiretracts. But... \(\omega\textbf{QRB}\) is not cartesian closed.} }

@misc{JGL-tacl11, author = {Jean Goubault{-}Larrecq}, title = {A Few Pearls in the Theory of Quasi-Metric Spaces}, year = {2011}, month = jul, howpublished = {Invited talk, Fifth International Conference on Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July~2011} }

@article{FG-lmcs12, journal = {Logical Methods in Computer Science}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for {WSTS}, Part~{II}: Complete {WSTS}}, year = 2012, month = sep, volume = 8, number = {3:28}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-lmcs12.pdf}, doi = {10.2168/LMCS-8(3:28)2012}, abstract = {We describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathfrak{S}\). This computes the so-called \emph{clover} of a state. When \(\mathfrak{S}\) is the completion of a WSTS~\(\mathfrak{X}\), the clover in~\(\mathfrak{S}\) is a finite description of the downward closure of the reachability set. We show that such completions are infinity-complete exactly when \(\mathfrak{X}\) is an \(\omega^2\)-WSTS, a~new robust class of WSTS. We show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets and on lossy channel systems. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we apply this to well-structured counter systems.} }

@article{JGL-lmcs12, journal = {Logical Methods in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {{QRB}-Domains and the Probabilistic Powerdomain}, year = 2012, volume = 8, number = {1:14}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:14)2012}, abstract = {Is there any Cartesian-closed category of continuous domains that would be closed under Jones and Plotkin's probabilistic powerdomain construction? This is a major open problem in the area of denotational semantics of probabilistic higher-order languages. We relax the question, and look for quasi-continuous dcpos instead.\par We introduce a natural class of such quasi-continuous dcpos, the omega-QRB-domains. We show that they form a category omega-QRB with pleasing properties: omega-QRB is closed under the probabilistic powerdomain functor, under finite products, under taking bilimits of expanding sequences, under retracts, and even under so-called quasi-retracts. But... omega-QRB is not Cartesian closed. We conclude by showing that the QRB domains are just one half of an FS-domain, merely lacking control.} }

@article{BGGLP-comp11, publisher = {Springer}, journal = {Computing}, author = {Bouissou, Olivier and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean and Putot, Sylvie}, title = {A Generalization of {P}-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs}, year = 2012, month = mar, volume = 94, number = {2-4}, pages = {189-201}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGGLP-comp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGGLP-comp11.pdf}, doi = {10.1007/s00607-011-0182-8}, abstract = {We often need to deal with information that contains both interval and probabilistic uncertainties. P-boxes and Dempster-Shafer structures are models that unify both kind of information, but they suffer from the main defect of intervals, the wrapping effect. We present here a new arithmetic that mixes, in a guaranteed manner, interval uncertainty with probabilities, while using some information about variable dependencies, hence limiting the loss from not accounting for correlations. This increases the precision of the result and decreases the computation time compared to standard p-box arithmetic.} }

@misc{orchids-v1.0, author = {Olivain, Julien and Goubault{-}Larrecq, Jean and Benzina, Hedi and Gourdin, Baptiste and Ben{~}Youn{\`e}s, Romdhane}, title = {{ORCHIDS}}, year = {2011}, nmnote = {See~\url{http://www.lsv.ens-cachan.fr/orchids/} for description. Written in C (about 48800 lines)}, nmnote-fr = {Voir~\url{http://www.lsv.ens-cachan.fr/orchids/} pour la description. \'Ecrit en~C (environ 48800 lignes)}, url = {http://www.lsv.ens-cachan.fr/Software/orchids/}, abstract = {An efficient, on-line, real-time, multi-event intrusion detection system originally based on model-checking ideas.} }

@inproceedings{GLV-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Goubault{-}Larrecq, Jean and Varacca, Daniele}, title = {Continuous Random Variables}, pages = {97-106}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011-errata.pdf}, doi = {10.1109/LICS.2011.23}, abstract = {We introduce the domain of continuous random variables (CRV) over a domain, as an alternative to Jones and Plotkin's probabilistic powerdomain. While no known Cartesian-closed category is stable under the latter, we show that the so-called thin (uniform) CRVs define a strong monad on the Cartesian-closed category of bc-domains. We also characterize their inequational theory, as (fair-)coin algebras. We apply this to solve a recent problem posed by M. Escard{\'o}: testing is semi-decidable for EPCF terms. CRVs arose from the study of the second author's (layered) Hoare indexed valuations, and we also make the connection apparent.} }

@article{JGL-jyg10, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Musings Around the Geometry of Interaction, and Coherence}, volume = 412, number = 20, pages = {1998-2014}, year = 2011, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf}, doi = {10.1016/j.tcs.2010.12.023}, abstract = {We introduce the Danos-R{\'e}gnier category \(\mathcal{DR}(M)\) of a linear inverse monoid~\(M\), as~a categorical description of geometries of interaction~(GOI) inspired from the weight algebra. The natural setting for GOI is that of a so-called weakly Cantorian linear inverse monoid, in which case \(\mathcal{DR}(M)\) is a kind of symmetrized version of the classical Abramsky-Haghverdi-Scott construction of a weak linear category from a GOI situation. It is well-known that GOI is perfectly suited to describe the multiplicative fragment of linear logic, and indeed \(\mathcal{DR}(M)\) will be a \(\star\)-autonomous category in this case. It is also well-known that the categorical interpretation of the other linear connectives conflicts with GOI interpretations. We make this precise, and show that \(\mathcal{DR}(M)\) has no terminal object, no cartesian product of any two objects, and no exponential---whatever \(M\)~is, unless \(M\)~is trivial. However, a form of coherence completion of \(\mathcal{DR}(M)\) \textit{{\`a} la} Hu-Joyal (which for additives resembles a layered approach \textit{{\`a} la} Hughes-van Glabbeek), provides a model of full classical linear logic, as soon as \(M\) is weakly Cantorian. One finally notes that Girard's notion of \emph{coherence} is pervasive, and instrumental in every aspect of this work.} }

