@article{BKM-cc14,
  publisher = {Birkh{\"a}user},
  journal = {Computational Complexity},
  author = {Blondin, Michael and Krebs, Andreas and McKenzie, Pierre},
  title = {The Complexity of Intersecting Finite Automata Having Few
                  Final States},
  volume = {25},
  number = {4},
  pages = {775-814},
  month = dec,
  year = 2016,
  note = {To appear},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-cc14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-cc14.pdf},
  doi = {10.1007/s00037-014-0089-9},
  abstract = {The problem of determining whether several finite automata
     accept a word in common is closely related to the well-studied membership
     problem in transformation monoids. We raise the issue of limiting the
     number of final states in the automata intersection problem. For automata
     with two final states, we show the problem to be \(\oplus{L}\)-complete
     or NP-complete according to whether a nontrivial monoid other than a
     direct product of cyclic groups of order~2 is allowed in the automata. We
     further consider idempotent commutative automata and (Abelian, mainly)
     group automata with one, two, or three final states over a singleton or
     larger alphabet, elucidating (under the usual hypotheses on complexity
     classes) the complexity of the intersection nonemptiness and related
     problems in each case.}
}
@article{PHL-sttt14,
  publisher = {Springer},
  journal = {International Journal on Software Tools 
             for Technology Transfer},
  author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and
                  Longuet, Delphine},
  title = {Model-based Testing for Concurrent Systems: Unfolding-based Test Selection},
  volume = {18},
  number = 3,
  year = {2016},
  month = jun,
  pages = {305-318},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-sttt14.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-sttt14.pdf},
  doi = {10.1007/s10009-014-0353-y},
  abstract = {Model-based testing has mainly focused on models where
    concurrency is interpreted as interleaving (like the ioco theory for
    labeled transition systems), which may be too coarse when one wants
    concurrency to be preserved in the implementation. In order to test such
    concurrent systems, we choose to use Petri nets as specifications and
    define a concurrent conformance relation named co-ioco. We present a test
    generation algorithm based on Petri net unfolding able to build a complete
    test suite w.r.t our co-ioco conformance relation. In addition we propose
    several coverage criteria that allow to select finite prefixes of an
    unfolding in order to build manageable test suites.}
}
@article{haar-mvlsc15,
  publisher = {Old City Publishing},
  journal = {Journal of Multiple-Valued Logic and Soft Computing},
  author = {Haar, Stefan},
  title = {Cyclic Ordering through Partial Orders},
  volume = {27},
  number = {2-3},
  year = 2016,
  month = sep,
  pages = {209-228},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-mvlsc16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-mvlsc16.pdf},
  abstract = {The orientation problem for ternary cyclic order relations has
    been attacked in the literature from combinatorial perspectives, through
    rotations, and by connection with Petri nets. We propose here a two-fold
    characterization of orientable cyclic orders in terms of symmetries of
    partial orders as well as in terms of separating sets (cuts). The results
    are inspired by properties of non-sequential discrete processeses, but
    also apply to dense structures of any cardinality.}
}
@article{KNS-tcs2015,
  publisher = {Elsevier Science Publishers},
  journal = {Theoretical Computer Science},
  author = {Karandikar, Prateek and Niewerth, Matthias and Schnoebelen,
                  {\relax Ph}ilippe},
  title = {On the state complexity of closures and interiors of regular
                  languages with subwords and superwords},
  volume = {610},
  number = {A},
  pages = { 91-107},
  year = {2016},
  month = jan,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/KNS-tcs15.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KNS-tcs15.pdf},
  doi = {10.1016/j.tcs.2015.09.028},
  abstract = {The downward and upward closures of a regular language~\(L\) are
    obtained by collecting all the subwords and superwords of its elements,
    respectively. The downward and upward interiors of~\(L\) are obtained dually
    by collecting words having all their subwords and superwords in~\(L\),
    respectively.\par
    We provide lower and upper bounds on the size of the smallest automata
    recognizing these closures and interiors. We also consider the
    computational complexity of decision problems for closures of regular
    languages.}
}
@article{BHJL-fi15,
  publisher = {{IOS} Press},
  journal = {Fundamenta Informaticae},
  author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Jovanovi{\'c},
                  Aleksandra and Lime, Didier},
  title = {Interrupt Timed Automata with Auxiliary Clocks and Parameters},
  volume = {143},
  number = {3-4},
  pages = {235-259},
  month = mar,
  year = 2016,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHJL-fi15.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHJL-fi15.pdf},
  doi = {10.3233/FI-2016-1313},
  abstract = {Interrupt Timed Automata (ITA) are an expressive timed model,
    introduced to take into account interruptions according to levels. Due to
    this feature, this formalism is incomparable with Timed Automata.\par
    However several decidability results related to reachability and model
    checking have been obtained. We add auxiliary clocks to ITA, thereby
    extending its expressive power while preserving decidability of
    reachability. Moreover, we define a parametrized version of ITA, with
    polynomials of parameters appearing in guards and updates. While
    parametric reasoning is particularly relevant for timed models, it very
    often leads to undecidability results. We prove that various reachability
    problems, including robust reachability, are decidable for this model, and
    we give complexity upper bounds for a fixed or variable number of clocks,
    levels and parameters.}
}
@article{BGM-ipl15,
  publisher = {Elsevier Science Publishers},
  journal = {Information Processing Letters},
  author = {Bouyer, Patricia and Gardy, Patrick and Markey, Nicolas},
  title = {On~the semantics of Strategy Logic},
  volume = {116},
  number = {2},
  pages = {75-79},
  month = feb,
  year = {2016},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-ipl15.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-ipl15.pdf},
  doi = {10.1016/j.ipl.2015.10.004},
  abstract = {We define and study a slight variation on the semantics of
    Strategy Logic: while in the classical semantics, all strategies are
    shifted during the evaluation of temporal modalities, we propose to only
    shift the strategies that have been assigned to a player, thus matching
    the intuition that we can assign the very same strategy to the players at
    different points in time. We prove that surprisingly, this renders the
    model-checking problem undecidable.}
}
@article{HK-ipl15,
  publisher = {Elsevier Science Publishers},
  journal = {Information Processing Letters},
  author = {Haase, Christoph and Kiefer, Stefan},
  title = {The Complexity of the \(K\)th Largest Subset Problem and Related Problems},
  volume = {116},
  number = {2},
  pages = {111-115},
  month = feb,
  year = {2016},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HK-ipl15.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HK-ipl15.pdf},
  doi = {10.1016/j.ipl.2015.09.015},
  abstract = {We show that the \textsc{\(K\)th largest subset} problem and the
    \textsc{\(K\)th largest \(m\)-tuple} problem are in PP and hard for PP
    under polynomial-time Turing reductions. Several problems from the
    literature were previously shown NP-hard via reductions from those two
    problems, and by our main result they become PP-hard as well. We also
    provide complementary PP-upper bounds for some of them.}
}
@article{DD-jlc15,
  publisher = {Oxford University Press},
  journal = {Journal of Logic and Computation},
  author = {Demri, St{\'e}phane and Deters, Morgan},
  title = {Temporal Logics on Strings with Prefix Relation},
  year = 2016,
  volume = {26},
  number = {3},
  pages = {989-1017},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-jlc15-v2.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-jlc15-v2.pdf},
  doi = {10.1093/logcom/exv028},
  abstract = {We show that linear-time temporal logic over concrete domains
    made of finite strings and the prefix relation admits a PSpace-complete
    satisfiability problem. Actually, we extend a known result with the
    concrete domain made of the set of natural numbers and the greater than
    relation (corresponding to the singleton alphabet case) and we solve an
    open problem mentioned in several publications. Since the prefix relation
    is not a total ordering, it~is not possible to take advantage of existing
    techniques dedicated to temporal logics with concrete domains that are
    essentially linearly ordered structures. Instead, we introduce an adequate
    encoding of string constraints into length constraints that allows us to
    reduce the problem on strings to the problem on natural numbers. To~do~so,
    we~also propose an extended version of the logic on strings that is able
    to compare lengths of longest common prefixes and for which the
    satisfiability problem is shown in PSpace. Finally, we show how to lift
    the result for the branching-time case in order to get decidability when
    the underlying temporal logic is~CTL\textsuperscript*.}
}
@article{Schmitz-jsl15,
  publisher = {Association for Symbolic Logic},
  journal = {Journal of Symbolic Logic},
  author = {Schmitz, Sylvain},
  title = {Implicational Relevance Logic is \(2\)-{ExpTime}-Complete},
  volume = {81},
  number = {2},
  pages = {641-661},
  month = jun,
  year = 2016,
  url = {http://arxiv.org/abs/1402.0705},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-jsl15.pdf},
  doi = {10.1017/jsl.2015.7},
  abstract = {We show that provability in the implicational fragment of
    relevance logic is complete for doubly exponential time, using reductions
    to and from coverability in branching vector addition systems.}
}
@misc{qcover16,
  author = {Blondin, Michael and Finkel, Alain and Haase, Christoph and Haddad, Serge},
  title = {{QCover: an efficient coverability verifier for discrete and continuous Petri nets}},
  url = {https://github.com/blondimi/qcover},
  year = {2016}
}
@phdthesis{theissing-PhD16,
  author = {Theissing, Simon},
  title = {Supervision in Multi-Modal Transportation System},
  school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France},
  type = {Th{\`e}se de doctorat},
  year = {2016},
  month = dec,
  url = {https://tel.archives-ouvertes.fr/tel-01419126},
  pdf = {https://hal.inria.fr/tel-01419126v3/document}
}
@article{BCEZ-dmtcs2016,
  journal = {Discrete Mathematics \& Theoretical Computer Science},
  author = {Brough, Tara and Ciobanu, Laura and Elder, Murray and Zetzsche, Georg},
  title = {{Permutations of context-free, ET0L and indexed languages}},
  volume = {17},
  number = {3},
  year = {2016},
  month = may,
  pages = {167-178},
  url = {https://dmtcs.episciences.org/2164},
  pdf = {https://arxiv.org/pdf/1604.05431.pdf}
}
@inproceedings{DLV-pods16,
  acronym = {{PODS}'16},
  publisher = {ACM Press},
  month = jun,
  booktitle = {{P}roceedings of the 35th {ACM} {SIGMOD-SIGACT-SIGAI} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'16)},
  title = {{P}roceedings of the 35th {ACM} {SIGMOD-SIGACT-SIGAI} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'16)},
  address = {San Francisco, California, USA},
  abstract = {Data-driven workflows, of which IBM's Business
                  Artifacts are a prime exponent, have been
                  successfully deployed in practice, adopted in
                  industrial standards, and have spawned a rich body
                  of research in academia, focused primarily on static
                  analysis. The present work represents a significant
                  advance on the problem of artifact verification, by
                  considering a much richer and more realistic model
                  than in previous work, incorporating core elements
                  of IBM's successful Guard-Stage-Milestone model. In
                  particular, the model features task hierarchy,
                  concurrency, and richer artifact data. It also
                  allows database key and foreign key dependencies, as
                  well as arithmetic constraints. The results show
                  decidability of verification and establish its
                  complexity, making use of novel techniques including
                  a hierarchy of Vector Addition Systems and a variant
                  of quantifier elimination tailored to our context.},
  author = {Deutsch, Alin and Li, Yuliang and Vianu, Victor},
  pages = {179-194},
  doi = {10.1145/2902251.2902275},
  year = {2016}
}
@phdthesis{mvdb-phd2016,
  author = {Van{ }den{ }Bogaard, Marie},
  title = {Motifs de Flot d'Information dans les Jeux {\`a} Information Imparfaite},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = 2016,
  month = nov,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/mvdb-phd16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/mvdb-phd16.pdf}
}
@mastersthesis{m2-jacomme,
  author = {Jacomme, Charlie},
  title = {Automated applications of Cryptographic Assumptions},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2016},
  month = sep,
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-jacomme.pdf}
}
@mastersthesis{m2-lehaut,
  author = {Lehaut, Mathieu},
  title = {PDL on infinite alphabet},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2016},
  month = aug,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lehaut.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lehaut.pdf},
  note = {19~pages}
}
@article{DH-jlamp16,
  publisher = {Elsevier Science Publishers},
  journal = {Journal of Logic and Algebraic Methods in Programming},
  author = {Delaune, St{\'e}phanie and Hirschi, Lucca},
  title = {A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols},
  volume = {87},
  year = {2016},
  pages = {127-144},
  url = {http://www.sciencedirect.com/science/article/pii/S235222081630133X},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DH-jlamp16.pdf},
  doi = {10.1016/j.jlamp.2016.10.005},
  note = {To~appear},
  abstract = {Cryptographic protocols aim at securing communications over insecure networks such as the Internet, where dishonest users may listen to communications and interfere with them. A secure communication has a different meaning depending on the underlying application. It ranges from the confidentiality of a data to e.g. verifiability in electronic voting systems. Another example of a security notion is privacy. Formal symbolic models have proved their usefulness for analysing the security of protocols. Until quite recently, most results focused on trace properties like confidentiality or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require a notion of behavioural equivalence. Typical examples are anonymity, and privacy related properties. During the last decade, several results and verification tools have been developed to analyse equivalence-based security properties. We propose here a synthesis of decidability and undecidability results for equivalence-based security properties. Moreover, we give an overview of existing verification tools that may be used to verify equivalence-based security properties.}
}
@techreport{BGMS-arxiv16,
  author = {Beame, Paul and
              Grosshans, Nathan and
              McKenzie, Pierre and
              Segoufin, Luc},
  title = {Nondeterminism and an abstract formulation of {N}eciporuk's lower
               bound method},
  institution = {Computing Research Repository},
  number = {1608.01932},
  year = {2016},
  url = {http://arxiv.org/abs/1608.01932},
  pdf = {http://arxiv.org/abs/1608.01932},
  month = aug,
  type = {Research Report},
  note = {34~pages}
}
@inproceedings{MPAS-cikm16,
  address = {Indianapolis, Indiana, USA},
  month = oct,
  publisher = {ACM},
  acronym = {{CIKM}'16},
  booktitle = {{P}roceedings of the 25th {ACM} {I}nternational {C}onference on {I}nformation and {K}nowledge {M}anagement ({CIKM}'16)},
  author = {Montoya, David and 
                 Pellissier Tanon, Thomas and 
                 Abiteboul, Serge and 
                 Suchanek, Fabian},
  title = {{T}hymeflow, {A} {P}ersonal {K}nowledge {B}ase with {S}patio-temporal {D}ata},
  pages = {2477-2480},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MPAS-cikm16.pdf},
  year = {2016},
  doi = {10.1145/2983323.2983337},
  abstract = {The typical Internet user has data spread over several devices
and across several online systems. We demonstrate an
open-source system for integrating user's data from dierent
sources into a single Knowledge Base. Our system integrates
data of dierent kinds into a coherent whole, starting with
email messages, calendar, contacts, and location history. It
is able to detect event periods in the user's location data and
align them with calendar events. We will demonstrate how
to query the system within and across dierent dimensions,
and perform analytics over emails, events, and locations.}
}
@mastersthesis{m2-lick,
  author = {Lick, Anthony},
  title = {Syst{\`e}mes de preuves pour logiques modales},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2016},
  month = aug,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lick.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lick.pdf},
  note = {20~pages}
}
@phdthesis{blondin-phd2016,
  author = {Blondin, Michael},
  title = {Algorithmique et complexit{\'e} des syst{\`e}mes {\`a}
                  compteurs},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France and Universit{\'e} de Montr{\'e}al},
  type = {Th{\`e}se de doctorat},
  year = {2016},
  month = jun,
  url = {https://tel.archives-ouvertes.fr/tel-01359000/}
}
@phdthesis{mohamed-PhD16,
  author = {Mohamed, Sameh},
  title = {Une m{\'e}thode topologique pour la recherche d'ensembles invariants de syst{\`e}mes
continus et {\`a} commutation},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = {2016},
  month = oct,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/mohamed-phd16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/mohamed-phd16.pdf}
}
@phdthesis{C-phd2016,
  author = {Cauderlier, Rapha{\"e}l},
  title = {{Object-Oriented Mechanisms for Interoperability between Proof Systems}},
  school = {{Conservatoire National Des Arts et M{\'e}tiers, Paris}},
  type = {Th{\`e}se de doctorat},
  year = 2016,
  month = oct,
  url = {https://hal.inria.fr/tel-01415945/},
  pdf = {https://hal.inria.fr/tel-01415945/file/main.pdf}
}
@book{DGL-cup2016,
  author = {Demri, St{\'e}phane and Goranko, Valentin and Lange, Martin},
  title = {{T}emporal {L}ogics in {C}omputer {S}cience},
  publisher = {Cambridge University Press},
  series = {Cambridge Tracts in Theoretical Computer Science},
  volume = {58},
  year = {2016},
  month = oct,
  url = {http://www.cambridge.org/9781107028364},
  isbn = {9781107028364}
}
@inproceedings{HHKLL-syncop16,
  address = {Eindhoven, The Netherlands},
  month = apr,
  year = 2016,
  volume = 220,
  series = {Electronic Proceedings in Theoretical Computer Science},
  acronym = {{C}assting/{SYNCOP}'16},
  booktitle = {{P}roceedings of the {C}assting {W}orkshop on {G}ames for the {S}ynthesis of {C}omplex
              {S}ystems and 3rd {I}nternational {W}orkshop on {S}ynthesis of {C}omplex {P}arameters
  ({C}assting/{SYNCOP}'16)},
  author = {Hutagalung, Milka  and
                 Hundeshagen, Norbert and
                 Kuske, Dietrich and
                 Lange, Martin and
                 Lozes, {\'{E}}tienne},
  title = {Two-Buffer Simulation Games},
  pages = {213-227},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-syncop16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-syncop16.pdf},
  doi = {10.4204/EPTCS.220.3},
  abstract = {We consider simulation games played between Spoiler and Duplicator on two B{\"u}chi 
automata in which the choices made by Spoiler can be buffered by Duplicator in two different buffers 
before she executes them on her structure. Previous work on such games using a single buffer has 
shown that they are useful to approximate language inclusion problems. We study the decidability and 
complex- ity and show that games with two buffers can be used to approximate corresponding problems on 
finite transducers, i.e. the inclusion problem for rational relations over infinite words.}
}
@inproceedings{HHKLL-gandalf16,
  address = {Catania, Italy},
  month = sep,
  year = 2016,
  volume = {226},
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Cantone, Domenico and Delzanno, Giorgio},
  acronym = {{GandALF}'16},
  booktitle = {{P}roceedings of the 7th {I}nternational {S}ymposium
                on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification
                  ({GandALF}'16)},
  author = {Hutagalung, Milka  and
                 Hundeshagen, Norbert and
                 Kuske, Dietrich and
                 Lange, Martin and
                 Lozes, {\'{E}}tienne},
  title = {Multi-Buffer Simulations for Trace Language Inclusion},
  pages = {213-227},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-gandalf16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-gandalf16.pdf},
  doi = {10.4204/EPTCS.226.15},
  abstract = {We consider simulation games played between Spoiler and Duplicator on two B{\"u}chi automata in
which the choices made by Spoiler can be buffered by Duplicator in several buers before she executes
them on her structure. We show that the simulation games are useful to approximate the
inclusion of trace closures of languages accepted by finite-state automata, which is known to be undecidable.