@techreport{AGL-arxiv12, author = {Adj{\'e}, Assal{\'e} and Goubault{-}Larrecq, Jean}, title = {Concrete Semantics of Programs with Non-Deterministic and Random Inputs}, year = {2012}, month = oct, type = {Research Report}, institution = {Computing Research Repository}, number = {cs.LO/1210.2605}, url = {http://arxiv.org/abs/1210.2605}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGL-arxiv12.pdf}, originalpdf = {http://arxiv.org/pdf/1210.2605}, note = {19~pages}, abstract = {This document gives semantics to programs written in a C-like programming language, featuring interactions with an external environment with noisy and imprecise data.} }

@inproceedings{FGL-pn12, address = {Hamburg, Germany}, month = jun, year = 2012, volume = 7347, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Haddad, Serge and Pomello, Lucia}, acronym = {{PETRI~NETS}'12}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'12)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {The~Theory of~{WSTS}: The~Case of Complete~{WSTS}}, pages = {3-31}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGL-atpn12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGL-atpn12.pdf}, doi = {10.1007/978-3-642-31131-4_2}, abstract = {We describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathfrak{S}\). This computes the so-called \emph{clover} of a state. When \(\mathfrak{S}\) is the completion of a WSTS~\(\mathfrak{X}\), the clover in~\(\mathfrak{S}\) is a finite description of the downward closure of the reachability set. We show that such completions are \(\infty\)-complete exactly when \(\mathfrak{X}\) is an \emph{\(\omega^{2}\)-WSTS}, a new robust class of WSTS. We show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we apply this to well-structured Presburger counter systems.} }

@book{JGL-topology, author = {Goubault{-}Larrecq, Jean}, title = {Non-{H}ausdorff Topology and Domain Theory---Selected Topics in Point-Set Topology}, publisher = {Cambridge University Press}, series = {New Mathematical Monographs}, volume = {22}, year = {2013}, month = mar, url = {http://www.cambridge.org/9781107034136}, isbn = {9781107034136} }

@inproceedings{JGL-mfcs13, address = {Klosterneuburg, Austria}, month = aug, year = 2013, volume = {8087}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chatterjee, Krishnendu and Sgall, Ji{\v{r}}{\'\i}}, acronym = {{MFCS}'13}, booktitle = {{P}roceedings of the 38th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'13)}, author = {Goubault{-}Larrecq, Jean}, title = {A Constructive Proof of the Topological {K}ruskal Theorem}, pages = {22-41}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mfcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mfcs13.pdf}, doi = {10.1007/978-3-642-40313-2_3}, abstract = {We give a constructive proof of Kruskal's Tree Theorem---precisely, of a topological extension of~it. The proof is in the style of a constructive proof of Higman's Lemma due to Murthy and Russell~(1990), and illuminates the role of regular expressions there. In the process, we discover an extension of Dershowitz' recursive path ordering to a form of cyclic terms which we call \(\mu\)-terms. This all came from recent research on Noetherian spaces, and serves as a teaser for their theory.} }

@inproceedings{ABGGP-vstte13, address = {Atherton, California, USA}, year = 2014, volume = 8164, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cohen, Ernie and Rybalchenko, Andrey}, acronym = {{VSTTE}'13}, booktitle = {{R}evised {S}elected {P}apers of the 5th {IFIP} {TC2}\slash{WG2.3} {C}onference {V}erified {S}oftware---{T}heories, {T}ools, and {E}xperiments ({VSTTE}'13)}, author = {Adj{\'e}, Assal{\'e} and Bouissou, Olivier and Goubault{-}Larrecq, Jean and Goubault, {\'E}ric and Putot, Sylvie}, title = {Static Analysis of Programs with Imprecise Probabilistic Inputs}, pages = {22-47}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGGP-vstte13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGGP-vstte13.pdf}, doi = {10.1007/978-3-642-54108-7}, abstract = {Having a precise yet sound abstraction of the inputs of numerical programs is important to analyze their behavior. For many programs, these inputs are probabilistic, but the actual distribution used is only partially known. We present a static analysis framework for reasoning about programs with inputs given as imprecise probabilities: we define a collecting semantics based on the notion of previsions and an abstract semantics based on an extension of Dempster-Shafer structures. We prove the correctness of our approach and show on some realistic examples the kind of invariants we are able to infer.} }

@incollection{GLJ-hg13, noaddress = {}, month = jan, year = 2013, volume = 7797, series = {Lecture Notes in Computer Science}, publisher = {Springer}, noacronym = {}, booktitle = {Programming Logics~-- Essays in Memory of {H}arald {G}anzinger}, editor = {Voronkov, Andrei and Weidenbach, Christoph}, author = {Goubault{-}Larrecq, Jean and Jouannaud, Jean-Pierre}, title = {The Blossom of Finite Semantic Trees}, pages = {90-122}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-hg13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-hg13.pdf} }