We study the decidability and complexity and show that the game with bounded buffers
can be decided in polynomial time, whereas the game with one unbounded and one bounded buffer is
highly undecidable. We also show some sufficient conditions on the automata for Duplicator to win
the game (with unbounded buffers).}
}
@inproceedings{Halmagrand-ictac16,
  address = {Taipei, Taiwan},
  month = oct,
  volume = 9965,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Alves Sampaio, Cesar and Wang, Farn},
  acronym = {{ICTAC}'16},
  booktitle = {{P}roceedings of the 13th {I}nternational {C}olloquium on
	{T}heoretical {A}spects of {C}omputing ({ICTAC}'16)},
  author = {Halmagrand, Pierre},
  title = {{{Soundly Proving B Method Formulae Using Typed Sequent Calculus}}},
  pages = {196-213},
  year = {2016},
  doi = {10.1007/978-3-319-46750-4_12},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Halmagrand-ictac2016.pdf},
  url = {https://hal.archives-ouvertes.fr/hal-01342849},
  abstract = {The B Method is a formal method mainly used in the railway industry to specify and develop safety-critical software. 
To guarantee the consistency of a B project, one decisive challenge is to show correct a large amount of proof obligations, which are mathematical formulae 
expressed in a classical set theory extended with a specific type system. To improve automated theorem proving in the B Method, we propose to use a 
first-order sequent calculus extended with a polymorphic type system, which is in particular the output proof-format of the tableau-based automated 
theorem prover Zenon. After stating some modifications of the B syntax and defining a sound elimination of comprehension sets, we propose a 
translation of B formulae into a polymorphic first-order logic format. Then, we introduce the typed sequent calculus used by Zenon, and show 
that Zenon proofs can be translated to proofs of the initial B formulae in the B proof system.}
}
@techreport{PS-arxiv16,
  author = {Place, Thomas and
              Segoufin, Luc},
  title = {Decidable Characterization of FO2(<, +1) and locality of
              {DA}},
  institution = {Computing Research Repository},
  number = {1606.03217},
  year = {2016},
  url = {http://arxiv.org/abs/1606.03217},
  pdf = {http://arxiv.org/abs/1606.03217},
  month = jun,
  type = {Research Report},
  note = {8~pages}
}
@article{JSD-lmcs16,
  journal = {Logical Methods in Computer Science},
  author = {Jacquemard, Florent and
              Segoufin, Luc and
              Dimino, Jer{\'{e}}mie},
  title = {FO2(<, +1,{\textasciitilde}) on data trees, data tree automata
              and branching vector addition systems},
  volume = {12},
  number = {2},
  pages = {1-28},
  year = {2016},
  url = {http://www.lmcs-online.org/ojs/viewarticle.php?id=1789&layout=abstract},
  doi = {10.2168/LMCS-12(2:3)2016},
  pdf = {https://arxiv.org/pdf/1601.01579.pdf},
  abstract = {}
}
@techreport{arxiv16-BFMK,
  author = {Blondin, Michael and Finkel, Alain and McKenzie, Pierre},
  title = {Well Behaved Transition Systems},
  institution = {Computing Research Repository},
  number = {1608.02636},
  year = {2016},
  month = aug,
  type = {Research Report},
  url = {http://arxiv.org/abs/1608.02636},
  pdf = {http://arxiv.org/abs/1608.02636},
  note = {18~pages},
  abstract = {The well-quasi-ordering (i.e., a well-founded quasi-ordering such that all antichains are finite) that defines well-structured transition systems (WSTS) is shown not to be the weakest hypothesis that implies decidability of the coverability problem. We show coverability decidable for monotone transition systems that only require the absence of infinite antichains and call well behaved transitions systems (WBTS) the new strict superclass of the class of WSTS that arises. By contrast, we confirm that boundedness and termination are undecidable for WBTS under the usual hypotheses, and show that stronger monotonicity conditions can enforce decidability. Proofs are similar or even identical to existing proofs but the surprising message is that a hypothesis implicitely assumed minimal for twenty years in the theory of WSTS can meaningfully be relaxed, allowing more orderings to be handled in an abstract way.}
}
@inproceedings{vDCC-EMISA16,
  address = {Vienna, Austria},
  month = oct,
  publisher = {{CEUR-WS.org}},
  volume = {1701},
  series = {{CEUR} Workshop Proceedings},
  editor = {Rinderle-Ma, Stefanie and Mendling, Jan},
  acronym = {{EMISA}'16},
  booktitle = {{P}roceedings of the 7th {I}nt. {W}orkshop on {E}nterprise {M}odelling and {I}nformation {S}ystems {A}rchitectures
({EMISA}'16)},
  author = {van Dongen, Boudewijn and Carmona, Josep and Chatain, {\relax Th}omas},
  title = {{Alignment-based Quality Metrics in Conformance Checking}},
  pages = {87-90},
  year = {2016},
  doi = {},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/vanDongen-EMISA16.pdf},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/vanDongen-EMISA16.pdf},
  abstract = {The holy grail in process mining is a process discovery algorithm that, given an event
log, produces fitting, precise, properly generalizing and simple process models. Within the field of
process mining, conformance checking is considered to be anything where observed behaviour, e.g.,
in the form of event logs or event streams, needs to be related to already modelled behaviour.
In the conformance checking domain, the relation between an event log and a model is typically
quantified using fitness, precision and generalization. In this paper, we present metrics for fitness,
precision and generalization, based on alignments and the newer concept named anti-alignments.}
}
@article{GLSSW-dagrep16,
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  journal = {Dagstuhl Reports},
  author = {Goubault{-}Larrecq, Jean and Seisenberger, Monika and Selivanov, Victor and Weiermann, Andreas},
  title = {Well {Q}uasi-{O}rders in {C}omputer {S}cience ({D}agstuhl {S}eminar
16031)},
  year = 2016,
  month = jan,
  volume = {6},
  number = {1},
  pages = {69-98},
  url = {http://dx.doi.org/10.4230/DagRep.6.1.69},
  pdf = {http://dx.doi.org/10.4230/DagRep.6.1.69},
  doi = {10.4230/DagRep.6.1.69},
  abstract = {This report documents the program and the outcomes of Dagstuhl Seminar 16031 {"}Well Quasi{-}Orders in Computer 
Science{"}, the first seminar devoted to the multiple and deep interactions between the theory of Well quasi{-}orders 
(known as the Wqo{-}Theory) and several fields of Computer Science (Verification and Termination of Infinite-State Systems, 
Automata and Formal Languages, Term Rewriting and Proof Theory, topological complexity of computational problems on continuous 
functions). Wqo{-}Theory is a highly developed part of Combinatorics with ever-growing number of applications in Mathematics and 
Computer Science, and Well quasi-orders are going to become an important unifying concept of Theoretical Computer Science. 
In this seminar, we brought together several communities from Computer Science and Mathematics in order to facilitate the 
knowledge transfer between Mathematicians and Computer Scientists as well as between established and younger researchers and thus 
to push forward the interaction between Wqo{-}Theory and Computer Science.}
}
@inproceedings{MHP-HSB16,
  address = {Grenoble France},
  month = oct,
  optvolume = 9957,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  opteditor = {Cinquemani, Eugenio and
               Donz{\'{e}, Alexandre}},
  acronym = {{HSB}'16},
  booktitle = {{P}roceedings of the 5th
           {I}nternational {W}orkshop on 
           {H}ybrid {S}ystems {B}iology},
  author = {Mandon, Hugues and Haar, Stefan and Paulev{\'e}, Lo{\"i}c},
  title = {{Relationship between the Reprogramming Determinants of Boolean Networks and their Interaction Graph}},
  pages = {113-127},
  year = {2016},
  doi = {10.1007/978-3-319-47151-8_8},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MHP-HSB16.pdf},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/MHP-HSB16.pdf},
  abstract = {In this paper, we address the formal characterization of tar- gets triggering cellular trans-differentiation in the scope of Boolean net- works with asynchronous dynamics. Given two fixed points of a Boolean network, we are interested in all the combinations of mutations which allow to switch from one fixed point to the other, either possibly, or in- evitably. In the case of existential reachability, we prove that the set of nodes to (permanently) flip are only and necessarily in certain connected components of the interaction graph. In the case of inevitable reachabil- ity, we provide an algorithm to identify a subset of possible solutions.}
}
@inproceedings{GLL-rv16,
  address = {Madrid, Spain},
  volume = 10012,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Madrid, Spain},
  acronym = {{RV}'16},
  booktitle = {{P}roceedings of the 16th {C}onference on {R}untime {V}erification ({RV}'16)},
  author = {Goubault{-}Larrecq, Jean and Lachance,  Jean{-}Philippe},
  title = {On the {C}omplexity of {M}onitoring {O}rchids {S}ignatures},
  year = 2016,
  month = sep,
  pages = {169-164},
  opturl = {http://link.springer.com/chapter/10.1007%2F978-3-319-46982-9_11},
  optpdf = {http://link.springer.com/chapter/10.1007%2F978-3-319-46982-9_11},
  doi = {10.1007/978-3-319-46982-9_11},
  abstract = {Modern monitoring tools such as our intrusion detection tool Orchids work by firing new monitor instances dynamically. Given an Orchids signature (a.k.a. a rule, a specification), what is the complexity of checking that specification, that signature? In other words, let f(n) be the maximum number of monitor instances that can be fired on a sequence of n events: we design an algorithm that decides whether f(n) is asymptotically exponential or polynomial, and in the latter case returns an exponent d such that  f(n)=Theta(n^d) . Ultimately, the problem reduces to the following mathematical question, which may have other uses in other domains: given a system of recurrence equations described using the operators + and max, and defining integer sequences u_n, what is the asymptotic behavior of  u_n as n tends to infinity? We show that, under simple assumptions,  u_n  is either exponential or polynomial, and that this can be decided, and the exponent computed, using a simple modification of Tarjan’s strongly connected components algorithm, in linear time.}
}
@inproceedings{KSHP-sasb16,
  address = {Edinburgh, UK},
  month = sep,
  missingnumber = {2},
  missingvolume = {},
  series = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier Science Publishers},
  acronym = {{SASB}'16},
  booktitle = {{P}roceedings of {T}he {S}eventh {I}nternational {W}orkshop on {S}tatic {A}nalysis and {S}ystems {B}iology (SASB 2016)},
  title = {{Unfolding of Parametric Logical Regulatory Networks}},
  author = {Kolc{\'a}k, Juraj and {\v S}afr{\'a}nek, David and Haar, Stefan and Paulev{\'e}, Lo{\"i}c},
  year = {2016},
  note = {To appear},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KSHP-SASB16.pdf},
  url = {https://hal.archives-ouvertes.fr/hal-01354109},
  abstract = {In systems biology, models of cellular regulatory processes such as gene regulatory networks or signalling pathways are crucial to understanding the behaviour of living cells. Available biological data are however often insufficient for full model specification. In this paper, we focus on partially specified models where the missing information is abstracted in the form of parameters. We introduce a novel approach to analysis of parametric logical regulatory networks addressing both sources of combinatoric explosion native to the model. First, we introduce a new compact representation of admissible parameters using Boolean lattices. Then, we define the unfolding of parametric regulatory networks. The resulting structure provides a partial- order reduction of concurrent transitions, and factorises the common transitions among the concrete models. A comparison is performed against state-of-the-art approaches to parametric model analysis.}
}
@article{KGHPAJRHH-tpnomc2016,
  publisher = {Springer},
  journal = {Transactions on Petri Nets and Other Models of Concurrency},
  author = {Kordon, Fabrice  and
               Garavel, Hubert  and
               Hillah,  Lom{-}Messan and
               Paviot{-}Adet, Emmanuel and
               Jezequel, Lo{\"{\i}}g and
               Rodr{\'{\i}}guez, C{\'{e}}sar  and
               Hulin{-}Hubard, Francis },
  title = {{MCC}'2015 - {T}he {F}ifth {M}odel {C}hecking {C}ontest},
  volume = {11},
  pages = {262-273},
  year = {2016},
  url = {http://dx.doi.org/10.1007/978-3-662-53401-4_12},
  doi = {10.1007/978-3-662-53401-4_12},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KGHPAJRHH-tpnomc2016.pdf}
}
@article{ADFLP-fi2016,
  publisher = {{IOS} Press},
  journal = {Fundamenta Informaticae},
  author = {Abdulla, Parosh Aziz and Demri, St{\'e}phane and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Potapov, Igor},
  editor = {Abdulla, Parosh Aziz and Demri, St{\'e}phane and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Potapov, Igor},
  number = {3--4},
  title = {Selected papers of Reachability Problems Workshop 2012 (Bordeaux) and 2013 (Uppsala)},
  url = {http://content.iospress.com/journals/fundamenta-informaticae/143/3-4},
  volume = {143},
  year = {2016}
}
@proceedings{BDM-aiml16,
  title = {{P}roceedings of the 11th {C}onference on {A}dvances in {M}odal {L}ogic ({AiML}'16)},
  booktitle = {{P}roceedings of the 11th {C}onference on {A}dvances in {M}odal {L}ogic ({AiML}'16)},
  acronym = {{AiML}'16},
  editor = {Beklemishev, Lev  and Demri, St{\'e}phane and Mat{\'e}, Andr{\'a}s},
  publisher = {College Publications},
  year = 2016,
  month = sep,
  address = {Budapest, Hungary},
  url = {http://www.collegepublications.co.uk/aiml/?00008}
}
@inproceedings{Bollig-fsttcs16,
  address = {Chennai, India},
  month = dec,
  year = 2016,
  volume = {65},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {S. Akshay and Akash Lal and Saket Saurabh and Sandeep Sen},
  acronym = {{FSTTCS}'16},
  booktitle = {{P}roceedings of the 36th {C}onference on
               {F}oundations of {S}oftware {T}echnology and
               {T}heoretical {C}omputer {S}cience
               ({FSTTCS}'16)},
  author = {Bollig, Benedikt},
  title = {One-Counter Automata with Counter Observability},
  pages = {20:1-20:14},
  url = {http://drops.dagstuhl.de/opus/volltexte/2016/6855/},
  doi = {10.4230/LIPIcs.FSTTCS.2016.20},
  abstract = {In a one-counter automaton (OCA), one can produce a letter from some finite alphabet, increment and decrement the counter by one, or compare it with constants up to some threshold. It is well-known that universality and language inclusion for OCAs are undecidable. In this paper, we consider OCAs with counter observability: Whenever the automaton produces a letter, it outputs the current counter value along with it. Hence, its language is now a set of words over an infinite alphabet. We show that universality and inclusion for that model are PSPACE-complete, thus no harder than the corresponding problems for finite automata. In fact, by establishing a link with visibly one-counter automata, we show that OCAs with counter observability are effectively determinizable and closed under all boolean operations. Moreover, it turns out that they are expressively equivalent to strong automata, in which transitions are guarded by MSO formulas over the natural numbers with successor.}
}
@proceedings{FM-formats16,
  title = {{P}roceedings of the 14th {I}nternational {C}onference
           on {F}ormal {M}odelling and {A}nalysis of {T}imed
           {S}ystems ({FORMATS}'16)},
  booktitle = {{P}roceedings of the 14th {I}nternational {C}onference
           on {F}ormal {M}odelling and {A}nalysis of {T}imed
           {S}ystems ({FORMATS}'16)},
  acronym = {{FORMATS}'16},
  editor = {Fr{\"a}nzle, Martin and Markey, Nicolas},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {9884},
  doi = {10.1007/978-3-319-44878-7},
  url = {http://link.springer.com/book/10.1007/978-3-319-44878-7},
  year = 2016,
  month = aug,
  address = {Qu\'ebec City, Canada}
}
@proceedings{BDJMS-casstingsyncop16,
  title = {{P}roceedings of the {C}assting Workshop on
  	    {G}ames for the {S}ynthesis of {C}omplex {S}ystems ({C}assting'16)
	    and of the 3rd {I}nternational {W}orkshop on
	    {S}ynthesis of {C}omplex {P}arameters ({S}yn{C}o{P}'16)},
  booktitle = {{P}roceedings of the {C}assting Workshop on
  	    {G}ames for the {S}ynthesis of {C}omplex {S}ystems ({C}assting'16)
	    and of the 3rd {I}nternational {W}orkshop on
	    {S}ynthesis of {C}omplex {P}arameters ({S}yn{C}o{P}'16)},
  acronym = {{C}assting{{\slash}}{S}yn{C}o{P}'16},
  editor = {Brihaye, {\relax Th}omas and Delahaye, Beno{\^\i}t and Jezequel,
                  Lo{\"\i}g and Markey, Nicolas and Srba, Ji{\v{r}}{\'i}},
  doi = {10.4204/EPTCS.220},
  url = {http://eptcs.web.cse.unsw.edu.au/content.cgi?CASSTINGSynCoP2016},
  series = {Electronic Proceedings in Theoretical Computer Science},