@inproceedings{GLJ-mfps30, address = {Ithaca, New~York, USA}, month = jun, year = 2014, volume = 308, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jacobs, Bart and Silva, Alexandra and Staton, Sam}, acronym = {{MFPS}'14}, booktitle = {{P}roceedings of the 30th {C}onference on {M}athematical {F}oundations of {P}rogramming {S}emantics ({MFPS}'14)}, author = {Goubault{-}Larrecq, Jean and Jung, Achim}, title = {{QRB}, {QFS}, and the Probabilistic Powerdomain}, pages = {167-182}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-mfps14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-mfps14.pdf}, doi = {10.1016/j.entcs.2014.10.010}, abstract = {We show that the first author's QRB-domains coincide with Li and Xu's QFS-domains, and also with Lawson-compact quasi-continuous dcpos, with stably-compact locally finitary compact spaces, with sober QFS-spaces, and with sober QRB-spaces. The first three coincidences were discovered independently by Lawson and~Xi. The equivalence with sober QFS-spaces is then applied to give a novel, direct proof that the probabilistic powerdomain of a QRB-domain is a QRB-domain. This improves upon a previous, similar result, which was limited to pointed, second-countable QRB-domains.} }

@article{jgl-jlap14, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Methods in Programming}, author = {Goubault{-}Larrecq, Jean}, title = {Full Abstraction for Non-Deterministic and Probabilistic Extensions of {PCF}~{I}: the~Angelic Cases}, volume = 84, number = 1, year = 2015, month = jan, pages = {155-184}, opteditor = {Berger, Ulrich}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/jgl-jlap14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/jgl-jlap14.pdf}, doi = {10.1016/j.jlamp.2014.09.003}, abstract = {We examine several extensions and variants of Plotkin's language~PCF, including non-deterministic and probabilistic choice constructs. For~each, we give an operational and a denotational semantics, and compare them. In each case, we show soundness and computational adequacy: the two semantics compute the same values at ground types. Beyond this, we establish full abstraction (the~observational preorder coincides with the denotational preorder) in a number of cases. In~the probabilistic cases, this requires the addition of so-called statistical termination testers to the language.} }

@inproceedings{GLS-pp14, year = 2014, volume = 8464, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Kashefi, Elham and Palamidessi, Catuscia and Rutten, Jan}, booktitle = {Horizons of the Mind. A~Tribute to Prakash Panangaden}, author = {Goubault{-}Larrecq, Jean and Segala, Roberto}, title = {Random Measurable Selections}, pages = {343-362}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pp14.pdf}, doi = {10.1007/978-3-319-06880-0_18}, abstract = {We make the first steps towards showing a general {"}randomness for free{"} theorem for stochastic automata. The goal of such theorems is to replace randomized schedulers by averages of pure schedulers. Here, we explore the case of measurable multifunctions and their measurable selections. This involves constructing probability measures on the measurable space of measurable selections of a given measurable multifunction, which seems to be a fairly novel problem. We then extend this to the case of IT automata, namely, non-deterministic (infinite) automata with a history-dependent transition relation. Throughout, we strive to make our assumptions minimal.} }

@article{GL-acs13, publisher = {Springer}, journal = {Applied Categorical Structures}, author = {Goubault{-}Larrecq, Jean}, title = {Exponentiable streams and prestreams}, volume = {22}, number = {3}, year = 2014, month = jun, pages = {515-549}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf}, doi = { 10.1007/s10485-013-9315-x}, note = {Errata 1: \url{http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf}; Errata 2: \url{http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum2.pdf}}, abstract = {Inspired by a construction of Escard{\'o}, Lawson, and Simpson, we give a general construction of \(\mathcal C\)-generated objects in a topological construct. When \(\mathcal C\) consists of exponentiable objects, the resulting category is Cartesian-closed. This generalizes the familiar construction of compactly-generated spaces, and we apply this to Krishnan's categories of streams and prestreams, as well as to Haucourt streams. For that, we need to identify the exponentiable objects in these categories: for prestreams, we show that these are the preordered core-compact topological spaces, and for streams, these are the core-compact streams.} }

@article{GL-mscs13, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {A~short proof of the {S}chr{\"o}der-{S}impson theorem}, volume = 25, number = 1, year = 2015, month = jan, pages = {1-5}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-mscs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-mscs13.pdf}, doi = {10.1017/S0960129513000467}, abstract = {We give a short and elementary proof of the Schr{\"o}der-Simpson Theorem, which states that the space of all continuous maps from a given space~\(X\) to the non-negative reals with their Scott topology is the cone-theoretic dual of the probabilistic powerdomain on~\(X\).} }

@inproceedings{DGGL-icalp15, address = {Kyoto, Japan}, month = jul, year = 2015, volume = {9135}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Halld{\'o}rsson, Magnus M. and Iwama, Kazuo and Kobayashi, Naoki and Speckmann, Bettina}, acronym = {{ICALP}'15}, booktitle = {{P}roceedings of the 42nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'15)~-- {P}art~{II}}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {Natural Homology}, pages = {171-183}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-icalp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-icalp15.pdf}, doi = {10.1007/978-3-662-47666-6_14}, abstract = {We propose a notion of homology for directed algebraic topology, based on so-called natural systems of abelian groups, and which we call natural homology. Contrarily to previous proposals, and as we show, natural homology has many desirable properties: it~is invariant under isomorphisms of directed spaces, it is invariant under refinement (subdivision), and it is computable on cubical complexes.} }

@article{AFG-sif15, publisher = {SIF}, journal = {1024~-- Bulletin de la soci{\'e}t{\'e} informatique de France}, author = {Abiteboul, Serge and Fribourg, Laurent and Goubault{-}Larrecq, Jean}, title = {{G}{\'e}rard {B}erry~: un~informaticien m{\'e}daille d'or du {CNRS}~2014}, volume = 4, pages = {139-142}, month = oct, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFG-sif15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFG-sif15.pdf}, abstract = {C'est un chercheur en informatique qui vient de recevoir la m{\'e}daille d'or du CNRS, la plus haute distinction scientifique fran{\c c}aise toutes disciplines confondues. Les informaticiens sont rares {\`a} avoir {\'e}t{\'e} ainsi honor{\'e}s : ce n'est que la seconde fois apr{\`e}s Jacques Stern en~2006.} }

@inproceedings{GLO-fps13, address = {La Rochelle, France}, month = oct, year = 2013, volume = 8352, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Danger, Jean-Luc and Debbabi, Mourad and Marion, Jean-Yves and Garcia{-}Alfaro, Joaquin and Zincir{-}Heywood,Nur}, acronym = {{FPS}'13}, booktitle = {{R}evised {S}elected {P}apers of the 6th {I}nternational {S}ymposium on {F}oundations and {P}ractice of {S}ecurity ({FPS}'13)}, author = {Goubault{-}Larrecq, Jean and Olivain, Julien}, title = {On~the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.}, pages = {3-16}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLO-fps13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLO-fps13.pdf}, doi = {10.1007/978-3-319-05302-8_1}, abstract = {NetEntropy is a plugin to the Orchids intrusion detection tool that is originally meant to detect some subtle attacks on implementations of cryptographic protocols such as {SSL\slash TLS}. NetEntropy compares the sample entropy of a data stream to a known profile, and flags any significant variation. Our point is to stress the \emph{mathematics} behind NetEntropy: the reason of the rather incredible precision of NetEntropy is to be found in theorems due to Paninski and Moddemeijer.} }

@article{GLSSW-dagrep16, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, journal = {Dagstuhl Reports}, author = {Goubault{-}Larrecq, Jean and Seisenberger, Monika and Selivanov, Victor and Weiermann, Andreas}, title = {Well {Q}uasi-{O}rders in {C}omputer {S}cience ({D}agstuhl {S}eminar 16031)}, year = 2016, month = jan, volume = {6}, number = {1}, pages = {69-98}, url = {http://dx.doi.org/10.4230/DagRep.6.1.69}, pdf = {http://dx.doi.org/10.4230/DagRep.6.1.69}, doi = {10.4230/DagRep.6.1.69}, abstract = {This report documents the program and the outcomes of Dagstuhl Seminar 16031 {"}Well Quasi{-}Orders in Computer Science{"}, the first seminar devoted to the multiple and deep interactions between the theory of Well quasi{-}orders (known as the Wqo{-}Theory) and several fields of Computer Science (Verification and Termination of Infinite-State Systems, Automata and Formal Languages, Term Rewriting and Proof Theory, topological complexity of computational problems on continuous functions). Wqo{-}Theory is a highly developed part of Combinatorics with ever-growing number of applications in Mathematics and Computer Science, and Well quasi-orders are going to become an important unifying concept of Theoretical Computer Science. In this seminar, we brought together several communities from Computer Science and Mathematics in order to facilitate the knowledge transfer between Mathematicians and Computer Scientists as well as between established and younger researchers and thus to push forward the interaction between Wqo{-}Theory and Computer Science.} }

@inproceedings{GLL-rv16, address = {Madrid, Spain}, volume = 10012, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Madrid, Spain}, acronym = {{RV}'16}, booktitle = {{P}roceedings of the 16th {C}onference on {R}untime {V}erification ({RV}'16)}, author = {Goubault{-}Larrecq, Jean and Lachance, Jean{-}Philippe}, title = {On the {C}omplexity of {M}onitoring {O}rchids {S}ignatures}, year = 2016, month = sep, pages = {169-164}, opturl = {http://link.springer.com/chapter/10.1007%2F978-3-319-46982-9_11}, optpdf = {http://link.springer.com/chapter/10.1007%2F978-3-319-46982-9_11}, doi = {10.1007/978-3-319-46982-9_11}, abstract = {Modern monitoring tools such as our intrusion detection tool Orchids work by firing new monitor instances dynamically. Given an Orchids signature (a.k.a. a rule, a specification), what is the complexity of checking that specification, that signature? In other words, let f(n) be the maximum number of monitor instances that can be fired on a sequence of n events: we design an algorithm that decides whether f(n) is asymptotically exponential or polynomial, and in the latter case returns an exponent d such that f(n)=Theta(n^d) . Ultimately, the problem reduces to the following mathematical question, which may have other uses in other domains: given a system of recurrence equations described using the operators + and max, and defining integer sequences u_n, what is the asymptotic behavior of u_n as n tends to infinity? We show that, under simple assumptions, u_n is either exponential or polynomial, and that this can be decided, and the exponent computed, using a simple modification of Tarjanâ€™s strongly connected components algorithm, in linear time.} }

@inproceedings{DGGL-csl16, address = {Marseille, France}, month = sep, year = 2016, volume = {62}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Regnier, Laurent and Talbot, Jean-Marc}, acronym = {{CSL}'16}, booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'16)}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {The Directed Homotopy Hypothesis}, pages = {9:1-9:16}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DBS-csl16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DBS-csl16.pdf}, doi = {10.4230/LIPIcs.CSL.2016.9}, abstract = {The homotopy hypothesis was originally stated by Grothendieck: topological spaces should be {"}equivalent{"} to (weak) infinite-groupoids, which give algebraic representatives of homotopy types. Much later, several authors developed geometrizations of computational models, e.g., for rewriting, distributed systems, (homotopy) type theory etc. But an essential feature in the work set up in concurrency theory, is that time should be considered irreversible, giving rise to the field of directed algebraic topology. Following the path proposed by Porter, we state here a directed homotopy hypothesis: Grandis' directed topological spaces should be {"}equivalent{"} to a weak form of topologically enriched categories, still very close to (infinite,1)-categories. We develop, as in ordinary algebraic topology, a directed homotopy equivalence and a weak equivalence, and show invariance of a form of directed homology.} }