  volume = 220,
  year = 2016,
  month = jul,
  address = {Eindhoven, The~Netherlands}
}
@inproceedings{BMS-gandalf16,
  address = {Catania, Italy},
  month = sep,
  year = 2016,
  volume = {226},
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Cantone, Domenico and Delzanno, Giorgio},
  acronym = {{GandALF}'16},
  booktitle = {{P}roceedings of the 7th {I}nternational {S}ymposium
                on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification
                  ({GandALF}'16)},
  author = {Bouyer, Patricia and Markey, Nicolas and Stan, Daniel},
  title = {Stochastic Equilibria under Imprecise Deviations in
                  Terminal-Reward Concurrent Games},
  pages = {61-75},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-gandalf16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-gandalf16.pdf},
  doi = {10.4204/EPTCS.226.5},
  abstract = {We study the existence of mixed-strategy equilibria in
    concurrent games played on graphs. While existence is guaranteed
    with safety objectives for each player, Nash equilibria need not
    exist when players are given arbitrary terminal-reward objectives,
    and their existence is undecidable with qualitative reachability
    objectives (and~only three players). However, these results rely on
    the fact that the players can enforce infinite plays while trying to
    improve their payoffs. In this paper, we introduce a relaxed notion
    of equilibria, where deviations are imprecise. We prove that
    contrary to Nash equilibria, such (stationary) equilibria always
    exist, and we develop a PSPACE algorithm to compute one.}
}
@inproceedings{Finkel-rp16,
  address = {Aalborg, Denmark},
  month = sep,
  year = 2016,
  volume = {9899},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}},
  acronym = {{RP}'16},
  booktitle = {{P}roceedings of the 10th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)},
  author = {Finkel, Alain},
  title = {The Ideal Theory for {WSTS}},
  pages = {1-22},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/Finkel-rp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Finkel-rp16.pdf},
  doi = {10.1007/978-3-319-45994-3_1},
  abstract = {We begin with a survey on well structured transition systems and, in particular, we present the ideal framework [FG09a, BFM14] which was recently used to obtain new deep results on Petri nets and extensions. We argue that the theory of ideals prompts a renewal of the theory of WSTS by providing a way to define a new class of monotonic systems, the so-called Well Behaved Transition Systems, which properly contains WSTS, and for which coverability is still decidable by a forward algorithm. We then recall the completion of WSTS which leads to defining a conceptual Karp-Miller procedure that terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets.}
}
@inproceedings{ABDL-rp16,
  address = {Aalborg, Denmark},
  month = sep,
  year = 2016,
  volume = {9899},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}},
  acronym = {{RP}'16},
  booktitle = {{P}roceedings of the 10th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)},
  author = {Alechina, Natasha and Bulling, Nils and Demri,
                  St{\'e}phane and Logan, Brian},
  title = {On the Complexity of Resource-Bounded Logics},
  pages = {36-50},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDL-rp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDL-rp16.pdf},
  doi = {10.1007/978-3-319-45994-3_3},
  abstract = {We revisit decidability results for resource-bounded
    logics and use decision problems on VASS to establish complexity
    characterisation of (decidable) model-checking problems. We show
    that the model-checking problem for the logic RB\(\pm\)ATL is
    2EXPTIME-complete by using recent results on alternating VASS.
    Moreover, we establish that the model-checking problem for RBTL is
    EXPSPACE-complete and that the problem is decidable and of the same
    complexity for RBTL\textsuperscript{*}, proving a new decidability
    result as a by-product of the approach. We establish that the
    model-checking problem for RB\(\pm\)ATL\textsuperscript{*}, the
    extension of RB\(\pm\)ATL with arbitrary path formulae is decidable
    by a reduction into parity games. We are also able to synthesise
    values for resource parameters. Hence, the paper establishes formal
    correspondences between model-checking problems and decision
    problems on alternating VASS, paving the way to more applications.}
}
@inproceedings{LFS-rp16,
  address = {Aalborg, Denmark},
  month = sep,
  year = 2016,
  volume = {9899},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}},
  acronym = {{RP}'16},
  booktitle = {{P}roceedings of the 10th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)},
  author = {Le{~}Co{\"e}nt, Adrien and Fribourg, Laurent and
                  Soulat, Romain},
  title = {Compositional analysis of Boolean networks using local fixed-point
                  iterations},
  pages = {134-147},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LFS-rp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LFS-rp16.pdf},
  doi = {10.1007/978-3-319-45994-3_10},
  abstract = {We present a compositional method which allows to
    over-approximate the set of attractors and under-approximate the set
    of basins of attraction of a Boolean network~(BN). This merely
    consists in replacing a global fixed-point computation by a
    composition of local fixed-point computations. Once these
    approximations have been computed, it~becomes much more tractable to
    generate the exact sets of attractors and basins of attraction. We
    illustrate the interest of our approach on several examples, among
    which is a BN modeling a railway interlocking system with 50 nodes
    and millions of attractors.}
}
@inproceedings{LFMDC-rp16,
  address = {Aalborg, Denmark},
  month = sep,
  year = 2016,
  volume = {9899},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}},
  acronym = {{RP}'16},
  booktitle = {{P}roceedings of the 10th {W}orkshop
           on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)},
  author = {Le{~}Co{\"e}nt, Adrien and Fribourg, Laurent and
                  Markey, Nicolas and De{~}Vuyst, Florian and Chamoin, Ludovic},
  title = {Distributed Synthesis of State-Dependent Switching Control},
  pages = {119-133},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LFMDC-rp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LFMDC-rp16.pdf},
  doi = {10.1007/978-3-319-45994-3_9},
  abstract = {We present a correct-by-design method of state-dependent
    control synthesis for linear discrete-time switching systems. Given
    an objective region~\(R\) of the state space, the method builds a
    capture set~\(S\) and a control which steers any element of~\(S\)
    into~\(R\). The method works by iterated backward reachability
    from~\(R\). More precisely, \(S\)~is given as a parametric extension
    of~\(R\), and the maximum value of the parameter is solved by linear
    programming. The method can also be used to synthesize a stability
    control which maintains indefinitely within~\(R\) all the states
    starting at~\(R\). We~explain how the synthesis method can be
    performed in a distributed manner. The method has been implemented
    and successfully applied to the synthesis of a distributed control
    of a concrete floor heating system with 11 rooms and \(2^11 = 2048\)
    switching modes.}
}
@inproceedings{HT-pasm16,
  address = {M{\"u}nster, Germany},
  month = apr,
  year = 2016,
  volume = {327},
  series = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier Science Publishers},
  editor = {Haverkort, Boudewijn and Knottenbelt, William and Remke, Anne and Thomas, Nigel},
  booktitle = {{P}roceedings of the 8th {I}nternational {W}orkshop on {P}ractical
                  {A}pplications of {S}tochastic {M}odelling ({PASM}'16)},
  author = {Haar, Stefan and Theissing, Simon},
  title = {Forecasting Passenger Loads in Transportation Networks},
  pages = {49-69},
  url = {https://hal.inria.fr/hal-01259585},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-pasm16.pdf},
  doi = {10.1016/j.entcs.2016.09.023},
  abstract = {This work is part of an ongoing effort to understand the
    dynamics of passenger loads in modern, multimodal transportation
    networks (TNs) and to mitigate the impact of perturbations. The
    challenge is that the percentage of passengers at any given point of
    the TN that have a certain destination, i.e. their distribution over
    different trip profiles, is unknown. We introduce a stochastic
    hybrid automaton model for multimodal TNs that allows to compute how
    such probabilistic load vectors are propagated through the TN, and
    develop a computation strategy for forecasting the network's load a
    certain time into the future.}
}
@misc{vip-D42,
  author = {Delaune, St{\'e}phanie and Gazeau, Ivan},
  howpublished = {Deliverable VIP~4.2 (ANR-11-JS02-0006)},
  month = jun,
  note = {5~pages},
  type = {Contract Report},
  title = {Combination issues},
  year = {2016},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d42.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d42.pdf}
}
@misc{vip-D22,
  author = {Delaune, St{\'e}phanie and Gazeau, Ivan},
  howpublished = {Deliverable VIP~2.2 (ANR-11-JS02-0006)},
  month = jun,
  note = {8~pages},
  type = {Contract Report},
  title = {Results on the case studies},
  year = {2016},
  url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d22.pdf},
  pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d22.pdf}
}
@techreport{HT-hal16,
  author = {Haar, Stefan and Theissing, Simon},
  title = {A~Passenger-centric Multi-agent System Model for
                  Multimodal Public Transportation},
  institution = {HAL-inria},
  number = {hal-01322956},
  month = may,
  year = {2016},
  type = {Research Report},
  url = {https://hal.inria.fr/hal-01322956},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-hal16.pdf},
  note = {12~pages},
  abstract = {If we want to understand how perturbations spread across a
    multi-modal public transportation system, we have to include
    passenger flows into the model and the analysis. Indeed, in general
    no two different lines in such a system are physically connected
    directly, or share tracks or other resources. Rather, they are
    connected by passengers changing lines and thus transmit
    perturbations from one line or mode to another. We present a formal
    passenger-centric multi-agent system model that can capture
    (i)~individual and possibly multi-modal trip profiles with branches
    resulting from different decision outcomes, (ii)~the~movement of
    fixed-route operated transportation means, and (iii)~in-vehicle and
    in-station capacity constraints. The model is based on a
    nets-within-nets approach with Petri nets as the basic building
    entities. Thus, it has a convenient graphical representation, and
    the possibility of execution.}
}
@inproceedings{HT-qest16,
  address = {Qu{\'e}bec City, Canada},
  month = aug,
  year = 2016,
  volume = {9826},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Agha, Gul and Van{~}Houdt, Benny},
  acronym = {{QEST}'16},
  booktitle = {{P}roceedings of the 13th {I}nternational
               {C}onference on {Q}uantitative 
               {E}valuation of {S}ystems
               ({QEST}'16)},
  author = {Haar, Stefan and Theissing, Simon},
  title = {Decoupling Passenger Flows for Improved Load Prediction},
  pages = {364-379},
  url = {https://hal.inria.fr/hal-01330136},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-qest16.pdf},
  doi = {10.1007/978-3-319-43425-4_24},
  abstract = {This paper continues our work on perturbation analysis of
    multimodal transportation networks~(TNs) by means of a stochastic
    hybrid automaton~(SHA) model. We focus here on the approximate
    computation , in particular on the major bottleneck consisting in
    the high dimensionality of systems of stochastic differential
    balance equations (SDEs) that define the continuous passenger-flow
    dynamics in the different modes of the SHA model. In fact, for every
    pair of a mode and a station, one system of coupled SDEs relates the
    passenger loads of all discrete points such as platforms considered
    in this station, and all vehicles docked to it, to the passenger
    flows in between. In general, such an SDE system has many
    dimensions, which makes its numerical computation and thus the
    approximate computation of the SHA model intractable. We show how
    these systems can be canonically replaced by lower-dimensional ones,
    by decoupling the passenger flows inside every mode from one
    another. We prove that the resulting approximating passenger-flow
    dynamics converges to the original one, if the replacing set of
    balance equations set up for all decoupled passenger flows
    communicate their results among each other in vanishing time
    intervals.}
}
@inproceedings{HT-acc16,
  address = {Boston, Massachusetts, USA},
  month = jul,
  year = 2016,
  publisher = {{IEEE} Control System Society},
  acronym = {{ACC}'16},
  booktitle = {{P}roceedings of the 35th {A}merican {C}ontrol 
	       {C}onference ({ACC}'16)},
  author = {Haar, Stefan and Theissing, Simon},
  title = {Predicting Traffic Load in Public Transportation Networks},
  pages = {821-826},
  url = {https://hal.inria.fr/hal-01329632},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-acc16.pdf},
  doi = {10.1109/ACC.2016.7525015},
  abstract = {This work is part of an ongoing effort to understand the
    dynamics of passenger loads in modern, multimodal transportation
    networks (TNs) and to mitigate the impact of perturbations, under
    the restrictions that the precise number of passengers in some point
    of the TN that intend to reach a certain destination (i.e. their
    distribution over different trip profiles) is unknown. We introduce
    an approach based on a stochastic hybrid automaton model for a TN
    that allows to compute how such probabilistic load vectors are
    propagated through the TN, and develop a computation strategy for
    forecasting the network's load a certain time in the future.}
}
@inproceedings{FHLM-wodes16,
  address = {Xi'an, China},
  month = may # {-} # jun,
  year = 2016,
  publisher = {{IEEE} Control System Society},
  editor = {Cassandras, Christos G. and Giua, Alessandro},
  acronym = {{WODES}'16},
  booktitle = {{P}roceedings of the 13th {W}orkshop on {D}iscrete {E}vent {S}ystems
	   ({WODES}'16)},
  author = {Fabre, {\'E}ric and H{\'e}lou{\"e}t, Lo{\"i}c and
                  Lefaucheux, Engel and Marchand, Herv{\'e}},
  title = {Diagnosability of Repairable Faults},
  pages = {230-236},
  url = {https://hal.inria.fr/hal-01302562},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FHLM-wodes16.pdf},
  doi = {10.1109/WODES.2016.7497853},
  abstract = {The diagnosis problem for discrete event systems consists
    in deciding whether some fault event occurred or not in the system,
    given partial observations on the run of that system. Diagnosability
    checks whether a correct diagnosis can be issued in bounded time
    after a fault, for all faulty runs of that system. This problem
    appeared two decades ago and numerous facets of it have been
    explored, mostly for permanent faults. It is known for example that
    diagnosability of a system can be checked in polynomial time, while
    the construction of a diagnoser is exponential. The present paper
    examines the case of transient faults, that can appear and be
    repaired. Diagnosability in this setting means that the occurrence
    of a fault should always be detected in bounded time, but also
    before the fault is repaired. Checking this notion of diagnosability
    is proved to be PSPACE-complete. It is also shown that faults can be
    reliably counted provided the system is diagnosable for faults and
    for repairs.}
}
@inproceedings{vDCC-bpm16,
  address = {Rio de Janeiro, Brazil},
  month = sep,
  year = 2016,
  volume = {9850},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {La{~}Rosa, Marcello and Loos, Peter and Pastor, Oscar},
  acronym = {{BPM}'16},
  booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on
                  {B}usiness {P}rocess {M}anagement ({BPM}'16)},
  author = {van Dongen, Boudewijn F. and Carmona, Josep and Chatain,
                  {\relax Th}omas},
  title = {A Unified Approach for Measuring Precision and
                  Generalization Based on Anti-Alignments},
  pages = {39-56},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/vDCC-bpm16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/vDCC-bpm16.pdf},
  doi = {10.1007/978-3-319-45348-4_3},
  abstract = {The holy grail in process mining is an algorithm that, given an
    event log, produces fitting, precise, properly generalizing and simple
    process models. While there is consensus on the existence of solid metrics