@inproceedings{DGGL-concur16, address = {Qu{\'e}bec City, Canada}, month = aug, year = 2016, volume = {59}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha}, acronym = {{CONCUR}'16}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'16)}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {Bisimulations and unfolding in {{\(\mathcal{P}\)}}-accessible categorical models}, pages = {25:1-25:14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-concur16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-concur16.pdf}, doi = {10.4230/LIPIcs.CONCUR.2016.25}, abstract = {We propose a categorical framework for bisimulations and unfoldings that unifies the classical approach from Joyal \emph{et~al.} via open maps and unfoldings. This is based on a notion of categories accessible with respect to a subcategory of path shapes, i.e., for which one can define a nice notion of trees as glueings of paths. We show that transition systems and presheaf models are instances of our framework. We also prove that in our framework, several notions of bisimulation coincide, in particular an {"}operational~one{"} akin to the standard definition in transition systems. Also, our notion of accessibility is preserved by coreflections. This also leads us to a notion of unfolding that behaves well in the accessible case: it~is a right adjoint and is a universal covering, i.e., it is initial among the morphisms that have the unique lifting property with respect to path shapes. As an application, we prove that the universal covering of a groupoid, a standard construction in algebraic topology, is an unfolding, when the category of path shapes is well chosen.} }

@article{DGG-acs16, publisher = {Springer}, journal = {Applied Categorical Structures}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {Directed homology theories and {E}ilenberg-{S}teenrod axioms}, year = 2017, month = oct, volume = {25}, number = {5}, pages = {775-807}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGG-acs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGG-acs16.pdf}, doi = {doi:10.1007/s10485-016-9438-y}, abstract = {In this paper, we define and study a homology theory, that we call {"}natural homology{"}, which associates a natural system of abelian groups to every space in a large class of directed spaces and precubical sets. We show that this homology theory enjoys many important properties, as an invariant for directed homotopy. Among its properties, we show that subdivided precubical sets have the same homology type as the original ones ; similarly, the natural homology of a precubical set is of the same type as the natural homology of its geometric realization. By same type we mean equivalent up to some form of bisimulation, that we define using the notion of open map. Last but not least, natural homology, for the class of spaces we consider, exhibits very important properties such as Hurewicz theorems, and most of Eilenberg-Steenrod axioms, in particular the dimension, homotopy, additivity and exactness axioms. This last axiom is studied in a general framework of (generalized) exact sequences.} }

@inproceedings{GLS-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Goubault{-}Larrecq, Jean and Schmitz, Sylvain}, title = {Deciding Piecewise Testable Separability for Regular Tree Languages}, pages = {97:1-97:15}, url = {https://hal.inria.fr/hal-01276119/}, optpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.97}, abstract = {The piecewise testable separability problem asks, given two input languages, whether there exists a piecewise testable language that contains the first input language and is disjoint from the second. We prove a general characterisation of piecewise testable separability on languages in a well-quasi-order, in terms of ideals of the ordering. This subsumes the known characterisations in the case of finite words. In the case of finite ranked trees ordered by homeomorphic embedding, we show using effective representations for tree ideals that it entails the decidability of piecewise testable separability when the input languages are regular. A~final byproduct is a new proof of the decidability of whether an input regular language of ranked trees is piecewise testable, which was first shown in the unranked case by Boja{\'n}czyk, Segoufin, and Straubing (Log.~Meth. in Comput.~Sci.,~8(3:26), 2012).} }

@comment{{B-arxiv16, author = Bollig, Benedikt, affiliation = aff-LSVmexico, title = One-Counter Automata with Counter Visibility, institution = Computing Research Repository, number = 1602.05940, month = feb, nmonth = 2, year = 2016, type = RR, axeLSV = mexico, NOcontrat = "", url = http://arxiv.org/abs/1602.05940, PDF = "http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf", lsvdate-new = 20160222, lsvdate-upd = 20160222, lsvdate-pub = 20160222, lsv-category = "rapl", wwwpublic = "public and ccsb", note = 18~pages, abstract = "In a one-counter automaton (OCA), one can read a letter from some finite alphabet, increment and decrement the counter by one, or test it for zero. It is well-known that universality and language inclusion for OCAs are undecidable. We consider here OCAs with counter visibility: Whenever the automaton produces a letter, it outputs the current counter value along with~it. Hence, its language is now a set of words over an infinite alphabet. We show that universality and inclusion for that model are in PSPACE, thus no harder than the corresponding problems for finite automata, which can actually be considered as a special case. In fact, we show that OCAs with counter visibility are effectively determinizable and closed under all boolean operations. As~a~strict generalization, we subsequently extend our model by registers. The general nonemptiness problem being undecidable, we impose a bound on the number of register comparisons and show that the corresponding nonemptiness problem is NP-complete.", }}

@article{JGL-mscs16, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Isomorphism theorems between models of mixed choice}, volume = {27}, number = {6}, pages = {1032-1067}, month = sep, year = 2017, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mscs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mscs16.pdf}, doi = {10.1017/S0960129515000547}, abstract = {We relate the so-called powercone models of mixed non-deterministic and probabilistic choice proposed by Tix, Keimel, Plotkin, Mislove, Ouaknine, Worrell, Morgan, and McIver, to our own models of previsions. Under suitable topological assumptions, we show that they are isomorphic. We rely on Keimel's cone-theoretic variants of the classical Hahn-Banach separation theorems, using functional analytic methods, and on the Schr{\"o}der-Simpson Theorem.} }