    for fitness and simplicity, current metrics for precision and
    generalization have important flaws, which hamper their applicability in a
    general setting. In this paper, a novel approach to measure precision and
    generalization is presented, which relies on the notion of
    anti-alignments. An anti-alignment describes highly deviating model traces
    with respect to observed behavior. We propose metrics for precision and
    generalization that resemble the leave-one-out cross-validation
    techniques, where individual traces of the log are removed and the
    computed anti-alignment assess the model's capability to describe
    precisely or generalize the observed behavior.}
}
@inproceedings{KS-csl16,
  address = {Marseille, France},
  month = sep,
  year = 2016,
  volume = {62},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Regnier, Laurent and Talbot, Jean-Marc},
  acronym = {{CSL}'16},
  booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on
                  {C}omputer {S}cience {L}ogic ({CSL}'16)},
  author = {Prateek Karandikar and Schnoebelen,
                  {\relax Ph}ilippe},
  title = {The height of piecewise-testable languages with applications in
                  logical complexity},
  pages = {37:1-37:22},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csl16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csl16.pdf},
  doi = {10.4230/LIPIcs.CSL.2016.37},
  abstract = {The height of a piecewise-testable language~\(L\) is the maximum
    length of the words needed to define~\(L\) by excluding and requiring given
    subwords. The height of~\(L\) is an important descriptive complexity measure
    that has not yet been investigated in a systematic way. This paper
    develops a series of new techniques for bounding the height of finite
    languages and of languages obtained by taking closures by subwords,
    superwords and related operations.\par
    As an application of these results, we show that
    \({\textsf{FO}}^2(A^*,\sqsubseteq)\), the two-variable fragment of the
    first-order logic of sequences with the subword ordering, can only express
    piecewise-testable properties and has elementary complexity.}
}
@inproceedings{GGL-csl16,
  address = {Marseille, France},
  month = sep,
  year = 2016,
  volume = {62},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Regnier, Laurent and Talbot, Jean-Marc},
  acronym = {{CSL}'16},
  booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on
                  {C}omputer {S}cience {L}ogic ({CSL}'16)},
  author = {Ganardi, Moses and G{\"o}ller, Stefan and Lohrey, Markus},
  title = {On the Parallel Complexity of Bisimulation over Finite Systems},
  pages = {12:1-12:17},
  doi = {10.4230/LIPIcs.CSL.2016.12},
  abstract = {In this paper the computational complexity of the (bi)simulation problem over restricted graph classes is studied. For trees given as pointer structures or terms the (bi)simulation problem is complete for logarithmic space or NC\(^1\), respectively. This solves an open problem from Balc{\'a}zar, Gabarr{\'o}, and S{\'a}ntha. We also show that the simulation problem is P-complete even for graphs of bounded path-width.}
}
@inproceedings{DGGL-csl16,
  address = {Marseille, France},
  month = sep,
  year = 2016,
  volume = {62},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Regnier, Laurent and Talbot, Jean-Marc},
  acronym = {{CSL}'16},
  booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on
                  {C}omputer {S}cience {L}ogic ({CSL}'16)},
  author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and
                  Goubault{-}Larrecq, Jean},
  title = {The Directed Homotopy Hypothesis},
  pages = {9:1-9:16},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DBS-csl16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DBS-csl16.pdf},
  doi = {10.4230/LIPIcs.CSL.2016.9},
  abstract = {The homotopy hypothesis was originally stated by Grothendieck: topological spaces should be {"}equivalent{"} to (weak) infinite-groupoids, which give algebraic representatives of homotopy types. Much later, several authors developed geometrizations of computational models, e.g., for rewriting, distributed systems, (homotopy) type theory etc. But an essential feature in the work set up in concurrency theory, is that time should be considered irreversible, giving rise to the field of directed algebraic topology. Following the path proposed by Porter, we state here a directed homotopy hypothesis: Grandis' directed topological spaces should be {"}equivalent{"} to a weak form of topologically enriched categories, still very close to (infinite,1)-categories. We develop, as in ordinary algebraic topology, a directed homotopy equivalence and a weak equivalence, and show invariance of a form of directed homology.}
}
@inproceedings{DBS-csl16,
  address = {Marseille, France},
  month = sep,
  year = 2016,
  volume = {62},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Regnier, Laurent and Talbot, Jean-Marc},
  acronym = {{CSL}'16},
  booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on
                  {C}omputer {S}cience {L}ogic ({CSL}'16)},
  author = {Amina Doumane and David Baelde and Alexis Saurin},
  title = {Infinitary proof theory: the multiplicative additive case},
  pages = {42:1-42:17},
  doi = {10.4230/LIPIcs.CSL.2016.42},
  abstract = {Infinitary and regular proofs are commonly used in fixed point logics. Being natural intermediate devices between semantics and traditional finitary proof systems, they are commonly found in completeness arguments, automated deduction, verification, etc. However, their proof theory is surprisingly underdeveloped. In particular, very little is known about the computational behavior of such proofs through cut elimination. Taking such aspects into account has unlocked rich developments at the intersection of proof theory and programming language theory. One would hope that extending this to infinitary calculi would lead, e.g., to a better understanding of recursion and corecursion in programming languages. Structural proof theory is notably based on two fundamental properties of a proof system: cut elimination and focalization. The first one is only known to hold for restricted (purely additive) infinitary calculi, thanks to the work of Santocanale and Fortier; the second one has never been studied in infinitary systems. In this paper, we consider the infinitary proof system muMALLi for multiplicative and additive linear logic extended with least and greatest fixed points, and prove these two key results. We thus establish muMALLi as a satisfying computational proof system in itself, rather than just an intermediate device in the study of finitary proof systems.}
}
@inproceedings{BLS-hal15,
  address = {Marseille, France},
  month = sep,
  year = 2016,
  volume = {62},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Regnier, Laurent and Talbot, Jean-Marc},
  acronym = {{CSL}'16},
  booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on
                  {C}omputer {S}cience {L}ogic ({CSL}'16)},
  author = {Baelde, David and Lunel, Simon and Schmitz, Sylvain},
  title = {A~Sequent Calculus for a Modal Logic on Finite Data
                  Trees},
  pages = {32:1-32:16},
  url = {https://hal.inria.fr/hal-01191172},
  doi = {10.4230/LIPIcs.CSL.2016.32},
  abstract = {We investigate the proof theory of a modal fragment of XPath
                  equipped with data (in)equality tests over finite data
                  trees, i.e. over finite unranked trees where nodes are
                  labelled with both a symbol from a finite alphabet and a
                  single data value from an infinite domain.  We present a
                  sound and complete sequent calculus for this logic, which
                  yields the optimal PSPACE complexity bound for its validity
                  problem.}
}
@inproceedings{Bouyer-mfcs16,
  address = {Krakow, Poland},
  month = aug,
  year = 2016,
  volume = {58},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Faliszewski, Piotr and Muscholl, Anca and Niedermeier, Rolf},
  acronym = {{MFCS}'16},
  booktitle = {{P}roceedings of the 41st
               {I}nternational {S}ymposium on
               {M}athematical {F}oundations of 
               {C}omputer {S}cience
               ({MFCS}'16)},
  author = {Bouyer, Patricia},
  title = {Optimal Reachability in Weighted Timed Automata and Games},
  pages = {3:1-3:3},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/bouyer-mfcs16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bouyer-mfcs16.pdf},
  doi = {10.4230/LIPIcs.MFCS.2016.3},
  abstract = {This is an overview of the invited talk delivered at the 41st International Symposium on Math- ematical Foundations of Computer Science (MFCS-2016).}
}
@inproceedings{ABKMT-mfcs16,
  address = {Krakow, Poland},
  month = aug,
  year = 2016,
  volume = {58},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Faliszewski, Piotr and Muscholl, Anca and Niedermeier, Rolf},
  acronym = {{MFCS}'16},
  booktitle = {{P}roceedings of the 41st
               {I}nternational {S}ymposium on
               {M}athematical {F}oundations of 
               {C}omputer {S}cience
               ({MFCS}'16)},
  author = {Akshay, S. and Bouyer, Patricia and Krishna, Shankara Narayanan and
                  Manasa, Lakshmi and Trivedi, Ashutosh },
  title = {Stochastic Timed Games Revisited},
  pages = {8:1-8:14},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABKMT-mfcs16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABKMT-mfcs16.pdf},
  doi = {10.4230/LIPIcs.MFCS.2016.8},
  abstract = {Stochastic timed games (STGs), introduced by Bouyer and Forejt,
    naturally generalize both continuous-time Markov chains and timed automata
    by providing a partition of the locations between those controlled by two
    players (Player Box and Player Diamond) with competing objectives and
    those governed by stochastic laws. Depending on the number of
    players---2,~1, or~0---subclasses of stochastic timed games are often
    classified as \(2\frac{1}{2}\)-player, \(1\frac{1}{2}\)-player, and
    \(\frac{1}{2}\)-player games where the \(\frac{1}{2}\) symbolizes the
    presence of the stochastic {"}nature{"} player. For STGs with reachability
    objectives it is known that \(1\frac{1}{2}\)-player one-clock STGs are
    decidable for qualitative objectives, and that \(2\frac{1}{2}\)-player
    three-clock STGs are undecidable for quantitative reachability objectives.
    This paper further refines the gap in this decidability spectrum. We show
    that quantitative reachability objectives are already undecidable for
    \(1\frac{1}{2}\)-player four-clock STGs, and even under the time-bounded
    restriction for \(2\frac{1}{2}\)-player five-clock~STGs. We~also obtain a
    class of \(1\frac{1}{2}\), \(2\frac{1}{2}\)-player STGs for which the
    quantitative reachability problem is decidable.}
}
@inproceedings{NPR-mfcs16,
  address = {Krakow, Poland},
  month = aug,
  year = 2016,
  volume = {58},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Faliszewski, Piotr and Muscholl, Anca and Niedermeier, Rolf},
  acronym = {{MFCS}'16},
  booktitle = {{P}roceedings of the 41st
               {I}nternational {S}ymposium on
               {M}athematical {F}oundations of 
               {C}omputer {S}cience
               ({MFCS}'16)},
  author = {Reino Niskanen and Igor Potapov and Julien Reichert},
  title = {Undecidability of Two-dimensional Robot Games},
  pages = {73:1-73:13},
  url = {http://arxiv.org/abs/1604.08779},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NPR-mfcs16.pdf},
  doi = {10.4230/LIPIcs.MFCS.2016.73},
  abstract = {Robot game is a two-player vector addition game played on the integer lattice \(\mathbb{Z}^n\).  Both players have sets of vectors and in each turn the vector chosen by a player is added to the current configuration vector of the game.  One of the players, called Eve, tries to play the game from the initial configuration to the origin while the other player, Adam, tries to avoid the origin.  The problem is to decide whether or not Eve has a winning strategy.  In this paper we prove undecidability of the robot game in dimension two answering the question formulated by Doyen and Rabinovich in 2011 and closing the gap between undecidable and decidable cases.}
}
@inproceedings{DGGL-concur16,
  address = {Qu{\'e}bec City, Canada},
  month = aug,
  year = 2016,
  volume = {59},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha},
  acronym = {{CONCUR}'16},
  booktitle = {{P}roceedings of the 27th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'16)},
  author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean},
  title = {Bisimulations and unfolding in {{\(\mathcal{P}\)}}-accessible categorical models},
  pages = {25:1-25:14},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-concur16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-concur16.pdf},
  doi = {10.4230/LIPIcs.CONCUR.2016.25},
  abstract = {We propose a categorical framework for bisimulations and
    unfoldings that unifies the classical approach from Joyal
    \emph{et~al.} via open maps and unfoldings. This is based on a
    notion of categories accessible with respect to a subcategory of
    path shapes, i.e., for which one can define a nice notion of trees
    as glueings of paths. We show that transition systems and presheaf
    models are instances of our framework. We also prove that in our
    framework, several notions of bisimulation coincide, in particular
    an {"}operational~one{"} akin to the standard definition in
    transition systems. Also, our notion of accessibility is preserved
    by coreflections. This also leads us to a notion of unfolding that
    behaves well in the accessible case: it~is a right adjoint and is a
    universal covering, i.e., it is initial among the morphisms that
    have the unique lifting property with respect to path shapes. As an
    application, we prove that the universal covering of a groupoid, a
    standard construction in algebraic topology, is an unfolding, when
    the category of path shapes is well chosen.}
}
@inproceedings{AGS-concur16,
  address = {Qu{\'e}bec City, Canada},
  month = aug,
  year = 2016,
  volume = {59},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha},
  acronym = {{CONCUR}'16},
  booktitle = {{P}roceedings of the 27th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'16)},
  author = {Akshay, S. and Paul Gastin and Krishna, Shankara Narayanan},
  title = {Analyzing Timed Systems Using Tree Automata},
  pages = {27:1-27:14},
  url = {http://arxiv.org/abs/1604.08443},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGS-concur16.pdf},
  doi = {10.4230/LIPIcs.CONCUR.2016.27},
  abstract = {Timed systems, such as timed automata, are usually analyzed
    using their operational semantics on timed words. The classical region
    abstraction for timed automata reduces them to (untimed) finite state
    automata with the same time-abstract properties, such as state
    reachability. We propose a new technique to analyze such timed systems
    using finite tree automata instead of finite word automata. The main idea
    is to consider timed behaviors as graphs with matching edges capturing
    timing constraints. Such graphs can be interpreted in trees opening the
    way to tree automata based techniques which are more powerful than
    analysis based on word automata. The technique is quite general and
    applies to many timed systems. In this paper, as an example, we develop
    the technique on timed pushdown systems, which have recently received
    considerable attention. Further, we also demonstrate how we can use it on
    timed automata and timed multi-stack pushdown systems (with boundedness
    restrictions).}
}
@inproceedings{BHL-concur16,
  address = {Qu{\'e}bec City, Canada},
  month = aug,
  year = 2016,
  volume = {59},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha},
  acronym = {{CONCUR}'16},
  booktitle = {{P}roceedings of the 27th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'16)},
  author = {Nathalie Bertrand and Serge Haddad and Engel Lefaucheux},
  title = {Diagnosis in Infinite-State Probabilistic Systems},
  pages = {37:1-37:15},
  url = {https://hal.inria.fr/hal-01334218},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-concur16.pdf},
  doi = {10.4230/LIPIcs.CONCUR.2016.37},
  abstract = {In a recent work, we introduced four variants of
    diagnosability (\textsf{FA}, \textsf{IA}, \textsf{FF},~\textsf{IF})
    in (finite) probabilistic systems (pLTS) depending whether one
    considers (1)~finite or infinite runs and (2)~faulty or all runs. We
    studied their relationship and established that the corresponding
    decision problems are PSPACE-complete. A~key ingredient of the
    decision procedures was a characterisation of diagnosability by the
    fact that a random run almost surely lies in an open set whose
    specification only depends on the qualitative behaviour of the pLTS.