@article{JGL-minimax17, publisher = {Heldermann Verlag}, journal = {Minimax Theory and its Applications}, author = {Goubault{-}Larrecq, Jean}, title = {A Non-{H}ausdorff Minimax Theorem}, volume = {3}, number = {1}, year = {2017}, pages = {73-80} }

@article{GLL-fmsd17, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Goubault{-}Larrecq, Jean and Lachance, Jean-Philippe}, title = {On the Complexity of Monitoring {O}rchids Signatures, and Recurrence Equations}, volume = {53}, number = {1}, year = {2018}, month = aug, pages = {6-32}, doi = {10.1007/s10703-017-0303-x}, url = {https://doi.org/10.1007/s10703-017-0303-x}, abstract = {Modern monitoring tools such as our intrusion detection tool Orchids work by firing new monitor instances dynamically. Given an Orchids signature (a.k.a. a rule, a specification), what is the complexity of checking that specification, that signature? In other words, let \(f(n)\) be the maximum number of monitor instances that can be fired on a sequence of \(n\) events: we design an algorithm that decides whether \(f(n)\) is asymptotically exponential or polynomial, and in the latter case returns an exponent \(d\) such that \(f(n)=\Theta(n^d)\). Ultimately, the problem reduces to the following mathematical question, which may have other uses in other domains: given a system of recurrence equations described using the operators \(+\) and \(\max\), and defining integer sequences \(u_n\), what is the asymptotic behavior of \(u_n\) as \(n\) tends to infinity? We show that, under simple assumptions, \(u_n\) is either exponential or polynomial, and that this can be decided, and the exponent computed, using a simple modification of Tarjan's strongly connected components algorithm, in linear time.}, note = {Special issue of RV'16} }

@article{GLN-lmcs17, journal = {Logical Methods in Computer Science}, author = {Goubault{-}Larrecq, Jean and Ng, Kok Min}, title = {A Few Notes on Formal Balls}, volume = {13}, number = {4}, year = {2017}, month = nov, pages = {1-34}, doi = {10.23638/LMCS-13(4:18)2017}, url = {https://lmcs.episciences.org/4100}, pdf = {https://lmcs.episciences.org/4100/pdf}, note = {Special Issue of the Domains XII Workshop} }

@inproceedings{BFG-fsttcs17, address = {Kanpur, India}, month = dec, year = 2017, volume = {93}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Satya Lokam and R. Ramanujam}, acronym = {{FSTTCS}'17}, booktitle = {{P}roceedings of the 37th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'17)}, author = {Michael Blondin and Alain Finkel and Jean Goubault{-}Larrecq}, title = {Forward Analysis for {WSTS}, {Part III}: {Karp-Miller} Trees}, pages = {16:1-16:15}, url = {https://hal.archives-ouvertes.fr/hal-01736704/}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/8403/pdf/LIPIcs-FSTTCS-2017-16.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2017.16}, abstract = {This paper is a sequel of ''Forward Analysis for WSTS, Part I: Completions'' [STACS 2009, LZI Intl. Proc. in Informatics 3, 433-444] and ''Forward Analysis for WSTS, Part II: Complete WSTS'' [Logical Methods in Computer Science 8(3), 2012]. In these two papers, we provided a framework to conduct forward reachability analyses of WSTS, using finite representations of downwards-closed sets. We further develop this framework to obtain a generic Karp-Miller algorithm for the new class of very-WSTS. This allows us to show that coverability sets of very-WSTS can be computed as their finite ideal decompositions. Under natural assumptions on positive sequences, we also show that LTL model checking for very-WSTS is decidable. The termination of our procedure rests on a new notion of acceleration levels, which we study. We characterize those domains that allow for only finitely many accelerations, based on ordinal ranks.} }

@misc{JGL:pls16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Encart dans l'article ''S'adapter {\`a} la cyberguerre'', de Karen Elazari, Pour La Science 459}, month = jan, title = {Les m{\'e}thodes formelles: l'autre arme de la cybers{\'e}curit{\'e}}, year = {2016}, pages = {50-55} }

@misc{JGL:stc16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk (plenary speaker), Summer Topology Conference, Leicester, UK}, month = aug, title = {A few things on Noetherian spaces}, year = {2016} }

@misc{JGL:gs16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Galway Symposium, Leicester, UK}, month = aug, title = {An introduction to asymmetric topology and domain theory: why, what, and how}, year = {2016} }

@misc{JGL:dom15, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Domains XII workshop, Cork, Ireland}, month = aug, title = {Formal balls}, year = {2015} }

@misc{JGL:lls14, author = {Goubault{-}Larrecq, Jean}, howpublished = {Matinale de l'innovation Logiciels Libres et S{\'e}curit{\'e}, Paris, France}, month = dec, title = {D{\'e}tection d'intrusions avec {OrchIDS}}, year = {2014} }

@misc{JGL:ccc14, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Continuity, Computability, Constructivity workshop (CCC), Ljubljana, Slovenia}, month = sep, title = {Noetherian spaces}, year = {2014} }

@misc{JGL:cps14, author = {Goubault{-}Larrecq, Jean}, howpublished = {CPS Summer School, Grenoble, France}, month = jul, title = {{OrchIDS}: on the value of rigor in intrusion detection}, year = {2014} }

@misc{JGL:stc13, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk (semi-plenary speaker), Summer Topology Conference, North Bay, Ontario, CA}, month = jul, title = {A few pearls in the theory of quasi-metric spaces}, year = {2013} }

@misc{JGL:dga13, author = {Goubault{-}Larrecq, Jean}, howpublished = {S{\'e}minaire DGA Innosciences. DGA, Bagneux}, month = jun, title = {{OrchIDS}, ou : de l'importance de la s{\'e}mantique}, year = {2013} }