    Here we investigate similar issues for infinite pLTS. We~first show
    that this characterisation still holds for
    \textsf{FF}-diagnosability but with a~\(G_{\delta}\) set instead of
    an open set and also for \textsf{IF}-and \textsf{IA}-diagnosability
    when pLTS are finitely branching. We also prove that surprisingly
    \textsf{FA}-diagnosability cannot be characterised in this way even
    in the finitely branching case. Then we apply our characterisations
    for a partially observable probabilistic extension of visibly
    pushdown automata (POpVPA), yielding EXPSPACE procedures for solving
    diagnosability problems. In~addition, we~establish some
    computational lower bounds and show that slight extensions of POpVPA
    lead to undecidability.}
}
@inproceedings{DLM-concur16,
  address = {Qu{\'e}bec City, Canada},
  month = aug,
  year = 2016,
  volume = {59},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha},
  acronym = {{CONCUR}'16},
  booktitle = {{P}roceedings of the 27th
               {I}nternational {C}onference on
               {C}oncurrency {T}heory
               ({CONCUR}'16)},
  author = {David, Am{\'e}lie and Laroussinie, Fran{\c{c}}ois and
                  Markey, Nicolas},
  title = {On~the expressiveness of~{QCTL}},
  pages = {28:1-28:15},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur16.pdf},
  doi = {10.4230/LIPIcs.CONCUR.2016.28},
  abstract = {QCTL extends the temporal logic CTL with quantification
    over atomic propositions. While the algorithmic questions for QCTL
    and its fragments with limited quantification depth are
    well-understood (e.g. satisfiability of QCTL\textsuperscript{\(k\)},
    with at most \(k\) nested blocks of quantifiers, is
    \(k+1\)-EXPTIME-complete), very few results are known about the
    expressiveness of this logic. We~address such expressiveness
    questions in this paper. We first consider the \emph{distinguishing
    power} of these logics (i.e.,~their ability to separate models),
    their relationship with behavioural equivalences, and their ability
    to capture the behaviours of finite Kripke structures with so-called
    characteristic formulas. We then consider their \emph{expressive
    power} (i.e.,~their ability to express a property), showing that in
    terms of expressiveness the hierarchy QCTL\textsuperscript{\(k\)}
    collapses at level~2 (in~other terms, any~QCTL formula can be
    expressed using at most two nested blocks of quantifiers).}
}
@inproceedings{GR-langonto16,
  address = {Portoro{\v{z}}, Slovenia},
  editor = {Grci{\'c} Simeunovi, Larisa and Vintar,
                  {\u{S}}pela and Khan, Fahad and Le{\'o}n Ara{\'u}z,
                  Pilar and Faber, Pamela and Fontini, Francesca and
                  Parvisi, Artemis and Unger, Christina},
  acronym = {{LangOnto+TermiKS}'16},
  booktitle = {{P}roceedings of the {J}oint 2nd {W}orkshop on {L}anguage and
                  {O}ntology~\& {T}erminology and {K}nowledge
                  {S}tructures ({LangOnto+TermiKS}'16)},
  author = {Grefenstette, Gregory and Rafes, Karima},
  title = {Transforming {W}ikipedia into an Ontology-based
                  Information Retrieval Search Engine for Local Experts
                  using a Third-Party Taxonomy},
  year = 2016,
  month = may,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/GR-langonto16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GR-langonto16.pdf},
  note = {To appear},
  abstract = {Wikipedia is widely used for finding general information
    about a wide variety of topics. Its vocation is not to provide
    local information. For~example, it~provides plot, cast, and
    production information about a given movie, but not showing times in
    your local movie theatre. Here we describe how we can connect local
    information to Wikipedia, without altering its content. The~case
    study we present involves finding local scientific experts. Using a
    third-party taxonomy, independent from Wikipedia's category
    hierarchy, we index information connected to our local experts,
    present in their activity reports, and we re-index Wikipedia content
    using the same taxonomy. The connections between Wikipedia pages and
    local expert reports are stored in a relational database, accessible
    through as public SPARQL endpoint. A~Wikipedia gadget (or plugin)
    activated by the interested user, accesses the endpoint as each
    Wikipedia page is accessed. An~additional tab on the Wikipedia page
    allows the user to open up a list of teams of local experts
    associated with the subject matter in the Wikipedia page. The
    technique, though presented here as a way to identify local experts,
    is generic, in that any third party taxonomy, can be used in this to
    connect Wikipedia to any non-Wikipedia data source.}
}
@article{LDRCF-ijdc16,
  publisher = {Springer},
  journal = {International Journal of Dynamics and Control},
  author = {Le{~}Co{\"e}nt, Adrien and De{~}Vuyst, Florian and Rey,
                  Christian and Chamoin, Ludovic and Fribourg, Laurent},
  title = {Control of mechanical systems using set-based methods},
  pages = {1-17},
  year = 2016,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LDRCF-ijdc16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LDRCF-ijdc16.pdf},
  doi = {10.1007/s40435-016-0245-y},
  abstract = {This paper considers large discrete-time linear systems obtained
    from discretized partial differential equations, and controlled by a
    \emph{quantized} law, i.e., a piecewise constant time function taking a
    finite set of values. We show how to generate the control by, first,
    applying \emph{model reduction} to the original system, then using a
    {"}state-space bisection{"} method for synthesizing a control at the
    reduced-order level, and finally computing an upper bound on the
    deviations between the controlled output trajectories of the reduced-order
    model and those of the original model. The effectiveness of our approach
    is illustrated on several examples of the literature.}
}
@inproceedings{LACF-snr16,
  address = {Vienna, Austria},
  month = apr,
  year = 2016,
  publisher = {{IEEE} Computer Society Press},
  acronym = {{SNR}'16},
  booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop
               on {S}ymbolic and {N}umerical {M}ethods for
                  {R}eachability {A}nalysis ({SNR}'16)},
  author = {Le{~}Co{\"e}nt, Adrien and Alexandre{ }dit{ }Sandretto,
                  Julien and Chapoutot, Alexandre and Fribourg,
                  Laurent},
  title = {Control of Nonlinear Switched Systems Based on
                  Validated Simulation},
  pages = {1-6},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/LACF-snr16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LACF-snr16.pdf},
  abstract = {We present an algorithm of control synthesis for nonlinear
    switched systems, based on an existing procedure of state-space
    bisection and made available for nonlinear systems with the help of
    validated simulation. The use of validated simulation also permits
    to take bounded perturbations and varying parameters into account.
    The whole approach is entirely guaranteed and the induced
    controllers are correct-by-design.}
}
@article{DFP-lmcs16,
  journal = {Logical Methods in Computer Science},
  author = {Demri, St{\'e}phane and Figueira, Diego and Praveen, M},
  title = {Reasoning about Data Repetitions with Counter Systems},
  year = 2016,
  volume = {12},
  number = {3},
  month = aug,
  pages = {1:1-1:55},
  url = {http://arxiv.org/abs/1604.02887},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DFP-lmcs16.pdf},
  doi = {10.2168/LMCS-12(3:1)2016},
  abstract = {We study linear-time temporal logics interpreted over data words
     with multiple attributes. We restrict the atomic formulas to equalities
     of attribute values in successive positions and to repetitions of
     attribute values in the future or past. We demonstrate correspondences
     between satisfiability problems for logics and reachability-like decision
     problems for counter systems. We show that allowing\slash disallowing
     atomic formulas expressing repetitions of values in the past corresponds
     to the reachability\slash coverability problem in Petri nets. This gives
     us 2EXPSPACE upper bounds for several satisfiability problems. We prove
     matching lower bounds by reduction from a reachability problem for a
     newly introduced class of counter systems. This new class is a succinct
     version of vector addition systems with states in which counters are
     accessed via pointers, apotentially useful feature in other contexts. We
     strengthen further the correspondences between data logics and counter
     systems by characterizing the complexity of fragments, extensions and
     variants of the logic. For instance, we precisely characterize the
     relationship between the number of attributes allowed in the logic and
     the number of counters needed in the counter system.}
}
@inproceedings{BBCM-csr16,
  address = {St~Petersburg, Russia},
  month = jun,
  year = 2016,
  volume = {9691},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Gerhard J. Woeginger},
  acronym = {{CSR}'16},
  booktitle = {{P}roceedings of the 11th {I}nternational {C}omputer {S}cience
                  {S}ymposium in {R}ussia ({CSR}'16)},
  author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Carlier,
                  Pierre 
                  and Menet, Quentin},
  title = {Compositional Design of Stochastic Timed Automata},
  pages = {117-130},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBCM-csr16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBCM-csr16.pdf},
  doi = {10.1007/978-3-319-34171-2_9},
  abstract = {In this paper, we study the model of stochastic timed automata
     and we target the definition of adequate composition operators that will
     allow a compositional approach to the design of stochastic systems with
     hard real-time constraints. This paper achieves the first step towards
     that goal. Firstly, we define a parallel composition operator that
     (we~prove) corresponds to the interleaving semantics for that model; we
     give conditions over probability distributions, which ensure that the
     operator is well-defined; and we exhibit problematic behaviours when this
     condition is not satisfied. We furthermore identify a large and natural
     subclass which is closed under parallel composition. Secondly, we define
     a bisimulation notion which naturally extends that for continuous-time
     Markov chains. Finally, we importantly show that the defined bisimulation
     is a congruence w.r.t. the parallel composition, which is an expected
     property for a proper modular approach to system design.}
}
@inproceedings{BBBC-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye,
                  {\relax Th}omas
                  and Carlier, Pierre},
  title = {Analysing Decisive Stochastic Processes},
  pages = {101:1-101:14},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBC-icalp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBC-icalp16.pdf},
  doi = {10.4230/LIPIcs.ICALP.2016.101},
  abstract = {In~2007, Abdulla \textit{et~al.} introduced the elegant concept
    of decisive Markov chain. Intuitively, decisiveness allows one to lift the
    good properties of finite Markov chains to infinite Markov chains. For
    instance, the approximate quantitative reachability problem can be solved
    for decisive Markov chains (enjoying reasonable effectiveness assumptions)
    including probabilistic lossy channel systems and probabilistic vector
    addition systems with states. In this paper, we extend the concept of
    decisiveness to more general stochastic processes. This extension is non
    trivial as we consider stochastic processes with a potentially continuous
    set of states and uncountable branching (common features of real-time
    stochastic processes). This allows us to obtain decidability results for
    both qualitative and quantitative verification problems on some classes of
    real-time stochastic processes, including generalized semi-Markov
    processes and stochastic timed automata.}
}
@inproceedings{CH-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Dmitry Chistikov and Christoph Haase},
  title = {The Taming of the Semi-Linear Set},
  pages = {128:1-128:14},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CH-icalp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CH-icalp16.pdf},
  doi = {10.4230/LIPIcs.ICALP.2016.128},
  abstract = {Semi-linear sets, which are finitely generated subsets of
    the monoid \((\mathbb{Z}^d, +)\), have numerous applications in theoretical
    computer science. Although semi-linear sets are usually given
    implicitly, by formulas in Presburger arithmetic or by other means,
    the effect of Boolean operations on semi-linear sets in terms of the
    size of generators has primarily been studied for explicit
    representations. In this paper, we develop a framework suitable for
    implicitly presented semi-linear sets, in which the size of a
    semi-linear set is characterized by its norm---the maximal magnitude
    of a generator.\par
    We put together a {"}toolbox{"} of operations and decompositions for
    semi-linear sets which give bounds in terms of the norm (as opposed
    to just the bit-size of the description), a unified presentation,
    and simplified proofs. This toolbox, in particular, provides
    exponentially better bounds for the complement and set-theoretic
    difference. We also obtain bounds on unambiguous decompositions and,
    as an application of the toolbox, settle the complexity of the
    equivalence problem for exponent-sensitive commutative grammars.}
}
@inproceedings{Zetzche-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Georg Zetzsche},
  title = {The complexity of downward closure comparisons},
  pages = {123:1-123:14},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/Zetzche-icalp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Zetzche-icalp16.pdf},
  doi = {10.4230/LIPIcs.ICALP.2016.123},
  abstract = {The downward closure of a language is the set of all (not
    necessarily contiguous) subwords of its members. It is well-known
    that the downward closure of every language is regular. Moreover,
    recent results show that downward closures are computable for quite
    powerful system models.\par
    One advantage of abstracting a language by its downward closure is
    that then, equivalence and inclusion become decidable. In~this work,
    we study the complexity of these two problems. More precisely, we
    consider the following decision problems: Given languages~\(K\)
    and~\(L\) from classes~\(\mathcal{C}\) and~\(\mathcal{D}\),
    respectively, does the downward closure of~\(K\) include (equal)
    that of~\(L\)?\par
    These problems are investigated for finite automata, one-counter
    automata, context-free grammars, and reversal-bounded counter
    automata. For each combination, we prove a completeness result
    either for fixed or for arbitrary alphabets. Moreover, for Petri net
    languages, we show that both problems are Ackermann-hard and for
    higher-order pushdown automata of order~\(k\), we prove hardness for
    complements of nondeterministic \(k\)-fold exponential time.}
}
@inproceedings{CD-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Chatterjee, Krishnendu and Doyen, Laurent},
  title = {Computation Tree Logic for Synchronization Properties},
  pages = {98:1-98:14},
  url = {http://arxiv.org/abs/1604.06384},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp16.pdf},
  doi = {10.4230/LIPIcs.ICALP.2016.98},
  abstract = {We present a logic that extends CTL (Computation Tree Logic)
    with operators that express synchronization properties. A property is
    synchronized in a system if it holds in all paths of a certain length. The
    new logic is obtained by using the same path quantifiers and temporal
    operators as in CTL, but allowing a different order of the quantifiers.
    This small syntactic variation induces a logic that can express
    non-regular properties for which known extensions of MSO with equality of
    path length are undecidable. We show that our variant of CTL is decidable
    and that the model-checking problem is in \(\Delta_3^P = P^{NP^NP}\), and
    is DP-hard. We analogously consider quantifier exchange in extensions of
    CTL, and we present operators defined using basic operators of CTL* that
    express the occurrence of infinitely many synchronization points. We show
    that the model-checking problem remains in \(\Delta_3^P\). The
    distinguishing power of CTL and of our new logic coincide if the Next
    operator is allowed in the logics, thus the classical bisimulation
    quotient can be used for state-space reduction before model checking.}
}
@inproceedings{GLS-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Goubault{-}Larrecq, Jean and Schmitz, Sylvain},
  title = {Deciding Piecewise Testable Separability for Regular
                  Tree Languages},
  pages = {97:1-97:15},
  url = {https://hal.inria.fr/hal-01276119/},
  optpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-icalp16.pdf},
  doi = {10.4230/LIPIcs.ICALP.2016.97},
  abstract = {The piecewise testable separability problem asks, given
    two input languages, whether there exists a piecewise testable
    language that contains the first input language and is disjoint from
    the second. We prove a general characterisation of piecewise
    testable separability on languages in a well-quasi-order, in terms
    of ideals of the ordering. This subsumes the known characterisations
    in the case of finite words. In the case of finite ranked trees
    ordered by homeomorphic embedding, we show using effective
    representations for tree ideals that it entails the decidability of
    piecewise testable separability when the input languages are
    regular. A~final byproduct is a new proof of the decidability of
    whether an input regular language of ranked trees is piecewise
    testable, which was first shown in the unranked case by Boja{\'n}czyk,
    Segoufin, and Straubing (Log.~Meth. in Comput.~Sci.,~8(3:26),
    2012).}
}
@inproceedings{GHLT-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Stefan G{\"o}ller and Christoph Haase and Ranko
                  Lazi{\'c} and Patrick Totzke},
  title = {A Polynomial-Time Algorithm for Reachability in
                  Branching {VASS} in Dimension One},
  pages = {105:1-105:13},
  url = {http://arxiv.org/abs/1602.05547},
  pfd = {http://www.lsv.fr/Publis/PAPERS/PDF/GHLT-icalp16.pdf},
  doi = {10.4230/LIPIcs.ICALP.2016.105},
  abstract = {Branching VASS (BVASS) generalise vector addition systems
    with states by allowing for special branching transitions that can
    non-deterministically distribute a counter value between two control
    states. A~run of a BVASS consequently becomes a tree, and
    reachability is to decide whether a given configuration is the root
    of a reachability tree. This paper shows P-completeness of
    reachability in BVASS in dimension one, the first decidability
    result for reachability in a subclass of BVASS known so~far.
    Moreover, we~show that coverability and boundedness in BVASS in
    dimension one are P-complete as~well.}
}
@inproceedings{BCM-cav16,
  address = {Toronto, Canada},
  month = jul,
  year = 2016,
  volume = 9779,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Chaudhuri, Swarat and Farzan, Azadeh},
  acronym = {{CAV}'16},
  booktitle = {{P}roceedings of the 28th
               {I}nternational {C}onference on 
               {C}omputer {A}ided {V}erification
               ({CAV}'16)~-- {P}art~{I}},
  author = {Bouyer, Patricia and Colange, Maximilien and Markey, Nicolas},
  title = {Symbolic Optimal Reachability in Weighted Timed Automata},
  pages = {513-530},
  url = {http://arxiv.org/abs/1602.00481},
  doi = {10.1007/978-3-319-41528-4_28},
  abstract = {Weighted timed automata have been defined in the early 2000's
   for modelling resource-consumption or -allocation problems in real-time
   systems. Optimal reachability is decidable in weighted timed automata, and
   a symbolic forward algorithm has been developed to solve that problem. This
   algorithm uses so-called priced zones, an extension of standard zones with
   cost functions. In order to ensure termination, the algorithm requires
   clocks to be bounded. For unpriced timed automata, much work has been done
   to develop sound abstractions adapted to the forward exploration of timed
   automata, ensuring termination of the model-checking algorithm without
   bounding the clocks. In this paper, we take advantage of recent
   developments on abstractions for timed automata, and propose an algorithm
   allowing for symbolic analysis of all weighted timed automata, without
   requiring bounded clocks.}
}
@inproceedings{BMRSS-icalp16,
  address = {Rome, Italy},
  month = jul,
  year = 2016,
  volume = {55},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Chatzigiannakis, Ioannis and Mitzenmacher,
                  Michael and Rabani, Yuval and Sangiorgi, Davide},
  acronym = {{ICALP}'16},
  booktitle = {{P}roceedings of the 43rd {I}nternational 
               {C}olloquium on {A}utomata, {L}anguages and 
               {P}rogramming ({ICALP}'16)},
  author = {Bouyer, Patricia and Markey, Nicolas and Randour,
                  Mickael and Sangnier, Arnaud and Stan, Daniel},
  title = {Reachability in Networks of Register Protocols under
                  Stochastic Schedulers},
  pages = {106:1-106:14},
  url = {http://arxiv.org/abs/1602.05928},
  doi = {10.4230/LIPIcs.ICALP.2016.106},
  abstract = {We study the almost-sure reachability problem in a distributed
    system obtained as the asynchronous composition of~\(N\) copies (called
    \emph{processes}) of the same automaton (called \emph{protocol}), that can
    communicate via a shared register with finite domain. The automaton has
    two types of transitions: write-transitions update the value of the
    register, while read-transitions move to a new state depending on the
    content of the register. Non-determinism is resolved by a stochastic
    scheduler. Given a protocol, we focus on almost-sure reachability of a
    target state by one of the processes. The answer to this problem naturally
    depends on the number~\(N\) of processes. However, we prove that our
    setting has a cut-off property : the answer to the almost-sure
    reachability problem is constant when \(N\) is large enough; we~then
    develop an EXPSPACE algorithm deciding whether this constant answer is
    positive or negative.}
}
@inproceedings{LS-lics16,
  address = {New York City, USA},
  month = jul,
  year = 2016,
  publisher = {ACM Press},
  editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan},
  acronym = {{LICS}'16},
  booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)},
  author = {Ranko Lazi{\'c} and Sylvain Schmitz},
  title = {The Complexity of Coverability in {{\(\nu\)}}-{P}etri Nets},
  pages = {467-476},
  url = {https://hal.inria.fr/hal-01265302},
  doi = {10.1145/2933575.2933593},
  abstract = {We show that the coverability problem in nu-Petri
                  nets is complete for `double Ackermann' time, thus
                  closing an open complexity gap between an Ackermann
                  lower bound and a hyper-Ackermann upper bound. The
                  coverability problem captures the verification of
                  safety properties in this nominal extension of Petri
                  nets with name management and fresh name
                  creation. Our completeness result establishes
                  nu-Petri nets as a model of intermediate power among
                  the formalisms of nets enriched with data, and
                  relies on new algorithmic insights brought by the
                  use of well-quasi-order ideals.}
}
@inproceedings{DBHS-lics16,
  address = {New York City, USA},
  month = jul,
  year = 2016,
  publisher = {ACM Press},
  editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan},
  acronym = {{LICS}'16},
  booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)},
  author = {Amina Doumane and David Baelde and Lucca Hirschi
                  and Alexis Saurin},
  title = {Towards Completeness via Proof Search in the Linear
                  Time {{\(\mu\)}}-calculus},
  pages = {377-386},
  url = {https://hal.archives-ouvertes.fr/hal-01275289/},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DBHS-lics16.pdf},
  doi = {10.1145/2933575.2933598},
  abstract = {Modal \(\mu\)-calculus is one of the central
                  languages of logic and verification, whose study
                  involves notoriously complex objects: automata over
                  infinite structures on the model-theoretical side;
                  infinite proofs and proofs by (co)induction on the
                  proof-theoretical side.  Nevertheless,
                  axiomatizations have been given for both linear and
                  branching time \(\mu\)-calculi, with quite involved
                  completeness arguments.  We come back to this
                  central problem, considering it from a proof search
                  viewpoint, and provide some new completeness
                  arguments in the linear time \(\mu\)-calculus.  Our
                  results only deal with restricted classes of
                  formulas that closely correspond to
                  (non-alternating) \(\omega\)-automata but, compared
                  to earlier proofs, our completeness arguments are
                  direct and constructive.  We first consider a
                  natural circular proof system based on sequent
                  calculus, and show that it is complete for
                  inclusions of parity automata directly expressed as
                  formulas, making use of Safra's construction
                  directly in proof search.  We then consider the
                  corresponding finitary proof system, featuring
                  (co)induction rules, and provide a partial
                  translation result from circular to finitary
                  proofs. This yields completeness of the finitary
                  proof system for inclusions of sufficiently
                  deterministic parity automata, and finally for
                  arbitrary B{\"u}chi automata.}
}
@inproceedings{CG-lics16,
  address = {New York City, USA},
  month = jul,
  year = 2016,
  publisher = {ACM Press},
  editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan},
  acronym = {{LICS}'16},
  booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)},
  author = {{\relax Th}omas Colcombet and Stefan G{\"o}ller},
  title = {Games with bound guess actions},
  pages = {257-266},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CG-lics16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CG-lics16.pdf},
  doi = {10.1145/2933575.2934502},
  abstract = {We introduce games with (bound) guess actions. These are games in which the players may be asked along the play to provide num- bers that need to satisfy some bounding constraints. These are nat- ural extensions of domination games occurring in the regular cost function theory. In this paper we consider more specifically the case where the constraints to be bounded are regular cost functions, and the long term goal is an ?-regular winning condition. We show that such games are decidable on finite arenas.}
}
@inproceedings{CD-lics16,
  address = {New York City, USA},
  month = jul,
  year = 2016,
  publisher = {ACM Press},
  editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan},
  acronym = {{LICS}'16},
  booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)},
  author = {Chatterjee, Krishnendu and Doyen, Laurent},
  title = {Perfect-information Stochastic Games with
                  Generalized Mean-Payoff Objectives},
  pages = {247-256},
  url = {http://arxiv.org/abs/1604.06376},
  doi = {10.1145/2933575.2934513},
  abstract = {Graph games provide the foundation for modeling and synthesizing reactive processes. In the synthesis of stochastic reactive processes, the traditional model is perfect-information stochastic games, where some transitions of the game graph are controlled by two adversarial players, and the other transitions are executed probabilistically. We consider such games where the objective is the conjunction of several quantitative objectives (specified as mean-payoff conditions), which we refer to as generalized mean-payoff objectives. The basic decision problem asks for the existence of a finite-memory strategy for a player that ensures the generalized mean-payoff objective be satisfied with a desired probability against all strategies of the opponent. A special case of the decision problem is the almost-sure problem where the desired probability is~1. Previous results presented a semi-decision procedure for epsilon-approximations of the almost-sure problem. In this work, we show that both the almost-sure problem as well as the general basic decision problem are coNP-complete, significantly improving the previous results. Moreover, we show that in the case of 1-player stochastic games, randomized memoryless strategies are sufficient and the problem can be solved in polynomial time. In contrast, in two-player stochastic games, we show that even with randomized strategies exponential memory is required in general, and present a matching exponential upper bound. We also study the basic decision problem with infinite-memory strategies and present computational complexity results for the problem. Our results are relevant in the synthesis of stochastic reactive systems with multiple quantitative requirements. }
}
@inproceedings{DOMZ-lics16,
  address = {New York City, USA},
  month = jul,
  year = 2016,
  publisher = {ACM Press},
  editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan},
  acronym = {{LICS}'16},
  booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)},
  author = {D'Osualdo, Emanuele and Roland Meyer and Georg Zetzsche},
  title = {First-order logic with reachability for infinite-state systems},
  pages = {457-466},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DOMZ-lics16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DOMZ-lics16.pdf},
  doi = {10.1145/2933575.2934552},
  abstract = {First-order logic with the reachability predicate
                  (FO(R)) is an important means of specification in
                  system analysis. Its decidability status is known
                  for some individual types of infinite-state systems
                  such as pushdown (decidable) and vector addition
                  systems (undecidable). \par This work aims at a
                  general understanding of which types of systems
                  admit decidability.  As a unifying model, we employ
                  valence systems over graph monoids, which feature a
                  finite-state control and are parameterized by a
                  monoid to represent their storage mechanism.  As
                  special cases, this includes pushdown systems,
                  various types of counter systems (such as vector
                  addition systems) and combinations thereof.  Our
                  main result is a complete characterization of those
                  graph monoids where FO(R) is decidable for the
                  resulting transition systems.}
}
@inproceedings{ACHKSZ-lics16,
  address = {New York City, USA},
  month = jul,
  year = 2016,
  publisher = {ACM Press},
  editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan},
  acronym = {{LICS}'16},
  booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash
            IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)},
  author = {Atig, Mohamed Faouzi and Dmitry Chistikov and Piotr
                  Hofman and Kumar, K. Narayan and Prakash Saivasan and
                  Georg Zetzsche},
  title = {Complexity of regular abstractions of one-counter languages},
  pages = {207-216},
  url = {http://arxiv.org/abs/1602.03419},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACHKSZ-lics16.pdf},
  doi = {10.1145/2933575.2934561},
  abstract = {We study the computational and descriptional complexity of
                  the following transformation: Given a one-counter
                  automaton~(OCA)~\(A\), construct a nondeterministic
                  finite automaton~(NFA)~\(B\) that recognizes an
                  abstraction of the language~\(L(A)\): its~(1)~downward
                  closure, (2)~upward closure, or (3)~Parikh image. For
                  the Parikh image over a fixed alphabet and for the
                  upward and downward closures, we find polynomial-time
                  algorithms that compute such an NFA. For the Parikh
                  image with the alphabet as part of the input, we find
                  a quasi-polynomial time algorithm and prove a
                  completeness result: we construct a sequence of OCA
                  that admits a polynomial-time algorithm iff there is
                  one for all OCA. For all three abstractions, it was
                  previously unknown if appropriate NFA of
                  sub-exponential size exist.}
}
@inproceedings{HBD-sp16,
  address = {San Jose, California, USA},
  month = may,
  year = 2016,
  publisher = {IEEECSP},
  editor = {Locasto, Michael and Shmatikov, Vitaly and Erlingsson, {\'U}lfar},
  acronym = {{S\&P}'16},
  booktitle = {{P}roceedings of the 37th {IEEE} {S}ymposium
           on {S}ecurity and {P}rivacy ({S\&P}'16)},
  author = {Hirschi, Lucca and Baelde, David and Delaune, St{\'e}phanie},
  title = {A~method for verifying privacy-type properties:
                  the~unbounded case},
  pages = {564-581},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HBD-sp16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HBD-sp16.pdf},
  doi = {10.1109/SP.2016.40},
  abstract = {In~this paper, we~consider the problem of verifying
    anonymity and unlinkability in the symbolic model, where protocols
    are represented as processes in a variant of the applied pi calculus
    notably used in the Proverif tool. Existing tools and techniques do
    not allow one to verify directly these properties, expressed as
    behavioral equivalences. We propose a different approach: we design
    two conditions on protocols which are sufficient to ensure anonymity
    and unlinkability, and which can then be effectively checked
    automatically using Proverif. Our two conditions correspond to two
    broad classes of attacks on unlinkability, corresponding to data and
    control-flow leaks.\par
    This theoretical result is general enough to apply to a wide class
    of protocols. In particular, we apply our techniques to provide the
    first formal security proof of the BAC protocol (e-passport). Our
    work has also lead to the discovery of new attacks, including one on
    the LAK protocol (RFID authentication) which was previously claimed
    to be unlinkable (in~a weak sense) and one on the PACE protocol
    (e-passport).}
}
@inproceedings{CC-pn16,
  address = {Tor{\'u}n, Poland},
  month = jun,
  year = 2016,
  volume = {9698},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Kordon, Fabrice and Moldt, Daniel},
  acronym = {{PETRI~NETS}'16},
  booktitle = {{P}roceedings of the 37th
               {I}nternational {C}onference on
               {A}pplications and {T}heory of {P}etri {N}ets
               ({PETRI~NETS}'16)},
  author = {Carmona, Josep and Chatain, {\relax Th}omas},
  title = {Anti-Alignments in Conformance Checking~-- The~Dark Side of Process Models},
  pages = {240-258},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CC-pn16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CC-pn16.pdf},
  doi = {10.1007/978-3-319-39086-4_15},
  abstract = {Conformance checking techniques asses the suitability of a
    process model in representing an underlying process, observed
    through a collection of real executions. These techniques suffer
    from the well-known state space explosion problem, hence handling
    process models exhibiting large or even infinite state spaces
    remains a challenge. One important metric in conformance checking is
    to asses the precision of the model with respect to the observed
    executions, i.e., characterize the ability of the model to produce
    behavior unrelated to the one observed. By~avoiding the computation
    of the full state space of a model, current techniques only provide
    estimations of the precision metric, which in some situations tend
    to be very optimistic, thus hiding real problems a process model may
    have. In this paper we present the notion of anti-alignment as a
    concept to help unveiling traces in the model that may deviate
    significantly from the observed behavior. Using anti-alignments,
    current estimations can be improved, e.g., in precision checking. We
    show how to express the problem of finding anti-alignments as the
    satisfiability of a Boolean formula, and provide a tool which can
    deal with large models efficiently.}
}
@comment{{B-arxiv16,
  author =		Bollig, Benedikt, 
  affiliation = 	aff-LSVmexico,
  title =    		One-Counter Automata with Counter Visibility, 
  institution = 	Computing Research Repository, 
  number =    		1602.05940, 
  month = 		feb, 
  nmonth =     		2,
  year = 		2016, 
  type = 		RR, 
  axeLSV = 		mexico,
  NOcontrat = 		"",
  
  url =			http://arxiv.org/abs/1602.05940, 
  PDF =			"http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf",
  lsvdate-new =  	20160222,
  lsvdate-upd =  	20160222,
  lsvdate-pub =  	20160222,
  lsv-category = 	"rapl",
  wwwpublic =    	"public and ccsb",
  note = 		18~pages, 

  abstract = "In a one-counter automaton (OCA), one can read a letter
    from some finite alphabet, increment and decrement the counter by
    one, or test it for zero. It is well-known that universality and
    language inclusion for OCAs are undecidable. We consider here OCAs
    with counter visibility: Whenever the automaton produces a letter,
    it outputs the current counter value along with~it. Hence, its
    language is now a set of words over an infinite alphabet. We show
    that universality and inclusion for that model are in PSPACE, thus
    no harder than the corresponding problems for finite automata, which
    can actually be considered as a special case. In fact, we show that
    OCAs with counter visibility are effectively determinizable and
    closed under all boolean operations. As~a~strict generalization, we
    subsequently extend our model by registers. The general nonemptiness
    problem being undecidable, we impose a bound on the number of
    register comparisons and show that the corresponding nonemptiness
    problem is NP-complete.",
}}
@techreport{DD-arxiv16,
  author = {D{\'i}az{-}Caro, Alejandro and Dowek, Gilles},
  title = {Quantum superpositions and projective measurement in
                  the lambda calculus},
  institution = {Computing Research Repository},
  number = {1601.04294},
  year = {2016},
  month = jan,
  type = {Research Report},
  url = {http://arxiv.org/abs/1601.04294},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-arxiv16.pdf},
  note = {22~pages},
  abstract = {We propose an extension of simply typed lambda-calculus to
    handle some properties of quantum computing. The equiprobable quantum
    superposition is taken as a commutative pair and the quantum measurement
    as a non-deterministic projection over it. Destructive interferences are
    achieved by introducing an inverse symbol with respect to pairs. The
    no-cloning property is ensured by using a combination of syntactic
    linearity with linear logic. Indeed, the syntactic linearity is enough for
    unitary gates, while a function measuring its argument needs to enforce
    that the argument is used only once.}
}
@inproceedings{FGMP-hscc16,
  address = {Vienna, Austria},
  month = apr,
  year = 2016,
  publisher = {ACM Press},
  editor = {Abate, Alessandro and Fainekos, Georgios},
  acronym = {{HSCC}'16},
  booktitle = {{P}roceedings of the 19th {ACM} {I}nternational {C}onference
               on {H}ybrid {S}ystems: {C}omputation and {C}ontrol
               ({HSCC}'16)},
  author = {Fribourg, Laurent and Goubault, {\'E}ric and Mohamed, Sameh
                  and Putot, Sylvie},
  title = {A~Topological Method for Finding Invariant Sets of Switched Systems},
  pages = {61-70},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGMP-hscc16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGMP-hscc16.pdf},
  doi = {10.1145/2883817.2883822},
  abstract = {We~revisit the problem of finding controlled invariants sets
    (viability), for a class of differential inclusions, using topological
    methods based on Wazewski property. In~many ways, this generalizes the
    Viability Theorem approach, which is itself a generalization of the
    Lyapunov function approach for systems described by ordinary differential
    equations. We give a computable criterion based on SoS methods for a class
    of differential inclusions to have a non-empty viability kernel within
    some given region. We use this method to prove the existence of
    (controlled) invariant sets of switched systems inside a region described
    by a polynomial template, both with time-dependent switching and with
    state-based switching through a finite set of hypersurfaces. A~Matlab
    implementation allows us to demonstrate its use.}
}
@phdthesis{rc-phd2016,
  author = {Chr{\'e}tien, R{\'e}my},
  title = {Analyse automatique de propri{\'e}t{\'e}s d'{\'e}quivalence pour
                  les protocoles cryptographiques},
  school = {Laboratoire Sp{\'e}cification et V{\'e}rification,
               ENS Cachan, France},
  type = {Th{\`e}se de doctorat},
  year = 2016,
  month = jan,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/rc-phd16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rc-phd16.pdf}
}
@inproceedings{LS-stacs16,
  address = {Orl{\'e}ans, France},
  month = feb,
  year = 2016,
  volume = {47},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Ollinger, Nicolas and Vollmer, Heribert},
  acronym = {{STACS}'16},
  booktitle = {{P}roceedings of the 33rd {A}nnual
               {S}ymposium on {T}heoretical {A}spects of
               {C}omputer {S}cience
               ({STACS}'16)},
  author = {Leroux, J{\'e}r{\^o}me and Schmitz, Sylvain},
  title = {Ideal Decompositions for Vector Addition Systems},
  pages = {1:1-1:13},
  url = {http://drops.dagstuhl.de/opus/volltexte/2016/5702},
  doi = {10.4230/LIPIcs.STACS.2016.1},
  abstract = {Vector addition systems, or equivalently Petri nets, are one of
    the most popular formal models for the representation and the analysis of
    parallel processes. Many problems for vector addition systems are known to
    be decidable thanks to the theory of well-structured transition systems.