@misc{JGL:at13, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Workshop on Asymmetric Topology, Summer Topology Conference, North Bay, Ontario, CA}, month = jul, title = {A short proof of the {Schr{\"o}der-Simpson} theorem}, year = {2013} }

@misc{JGL:dm16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Dale Miller Festschrift, Paris Diderot University, Paris}, month = dec, title = {A semantics for {{\(\nabla\)}}}, year = {2016} }

@misc{GSHM:dga-inria16, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Hulin-Hubard, Francis and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Rapport final et fourniture 4 du contrat DGA-INRIA Orchids}, month = may, title = {Etat final des travaux engag{\'e}s sur {Orchids}}, year = {2016} }

@misc{GM:dga-inria16, author = {Goubault-Larrecq, Jean and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Fourniture 3 du contrat DGA-INRIA Orchids}, month = may, title = {G{\'e}n{\'e}ration de signatures pour le suivi de flux d'informations}, year = {2016} }

@misc{GSM:dga-inria15, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Rapport interm{\'e}diaire du contrat DGA-INRIA Orchids}, month = may, title = {Etat d'avancement interm{\'e}diaire des travaux engag{\'e}s sur {OrchIDS}}, year = {2015} }

@misc{GSM:dga-inria-2-14, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Fourniture 2 du contrat DGA-INRIA Orchids}, month = may, title = {Techniques et m{\'e}thodes de g{\'e}n{\'e}ration de signatures pour la d{\'e}tection d'intrusions}, year = {2014} }

@misc{GSM:dga-inria-1-14, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Fourniture 1 du contrat DGA-INRIA Orchids}, month = may, title = {Politiques de s{\'e}curit{\'e} syst{\`e}me}, year = {2014} }

@misc{AG:anr-cpp12, author = {Adj{\'e}, Assal{\'e} and Goubault-Larrecq, Jean}, howpublished = {Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities), WP 2, version 1}, month = oct, title = {Concrete semantics of programs with non-deterministic and random inputs}, year = {2012}, url = {http://arxiv.org/abs/1210.2605} }

@misc{GL:ARC-ProNoBis-16, author = {Goubault-Larrecq, Jean}, howpublished = {Rapport final ARC ProNoBis}, month = oct, title = {{Pronobis: Probability and nondeterminism, bisimulations and security}}, year = {2007} }

@article{JGL-mscs18, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {A semantics for nabla}, volume = {29}, pages = {1250--1274}, year = {2019}, doi = {10.1017/S0960129518000063}, url = {https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science/article/semantics-for-nabla/A3337AB54DC58CBDDEC78116F4390777} }

@article{JGL-tp19, publisher = {Auburn University}, journal = {Topology Proceedings}, author = {Goubault-Larrecq, Jean}, title = {{Spaces with no Infinite Discrete Subspace}}, volume = {53}, year = {2019}, pages = {27--36}, abstract = {We show that the spaces with no infinite discrete subspace are exactly those in which every closed set is a finite union of irreducibles. Call them FAC spaces: this generalizes a theorem by Erdos and Tarski (1943), according to which a preordered set has no infinite antichain---the finite antichain, or FAC, property---if and only if all its downwards-closed subsets are finite unions of ideals. All Noetherian spaces are FAC spaces, and we show that sober FAC spaces have a simple order-theoretic description.}, note = {\url{http://topology.auburn.edu/tp/reprints/v53/tp53003p1.pdf}} }

@article{HGJX-lmcs18, journal = {Logical Methods in Computer Science}, author = {Ho, Weng Kin and Goubault-Larrecq, Jean and Jung, Achim and Xi, Xiaoyong}, title = {{The Ho-Zhao Problem}}, volume = {14}, number = {1}, year = {2018}, month = jan, pages = {1-19}, doi = {10.23638/LMCS-14(1:7)2018}, url = {https://lmcs.episciences.org/4218}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HGJX-lmcs18.pdf} }

@inproceedings{JGL-lncs11760, volume = 11760, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {M{\'a}rio S. Alvim and Kostas Chatzikokolakis and Carlos Olarte and Franck Valencia}, acronym = {{The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy}}, booktitle = {The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy---Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday}, author = {Goubault{-}Larrecq, Jean}, title = {Fooling the Parallel or Tester with Probability $8/27$}, pages = {313--328}, year = 2019, note = {Updated version on arXiv:1903.12653}, url = {https://arxiv.org/abs/1903.12653}, abstract = {It is well-known that the higher-order language PCF is not fully abstract: there is a program - the so-called parallel or tester, meant to test whether its input behaves as a parallel or - which never terminates on any input, operationally, but is denotationally non-trivial. We explore a probabilistic variant of PCF, and ask whether the parallel or tester exhibits a similar behavior there. The answer is no: operationally, one can feed the parallel or tester an input that will fool it into thinking it is a parallel or. We show that the largest probability of success of such would-be parallel ors is exactly 8/27. The bound is reached by a very simple probabilistic program. The difficult part is to show that that bound cannot be exceeded.} }

@inproceedings{DGJL-isdt19, address = {Yangzhou, China}, month = jun, volume = 345, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jung, Achim and Li, Qingguo and Xu, Luoshan and Zhang, Guo-Qiang}, acronym = {{ISDT}'19}, booktitle = {{P}roceedings of the {I}nternational {S}ymposium on {D}omain {T}heory ({ISDT}'19)}, author = {de Brecht, Matthew and Goubault{-}Larrecq, Jean and Jia, Xiaodong and Lyu, Zhenchao}, title = {Domain-complete and LCS-complete Spaces}, pages = {3-35}, doi = {10.1016/j.entcs.2019.07.014}, year = 2019 }