    Indeed, vector addition systems with configurations equipped with the
    classical point-wise ordering are well-structured transition systems.
    Based on this observation, problems like coverability or termination can
    be proven decidable.\par
    However, the theory of well-structured transition systems does not explain
    the decidability of the reachability problem. In this presentation, we
    show that runs of vector addition systems can also be equipped with a well
    quasi-order. This observation provides a unified understanding of the data
    structures involved in solving many problems for vector addition systems,
    including the central reachability problem.}
}
@article{siglog16-Schmitz,
  publisher = {ACM Press},
  journal = {SIGLOG News},
  author = {Schmitz, Sylvain},
  title = {Automata column: The~complexity of reachability in
                  vector addition systems},
  volume = 3,
  number = 1,
  pages = {3-21},
  year = 2016,
  month = jan,
  url = {https://hal.inria.fr/hal-01275972},
  doi = {10.1145/2893582.2893585},
  annote = {Invited column},
  abstract = {The program of the 30th Symposium on Logic in Computer Science
    held in 2015 in Kyoto included two contributions on the computational
    complexity of the reachability problem for vector addition systems:
    Blondin, Finkel, G{\"o}ller, Haase, and McKenzie~[2015] attacked the
    problem by providing the first tight complexity bounds in the case of
    dimension-2 systems with states, while Leroux and Schmitz~[2015] proved
    the first complexity upper bound in the general case. The purpose of this
    column is to present the main ideas behind these two results, and more
    generally survey the current state of affairs.}
}
@article{CFS-tcs16,
  publisher = {Elsevier Science Publishers},
  journal = {Theoretical Computer Science},
  author = {Chambart, Pierre and Finkel, Alain and Schmitz, Sylvain},
  title = {Forward Analysis and Model Checking for Trace
                  Bounded~{WSTS}},
  year = 2016,
  volume = {637},
  pages = {1-29},
  month = jul,
  url = {http://arxiv.org/abs/1004.2802},
  doi = {10.1016/j.tcs.2016.04.020},
  abstract = {We investigate a subclass of well-structured transition
     systems~(WSTS), the bounded---in the sense of Ginsburg and Spanier
     (Trans.~AMS, 1964)---complete deterministic ones, which we claim provide
     an adequate basis for the study of forward analyses as developed by
     Finkel and Goubault-Larrecq (ICALP~2009). Indeed, we prove that, unlike
     other conditions considered previously for the termination of forward
     analysis, boundedness is decidable. Boundedness turns out to be a
     valuable restriction for WSTS verification, as we show that it further
     allows to decide all {{\(\omega\)}}-regular properties on the set of infinite
     traces of the system.}
}
@article{toct-Schmitz13,
  publisher = {ACM Press},
  journal = {ACM Transactions on Computation Theory},
  author = {Schmitz, Sylvain},
  title = {Complexity Hierarchies Beyond {E}lementary},
  volume = {8},
  number = {1:3},
  nopages = {},
  year = 2016,
  month = feb,
  url = {http://arxiv.org/abs/1312.5686},
  doi = {10.1145/2858784},
  abstract = {We introduce a hierarchy of fast-growing complexity classes and
     show its suitability for completeness statements of many non elementary
     problems. This hierarchy allows the classification of many decision
     problems with a non-elementary complexity, which occur naturally in
     logic, combinatorics, formal languages, verification, etc., with
     complexities ranging from simple towers of exponentials to Ackermannian
     and beyond.}
}
@inproceedings{CCHPW-fossacs16,
  address = {Eindhoven, The~Netherlands},
  month = apr,
  year = 2016,
  volume = {9634},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Jacobs, Bart and L{\"o}ding, Christof},
  acronym = {{FoSSaCS}'16},
  booktitle = {{P}roceedings of the 19th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'16)},
  author = {Chistikov, Dmitry and Czerwi{\'n}ski, Wojciech and Hofman,
                  Piotr and Pilipczuk, Micha{\l} and Wehar, Michael},
  title = {Shortest paths in one-counter systems},
  pages = {462-478},
  url = {http://arxiv.org/abs/1510.05460},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCHPW-fossacs16.pdf},
  doi = {10.1007/978-3-662-49630-5_27},
  abstract = {We show that any one-counter automaton with \(n\) states, if its
    language is non-empty, accepts some word of length at most~\(O(n^2)\).
    This closes the gap between the previously known upper bound of~\(O(n^3)\)
    and lower bound of~\(\Omega(n^2)\). More generally, we prove a tight upper
    bound on the length of shortest paths between arbitrary configurations in
    one-counter transition systems. Weaker bounds have previously appeared in
    the literature, and our result offers an improvement.}
}
@inproceedings{HLLLST-fossacs16,
  address = {Eindhoven, The~Netherlands},
  month = apr,
  year = 2016,
  volume = {9634},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Jacobs, Bart and L{\"o}ding, Christof},
  acronym = {{FoSSaCS}'16},
  booktitle = {{P}roceedings of the 19th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'16)},
  author = {Hofman, Piotr and Lasota, S{\l}awomir and Lazi{\'c}, Ranko and
                  Leroux, J{\'e}r{\^o}me and Schmitz, Sylvain and Totzke, Patrick},
  title = {Coverability Trees for {P}etri Nets with Unordered Data},
  pages = {445-461},
  url = {https://hal.inria.fr/hal-01252674},
  doi = {10.1007/978-3-662-49630-5_26},
  abstract = {We study an extension of classical Petri nets where tokens carry
    values from a countable data domain, that can be tested for equality upon
    firing transitions. These Unordered Data Petri Nets (UDPN) are
    well-structured and therefore allow generic decision procedures for
    several verification problems including coverability and boundedness. We
    show how to construct a finite representation of the coverability set in
    terms of its ideal decomposition. This not only provides an alternative
    method to decide coverability and boundedness, but is also an important
    step towards deciding the reachability problem. This also allows to answer
    more precise questions about the reachability set, for instance whether
    there is a bound on the number of tokens on a given place (place
    boundedness), or if such a bound exists for the number of different data
    values carried by tokens (place width boundedness). We provide matching
    Hyper-Ackermann bounds on the size of cover-ability trees and on the
    running time of the induced decision procedures.}
}
@inproceedings{FG-fossacs16,
  address = {Eindhoven, The~Netherlands},
  month = apr,
  year = 2016,
  volume = {9634},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Jacobs, Bart and L{\"o}ding, Christof},
  acronym = {{FoSSaCS}'16},
  booktitle = {{P}roceedings of the 19th {I}nternational
               {C}onference on {F}oundations of {S}oftware {S}cience
               and {C}omputation {S}tructures
               ({FoSSaCS}'16)},
  author = {Fortin, Marie and Gastin, Paul},
  title = {Verification of parameterized communicating automata via split-width},
  pages = {197-213},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-fossacs16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-fossacs16.pdf},
  doi = {10.1007/978-3-662-49630-5_12},
  abstract = {We~study verification problems for distributed systems
    communicating via unbounded FIFO channels. The number of processes
    of the system as well as the communication topology are not fixed
    a~priori. Systems are given by parameterized communicating automata
    (PCAs) which can be run on any communication topology of bounded
    degree, with arbitrarily many processes. Such systems are Turing
    powerful so we concentrate on under-approximate verification. We
    extend the notion of split-width to behaviors of PCAs. We show that
    emptiness, reachability and model-checking problems of PCAs are
    decidable when restricted to behaviors of bounded split-width.
    Reachability and emptiness are EXPTIME-complete, but only polynomial
    in the size of the PCA. We also describe several concrete classes of
    bounded split-width, for which we prove similar results.}
}
@inproceedings{CDD-post16,
  address = {Eindhoven, The~Netherlands},
  month = apr,
  year = 2016,
  volume = { 9635},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Piessens, Frank and Vigan{\'o}, Luca},
  acronym = {{POST}'16},
  booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on
  	   {P}rinciples of {S}ecurity and {T}rust 
           ({POST}'16)},
  author = {Cortier, V{\'e}ronique and Dallon, Antoine and
                   Delaune, St{\'e}phanie},
  title = {Bounding the number of agents, for equivalence~too},
  pages = {211-232},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post16.pdf},
  doi = {10.1007/978-3-662-49635-0_11},
  abstract = {Bounding the number of agents is a current practice when
    modeling a protocol. In~2003, it has been shown that one honest agent and
    one dishonest agent are indeed sufficient to find all possible attacks,
    for secrecy properties. This is no longer the case for equivalence
    properties, crucial to express many properties such as vote privacy or
    untraceability.\par
    In this paper, we show that it is sufficient to consider two honest agents
    and two dishonest agents for equivalence properties, for deterministic
    processes with standard primitives and without else branches. More
    generally, we show how to bound the number of agents for arbitrary
    constructor theories and for protocols with simple else branches. We show
    that our hypotheses are tight, providing counter-examples for non
    actiondeterministic processes, non constructor theories, or protocols with
    complex else branches.}
}
@inproceedings{tacas16-BFHH,
  address = {Eindhoven, The Netherlands},
  month = apr,
  year = 2016,
  volume = {9636},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Chechik, Marsha and Raskin, Jean-Fran{\c{c}}ois},
  acronym = {{TACAS}'16},
  booktitle = {{P}roceedings of the 22th {I}nternational 
               {C}onference on {T}ools and {A}lgorithms for
               {C}onstruction and {A}nalysis of {S}ystems
               ({TACAS}'16)},
  author = {Blondin, Michael and Finkel, Alain and Haase, Christoph and
                  Haddad, Serge},
  title = {Approaching the Coverability Problem Continuously},
  pages = {480-496},
  url = {http://arxiv.org/abs/1510.05724},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/arxiv15-BFHH.pdf},
  doi = {10.1007/978-3-662-49674-9_28},
  abstract = {The coverability problem for Petri nets plays a central role in
    the verification of concurrent shared-memory programs. However, its high
    EXPSPACE-complete complexity poses a challenge when encountered in
    real-world instances. In this paper, we develop a new approach to this
    problem which is primarily based on applying forward coverability in
    continuous Petri nets as a pruning criterion inside a backward
    coverability framework. A cornerstone of our approach is the efficient
    encoding of a recently developed polynomial-time algorithm for
    reachability in continuous Petri nets into SMT. We demonstrate the
    effectiveness of our approach on standard benchmarks from the literature,
    which shows that our approach decides significantly more instances than
    any existing tool and is in addition often much faster, in particular on
    large instances.}
}
@inproceedings{HH-stacs16,
  address = {Orl{\'e}ans, France},
  month = feb,
  year = 2016,
  volume = {47},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Ollinger, Nicolas and Vollmer, Heribert},
  acronym = {{STACS}'16},
  booktitle = {{P}roceedings of the 33rd {A}nnual
               {S}ymposium on {T}heoretical {A}spects of
               {C}omputer {S}cience
               ({STACS}'16)},
  author = {Haase, Christoph and Hofman, Piotr},
  title = {Tightening the Complexity of Equivalence Problems for
  		  	     Commutative Grammars},
  pages = {41:1-14},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-stacs16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-stacs16.pdf},
  doi = {10.4230/LIPIcs.STACS.2016.41},
  abstract = {Given two finite-state automata, are the Parikh images of the
    languages they generate equivalent? This problem was shown decidable in
    coNEXP by Huynh in 1985 within the more general setting of context-free
    commutative grammars. Huynh conjectured that a~\(\Pi_{2}^{P}\) upper bound
    might be possible, and Kopczy{\'n}ski and To established in 2010 such an
    upper bound when the size of the alphabet is fixed. The contribution of
    this paper is to show that the language equivalence problem for regular
    and context-free commutative grammars is actually coNEXP-complete. In
    addition, our lower bound immediately yields further coNEXP-completeness
    results for equivalence problems for regular commutative expressions,
    reversal-bounded counter automata and communication-free Petri nets.
    Finally, we improve both lower and upper bounds for language equivalence
    for exponent-sensitive commutative grammars.}
}
@inproceedings{BHL-lata16,
  address = {Prague, Czech Republic},
  month = mar,
  year = 2016,
  volume = {9618},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Mart{\'\i}n-Vide, Carlos},
  acronym = {{LATA}'16},
  booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {L}anguage 
	    and {A}utomata {T}heory and {A}pplications ({LATA}'16)},
  author = {Bertrand, Nathalie and Haddad, Serge and Lefaucheux, Engel},
  title = {Accurate Approximate Diagnosability of Stochastic Systems},
  pages = {549-561},
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-lata16.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-lata16.pdf},
  doi = {10.1007/978-3-319-30000-9_42},
  abstract = {Diagnosis of partially observable stochastic systems prone to
    faults was introduced in the late nineties. Diagnosability, i.e. the
    existence of a diagnoser, may be specified in different ways: (1)~exact
    diagnosability (called A-diagnosability) requires that almost surely a
    fault is detected and that no fault is erroneously claimed while
    (2)~approximate diagnosability (called \(\varepsilon\)-diagnosability)
    allows a small probability of error when claiming a fault and (3)~accurate
    approximate diagnosability (called AA-diagnosability) requires that this
    error threshold may be chosen arbitrarily small. Here we mainly focus on
    approximate diagnoses. We first refine the almost sure requirement about
    finite delay introducing a uniform version and showing that while it does
    not discriminate between the two versions of exact diagnosability this is
    no more the case in approximate diagnosis. Then we establish a complete
    picture for the decidability status of the diagnosability problems:
    (uniform) \(\varepsilon\)-diagnosability and uniform AA-diagnosability are
    undecidable while AA-diagnosability is decidable in PTIME, answering a
    longstanding open question.}
}
@article{DD-tocl15b,
  publisher = {ACM Press},
  journal = {ACM Transactions on Computational Logic},
  author = {Demri, St{\'e}phane and Deters, Morgan},
  title = {Expressive Completeness of Separation Logic With Two Variables and
                 No Separating Conjunction},
  volume = {17},
  number = {2},
  pages = {12:1-12:44},
  month = mar,
  year = 2016,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-tocl15b.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-tocl15b.pdf},
  doi = {10.1145/2835490},
  abstract = {Separation logic is used as an assertion language for
    Hoare-style proof systems about programs with pointers, and there is an
    ongoing quest for understanding its complexity and expressive power.
    Herein, we show that first-order separation logic with one record field
    restricted to two variables and the separating implication (no~separating
    conjunction) is as expressive as weak second-order logic, substantially
    sharpening a previous result. Capturing weak second-order logic with such
    a restricted form of separation logic requires substantial updates to
    known proof techniques. We develop these, and as a by-product identify the
    smallest fragment of separation logic known to be undecidable: first-order
    separation logic with one record field, two variables, and no separating
    conjunction. Because we forbid ourselves the use of many syntactic
    resources, this underscores even further the power of separating
    implication on concrete heaps.}
}
@article{HOW-fi15,
  publisher = {{IOS} Press},
  journal = {Fundamenta Informaticae},
  author = {Haase, Christoph and Ouaknine, Jo{\"e}l and Worrell, James},
  title = {Relating Reachability Problems in Timed and Counter Automata},
  volume = {143},
  number = {3-4},
  pages = {317-338},
  year = 2016,
  month = jan,
  url = {http://www.lsv.fr/Publis/PAPERS/PDF/HOW-fi15.pdf},
  pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HOW-fi15.pdf},
  doi = {10.3233/FI-2016-1316},
  abstract = {We establish a relationship between reachability problems in
    timed automata and space-bounded counter automata. We show that
    reachability in timed automata with three or more clocks is
    logarithmic-space inter-reducible with reachability in space-bounded
    counter automata with two counters. We moreover show the logarithmic-space
    equivalence of reachability in two-clock timed automata and space-bounded
    one-counter automata. This last reduction has recently been employed by
    Fearnley and Jurdzi{\'n}ski to settle the computational complexity of
    reachability in two-clock timed automata.}
}
@techreport{BJM-arxiv16,
  author = {Bouyer, Patricia and Markey, Nicolas and Jug{\'e}, Vincent},
  title = {Dynamic Complexity of Parity Games with Bounded Tree-Width},
  institution = {Computing Research Repository},
  number = {1610.00571},
  year = {2016},
  url = {https://arxiv.org/abs/1610.00571},
  pdf = {https://arxiv.org/abs/1610.00571},
  month = oct,
  type = {Research Report},
  note = {33~pages}
}
@misc{mcc:2016,
  author = {F. Kordon and H. Garavel and L. M. Hillah and Hulin{-}Hubard, Francis
and G. Chiardo and A. Hamez and L. Jezequel and A. Miner and J. Meijer
and E. Paviot-Adet and D. Racordon and C. Rodriguez and C. Rohr and J.
Srba and Y. Thierry-Mieg and G. Tr{\d i}nh and K. Wolf},
  month = jun,
  title = {{Complete Results for the 2016 Edition of the Model Checking Contest}},
  year = {2016},
  url = {http://mcc.lip6.fr/2016/results.php}
}
@misc{JGL:pls16,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {Encart dans l'article ''S'adapter {\`a} la cyberguerre'', de Karen Elazari, Pour La Science 459},
  month = jan,
  title = {Les m{\'e}thodes formelles: l'autre arme de la cybers{\'e}curit{\'e}},
  year = {2016},
  pages = {50-55}
}
@misc{JGL:stc16,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {Invited talk (plenary speaker), Summer Topology Conference, Leicester, UK},
  month = aug,
  title = {A few things on Noetherian spaces},
  year = {2016}
}
@misc{JGL:gs16,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {Invited talk, Galway Symposium, Leicester, UK},
  month = aug,
  title = {An introduction to asymmetric topology and domain theory: why, what, and how},
  year = {2016}
}
@misc{JGL:dm16,
  author = {Goubault{-}Larrecq, Jean},
  howpublished = {Invited talk, Dale Miller Festschrift, Paris Diderot University, Paris},
  month = dec,
  title = {A semantics for {{\(\nabla\)}}},
  year = {2016}
}
@misc{GSHM:dga-inria16,
  author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Hulin-Hubard, Francis and Majorczyk, Fr{\'e}d{\'e}ric},
  howpublished = {Rapport final et fourniture 4 du contrat DGA-INRIA Orchids},
  month = may,
  title = {Etat final des travaux engag{\'e}s sur {Orchids}},
  year = {2016}
}
@misc{GM:dga-inria16,
  author = {Goubault-Larrecq, Jean and Majorczyk, Fr{\'e}d{\'e}ric},
  howpublished = {Fourniture 3 du contrat DGA-INRIA Orchids},
  month = may,
  title = {G{\'e}n{\'e}ration de signatures pour le suivi de flux d'informations},
  year = {2016}
}
@inproceedings{AMP-lfmtp16,
  address = {Porto, Portugal},
  month = jun,
  publisher = {ACM Press},
  editor = {Dowek, Gilles and Licata, Daniel R. and Alves, Sandra},
  acronym = {{LFMTP}'16},
  booktitle = {Proceedings of the 11th {I}nternational {W}orkshop on {L}ogical {F}rameworks and 
           {M}eta-{L}anguages: {T}heory and {P}ractice ({LFMTP}'16)},
  author = {Cauderlier, Rapha{\"e}l},
  title = {{{A Rewrite System for Proof Constructivization}}},
  pages = {2:1-2:7},
  year = {2016},
  doi = {10.1007/978-3-319-40578-0\_5},
  url = {https://hal.inria.fr/hal-01420634/},
  pdf = {https://hal.inria.fr/hal-01420634/file/LFMTP_2016.pdf},
  abstract = {Proof constructivization is the problem of automatically extracting constructive proofs out of classical proofs. This process is required when classical theorem provers are integrated in intuitionistic proof assistants. We use the ability of rewrite systems to represent partial functions to implement heuristics for proof constructivization in Dedukti, a logical framework based on rewriting in which proofs are first-class objects which can be the subject of computation. We benchmark these heuristics on the proofs output by the automated theorem prover Zenon on the TPTP library of problems.}
}
@inproceedings{AMP-rc16,
  address = {Bologna, Italy},
  month = jul,
  volume = 9720,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Lanese, Ivan and Devitt, Simon},
  acronym = {{RC}'16},
  booktitle = {8th Conference on Reversible Computation (RC'16)},
  author = {Arrighi, Pablo and Martiel, Simon and Perdrix, Simon},
  title = {{{Reversible Causal Graph Dynamics}}},
  pages = {73-88},
  year = {2016},
  doi = {10.1007/978-3-319-40578-0\_5},
  url = {https://hal.archives-ouvertes.fr/hal-01361427},
  abstract = {Causal Graph Dynamics extend Cellular Automata to arbitrary , bounded-degree, time-varying graphs. The whole graph evolves in discrete time steps, and this global evolution is required to have a number of physics-like symmetries: shift-invariance (it acts everywhere the same) and causality (information has a bounded speed of propagation). We add a further physics-like symmetry, namely reversibility.}
}
@inproceedings{ADJL-hatt2016,
  author = {Assaf, Ali and Dowek, Gilles and Jouannaud, Jean-Pierre and Liu, Jiaxiang},
  title = {{{Encoding Proofs in Dedukti: the case of Coq proofs}}},
  nopages = {},
  booktitle = {Preliminary Proceedings of the 1st International Workshop on Hammers for Type Theories (HaTT'16)},
  year = {2016},
  address = {Coimbra, Portugal},
  url = {https://hal.inria.fr/hal-01330980},
  pdf = {https://hal.inria.fr/hal-01330980/file/HaTT_2016_paper_3.pdf},
  abstract = {A main ambition of the Inria project Dedukti is to serve as a common language for representing and type checking proof objects originating from other proof systems. Encoding these proof objects makes heavy use of the rewriting capabilities of LambdaPiModulo, the formal system on which Dedukti is based. So far, the proofs generated by two automatic proof systems, Zenon and iProver, have been encoded, and can therefore be read and checked by Dedukti. But Dedukti goes far beyond this so-called hammering technique of sending goals to automated provers. Proofs from HOL and Matita can be encoded as well. Some Coq?s proofs can be encoded already, when they do not use universe polymorphism. Our ambition here is to close this remaining gap. To this end, we describe a rewrite-based encoding in LambdaPiModulo of the Calculus of Constructions with a cumulative hierarchy of predicative universes above Prop, which is confluent on open terms.}
}
@inproceedings{ADJL-hor2016,
  author = {Assaf, Ali and Dowek, Gilles and Jouannaud, Jean-Pierre and Liu, Jiaxiang},
  title = {{{Untyped Confluence in Dependent Type Theories}}},
  nopages = {},
  booktitle = {Proceedings of the 8th International Workshop on Higher-Order Rewriting (HOR'16)},
  year = {2016},
  address = {Porto, Portugal},
  url = {https://hal.inria.fr/hal-01330955},
  pdf = {https://hal.inria.fr/hal-01330955/file/HOR_2016_paper.pdf},
  abstract = {We investigate techniques based on van Oostrom's decreasing diagrams that reduce confluence proofs to the checking of critical pairs in the absence of termination properties, which are useful in dependent type calculi to prove confluence on untyped terms. These techniques are applied to a complex example originating from practice: a faithful encoding, in an extension of LF with rewrite rules on objects and types, of a subset of the calculus of inductive constructions with a cumulative hierarchy of predicative universes above Prop. The rules may be first-order or higher-order, plain or modulo, non-linear on the right or on the left. Variables which occur non-linearly in lefthand sides of rules must take their values in confined types: in our example, the natural numbers. The first-order rules are assumed to be terminating and confluent modulo some theory: in our example, associativity, commutativity and identity. Critical pairs involving higher-order rules must satisfy van Oostrom's decreasing diagram condition wrt their indexes taken as labels.}
}
@inproceedings{A-types2016,
  address = {Novi Sad, Serbia},
  volume = {97},
  series = {Leibniz International Proceedings in Informatics},
  publisher = {Leibniz-Zentrum f{\"u}r Informatik},
  editor = {Ghilezan, Silvia and Ivetic, Jelena},
  acronym = {{TYPES}'16},
  booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {T}ypes for {P}roofs and {P}rograms
           ({TYPES}'16)},
  author = {Assaf, Ali and Burel, Guillaume and Cauderlier, Rapha{\"e}l and Delahaye, David and Dowek, Gilles and Dubois, Catherine and Gilbert, Fr{\'e}d{\'e}ric and Halmagrand, Pierre and Hermant, Olivier and Saillard, Ronan},
  title = {{{Expressing theories in the {{\(\lambda\Pi\)}}-calculus modulo theory and in the Dedukti system}}},
  year = {2016},
  note = {To appear}
}
@unpublished{D-preprint2016,
  title = {{Rules and derivations in an elementary logic course}},
  author = {Dowek, Gilles},
  note = {preprint},
  year = {2016},
  month = jan,
  url = {https://hal.inria.fr/hal-01252124/},
  pdf = {https://hal.inria.fr/hal-01252124/file/ttl.pdf},
  abstract = {When teaching an elementary logic course to students who have a general scientific background but have never been exposed to logic, we have to face the problem that the notions of deduction rule and of derivation are completely new to them, and are related to nothing they already know, unlike, for instance, the notion of model, that can be seen as a generalization of the notion of algebraic structure. In this note, we defend the idea that one strategy to introduce these notions is to start with the notion of inductive definition [1]. Then, the notion of derivation comes naturally. We also defend the idea that derivations are pervasive in logic and that defining precisely this notion at an early stage is a good investment to later define other notions in proof theory, computability theory, automata theory, ... Finally, we defend the idea that to define the notion of derivation precisely, we need to distinguish two notions of derivation: labeled with elements and labeled with rule names. This approach has been taken in [2].}
}
@unpublished{AD-preprint2016,
  title = {{What is the Planck constant the magnitude of?}},
  author = {Arrighi, Pablo and Dowek, Gilles},
  note = {preprint},
  year = {2016},
  month = dec,
  url = {https://hal.inria.fr/hal-01421711},
  pdf = {https://hal.inria.fr/hal-01421711/file/planck.pdf},
  abstract = {The Planck constant is the minimal area of one bit.}
}
@inproceedings{CD-ictac16,
  address = {Taipei, Taiwan},
  month = oct,
  volume = 9965,
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  editor = {Alves Sampaio, Cesar and Wang, Farn},
  acronym = {{ICTAC}'16},
  booktitle = {{P}roceedings of the 13th {I}nternational {C}olloquium on
	{T}heoretical {A}spects of {C}omputing ({ICTAC}'16)},
  author = {Cauderlier, Rapha{\"e}l and Dubois, Catherine},
  title = {{{ML Pattern-Matching, Recursion, and Rewriting: From FoCaLiZe to Dedukti}}},
  pages = {459-468},
  year = {2016},
  pdf = {https://hal.inria.fr/hal-01420638/file/ICTAC_2016.pdf},
  url = {https://hal.inria.fr/hal-01420638/},
  abstract = {The programming environment FoCaLiZe allows the user to specify, implement, and prove programs with the help of the theorem prover Zenon. In the actual version, those proofs are verified by Coq. In this paper we propose to extend the FoCaLiZe compiler by a backend to the Dedukti language in order to benefit from Zenon Modulo, an extension of Zenon for Deduction modulo. By doing so, FoCaLiZe can benefit from a technique for finding and verifying proofs more quickly. The paper focuses mainly on the process that overcomes the lack of local pattern-matching and recursive definitions in Dedukti.}
}
@mastersthesis{m2-thire,
  author = {Thir{\'e}, Fran{\c{c}}ois},
  title = {Reverse engineering on arithmetic proofs},
  school = {{M}aster {P}arisien de {R}echerche en 
	{I}nformatique, Paris, France},
  type = {Rapport de {M}aster},
  year = {2016},
  month = aug,
  url = {https://hal.inria.fr/hal-01424816},
  pdf = {https://hal.inria.fr/hal-01424816/file/main.pdf},
  note = {26~pages}
}
@phdthesis{ph-phd2016,
  author = {Halmagrand, Pierre},
  title = {{Automated Deduction and Proof Certification for the B Method}},
  school = {{Conservatoire National Des Arts et M{\'e}tiers, Paris}},
  type = {Th{\`e}se de doctorat},
  year = 2016,
  month = dec,
  url = {https://hal.inria.fr/tel-01420460/}
}
@inproceedings{AD-dcm15,
  address = {Cali, Colombia},
  month = mar,
  volume = 204,
  series = {Electronic Proceedings in Theoretical Computer Science},
  editor = {Mu\~noz, C\'esar A. and P\'erez, Jorge A.},
  acronym = {{DCM}'15},
  booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshop on 
	   {D}evelopments in {C}omputational {M}odels ({DCM}'15)},
  author = {Arrighi, Pablo and Dowek, Gilles},
  doi = {10.4204/EPTCS.204.1},
  pages = {1-10},
  title = {Free fall and cellular automata},
  url = {https://hal.inria.fr/hal-01421712},
  year = {2016},
  abstract = {Three reasonable hypotheses lead to the thesis that physical phenomena can be described and simulated with cellular automata. In this work, we attempt to describe the motion of a particle upon which a constant force is applied, with a cellular automaton, in Newtonian physics, in Special Relativity, and in General Relativity. The results are very different for these three theories.}
}
@article{BGMS-toct16,
  publisher = {ACM Press},
  journal = {ACM Transactions on Computation Theory},
  author = {Beame, Paul and Grosshans, Nathan and McKenzie, Pierre and Segoufin, Luc},
  title = {Nondeterminism and An Abstract Formulation of {Ne\v{c}iporuk}'s Lower Bound Method},
  volume = {9},
  number = {1},
  year = {2016},
  pages = {5:1-5:34},
  doi = {10.1145/3013516},
  month = dec
}
@inproceedings{DLM-pnse16,
  address = {Torun, Poland},
  month = jun,
  year = 2016,
  volume = 1591,
  series = {CEUR Workshop Proceedings},
  publisher = {CEUR-WS.org},
  editor = {Lawrence Cabac and Lars Michael Kristensen and Heiko R{\"o}lke:},
  acronym = {{PNSE}'16},
  booktitle = {{P}roceedings of the 10th {I}nternational {W}orkshop on {P}etri
                  {N}ets and {S}oftware {E}ngineering ({PNSE}'16)},
  author = {Alban Linard and
               Beno{\^{\i}}t Barbot and
               Didier Buchs and
               Maximilien Colange and
               Cl{\'{e}}ment D{\'{e}}moulins and
               Lom{-}Messan Hillah and
               Alexis Martin},
  title = {Layered Data: {A} Modular Formal Definition without Formalisms},
  pages = {287-306},
  url = {http://ceur-ws.org/Vol-1591/},
  pdf = {http://ceur-ws.org/Vol-1591/paper19.pdf},
  abstract = {Defining formalisms and models in a modular way is a painful task. Metamodeling tools and languages have usually not been created with this goal in mind. This article proposes a data structure, called layered data, that allows defining easily modular abstract syntax for for- malisms and models. It also shows its use through an exhaustive example. As a side effect, this article discusses the notion of formalism, and asserts that they do not exist as standalone objects, but rather as relations between models.}
}

This file was generated by bibtex2html 1.98.