@inproceedings{GJ-isdt19, address = {Yangzhou, China}, month = jun, volume = 345, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jung, Achim and Li, Qingguo and Xu, Luoshan and Zhang, Guo-Qiang}, acronym = {{ISDT}'19}, booktitle = {{P}roceedings of the {I}nternational {S}ymposium on {D}omain {T}heory ({ISDT}'19)}, author = {Goubault{-}Larrecq, Jean and Jia, Xiaodong}, title = {Algebras of the Extended Probabilistic Powerdomain Monad}, pages = {37-61}, doi = {10.1016/j.entcs.2019.07.015}, year = 2019 }

@article{GM-hjm20, publisher = {University of Houston}, journal = {Houston Journal of Mathematics}, author = {Goubault{-}Larrecq, Jean and Mynard, Fr{\'e}d{\'e}ric}, title = {Convergence without Points}, volume = {46}, number = {1}, pages = {227-282}, year = 2020, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GM-hjm20.pdf} }

@article{JGL-topa19, publisher = {Elsevier Science Publishers}, journal = {Topology and its Applications}, author = {Goubault{-}Larrecq, Jean}, title = {Formal Ball Monads}, volume = {263}, pages = {372--391}, year = 2019, doi = {10.1016/j.topol.2019.06.044}, url = {http://www.sciencedirect.com/science/article/pii/S0166864119302160}, abstract = {The formal ball construction B is a central tool of quasi-metric space theory. We show that it induces monads on certain natural categories of quasi-metric spaces, with 1-Lipschitz maps as morphisms, or with 1-Lipschitz continuous maps as morphisms. Those are left Kock-Zöberlein monads, and that allows us to characterize their algebras exactly. As an application, we study so-called Lipschitz regular spaces, a natural class of spaces that contain all standard algebraic quasi-metric spaces with relatively compact balls, in particular all metric spaces whose closed balls are compact. There are other Lipschitz regular spaces, as we show, and notably all B-algebras. That includes all spaces of formal balls, with their d+-Scott topology. The value of Lipschitz regularity is that, for a Lipschitz regular standard quasi-metric space X,d, the space LX of lower semicontinuous maps from X to the extended non-negative reals, with the Scott topology, retracts onto each of the spaces L_alpha(X,d) of alpha-Lipschitz continuous maps, and that the subspace topology on the latter coincides with the Scott topology.} }

@inproceedings{JGL-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {Goubault{-}Larrecq, Jean}, title = {A Probabilistic and Non-Deterministic Call-by-Push-Value Language}, pages = {1-13}, year = 2019, doi = {10.1109/LICS.2019.8785809}, abstract = {There is no known way of giving a domain-theoretic semantics to higher-order probabilistic languages, in such a way that the involved domains are continuous or quasi-continuous. We argue that the problem naturally disappears for languages with two kinds of types, where one kind is interpreted in a Cartesian-closed category of continuous dcpos, and the other is interpreted in a category that is closed under the probabilistic powerdomain functor. Such a setting is provided by Paul B. Levy's call-by-push-value paradigm. Following this insight, we define a call-by-push-value language, with probabilistic choice sitting inside the value types, and where conversion from a value type to a computation type involves demonic non-determinism. We give both a domain-theoretic semantics and an operational semantics for the resulting language, and we show that they are sound and adequate. With the addition of statistical termination testers and parallel if, we show that the language is even fully abstract-and those two primitives are required for that.} }

@article{FG-mscs20, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {{Forward analysis for WSTS, part I: completions}}, volume = {30}, number = {7}, pages = {752-832}, doi = {10.1017/S0960129520000195}, year = {2020}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FG-mscs2020.pdf}, url = {http://dx.doi.org/10.1017/S0960129520000195} }

@article{BFG-lmcs20, journal = {Logical Methods in Computer Science}, author = {Michael Blondin and Alain Finkel and Jean Goubault{-}Larrecq}, title = {{Forward Analysis for WSTS, Part {III:} Karp-Miller Trees}}, volume = {16}, number = {2}, doi = {10.23638/LMCS-16(2:13)2020}, year = {2020}, url = {https://lmcs.episciences.org/6591} }

@article{JGL-topa2020, publisher = {Elsevier Science Publishers}, journal = {Topology and its Applications}, author = {Goubault{-}Larrecq, Jean}, title = {{Some Topological Properties of Spaces of Lipschitz Continuous Maps on Quasi-Metric Spaces}}, volume = {282}, year = 2020, doi = {10.1016/j.topol.2020.107281}, url = {https://doi.org/10.1016/j.topol.2020.107281} }

@incollection{GHKNS-til2020, volume = 53, series = {Trends In Logic}, publisher = {Springer}, booktitle = {Well-Quasi Orders in Computation, Logic, Language and Reasoning}, editor = {Schuster, Peter M. and Seisenberger, Monika and Weiermann, Andreas}, author = {Jean Goubault{-}Larrecq and Simon Halfon and P. Karandikar and K. {Narayan Kumar} and {\relax Ph}ilippe Schnoebelen}, title = {The Ideal Approach to Computing Closed Subsets in Well-Quasi-Orderings}, pages = {55-105}, year = 2020, doi = {10.1007/978-3-030-30229-0_3} }

@article{JGL-tp2020, publisher = {Auburn University}, journal = {Topology Proceedings}, author = {Goubault{-}Larrecq, Jean}, title = {$\Pi^0_2$ Subsets of Domain-Complete Spaces and Countably Correlated Spaces}, volume = {58}, pages = {13-22}, year = 2020, note = {E-published on March 24, 2020.}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-tp2020.pdf} }

*This file was generated by
bibtex2html 1.98.*