[{"conference":{"name":"CAV: Computer Aided Verification","end_date":"2010-07-19","location":"Edinburgh, United Kingdom","start_date":"201-07-15"},"date_published":"2010-07-09T00:00:00Z","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","first_name":"Krishnendu"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A"},{"full_name":"Jobstmann, Barbara","last_name":"Jobstmann","first_name":"Barbara"},{"last_name":"Singh","first_name":"Rohit","full_name":"Singh, Rohit"}],"related_material":{"record":[{"status":"public","relation":"later_version","id":"1856"}]},"alternative_title":["LNCS"],"date_updated":"2023-02-23T10:17:28Z","doi":"10.1007/978-3-642-14295-6_34","scopus_import":1,"quality_controlled":"1","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1004.0739"}],"intvolume":"      6174","publication_status":"published","day":"09","language":[{"iso":"eng"}],"month":"07","title":"Measuring and synthesizing systems in probabilistic environments","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"publisher":"Springer","oa_version":"Preprint","date_created":"2018-12-11T12:05:35Z","publist_id":"2313","abstract":[{"text":"Often one has a preference order among the different systems that satisfy a given specification. Under a probabilistic assumption about the possible inputs, such a preference order is naturally expressed by a weighted automaton, which assigns to each word a value, such that a system is preferred if it generates a higher expected value. We solve the following optimal-synthesis problem: given an omega-regular specification, a Markov chain that describes the distribution of inputs, and a weighted automaton that measures how well a system satisfies the given specification tinder the given input assumption, synthesize a system that optimizes the measured value. For safety specifications and measures that are defined by mean-payoff automata, the optimal-synthesis problem amounts to finding a strategy in a Markov decision process (MDP) that is optimal for a long-run average reward objective, which can be done in polynomial time. For general omega-regular specifications, the solution rests on a new, polynomial-time algorithm for computing optimal strategies in MDPs with mean-payoff parity objectives. We present some experimental results showing optimal systems that were automatically generated in this way.","lang":"eng"}],"page":"380 - 395","volume":6174,"type":"conference","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"3864","year":"2010","status":"public","oa":1,"acknowledgement":"This research was supported by the European Union project COMBEST and the European Network of Excellence ArtistDesign.","citation":{"apa":"Chatterjee, K., Henzinger, T. A., Jobstmann, B., &#38; Singh, R. (2010). Measuring and synthesizing systems in probabilistic environments (Vol. 6174, pp. 380–395). Presented at the CAV: Computer Aided Verification, Edinburgh, United Kingdom: Springer. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_34\">https://doi.org/10.1007/978-3-642-14295-6_34</a>","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, Barbara Jobstmann, and Rohit Singh. “Measuring and Synthesizing Systems in Probabilistic Environments,” 6174:380–95. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_34\">https://doi.org/10.1007/978-3-642-14295-6_34</a>.","ieee":"K. Chatterjee, T. A. Henzinger, B. Jobstmann, and R. Singh, “Measuring and synthesizing systems in probabilistic environments,” presented at the CAV: Computer Aided Verification, Edinburgh, United Kingdom, 2010, vol. 6174, pp. 380–395.","mla":"Chatterjee, Krishnendu, et al. <i>Measuring and Synthesizing Systems in Probabilistic Environments</i>. Vol. 6174, Springer, 2010, pp. 380–95, doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_34\">10.1007/978-3-642-14295-6_34</a>.","short":"K. Chatterjee, T.A. Henzinger, B. Jobstmann, R. Singh, in:, Springer, 2010, pp. 380–395.","ista":"Chatterjee K, Henzinger TA, Jobstmann B, Singh R. 2010. Measuring and synthesizing systems in probabilistic environments. CAV: Computer Aided Verification, LNCS, vol. 6174, 380–395.","ama":"Chatterjee K, Henzinger TA, Jobstmann B, Singh R. Measuring and synthesizing systems in probabilistic environments. In: Vol 6174. Springer; 2010:380-395. doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_34\">10.1007/978-3-642-14295-6_34</a>"}},{"page":"293 - 307","volume":6013,"type":"conference","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","intvolume":"      6013","_id":"3865","publication_status":"published","year":"2010","status":"public","day":"21","citation":{"ieee":"K. Chatterjee, L. De Alfaro, V. Raman, and C. Sánchez, “Analyzing the impact of change in multi-threaded programs,” presented at the FASE: Fundamental Approaches To Software Engineering, Paphos, Cyprus, 2010, vol. 6013, pp. 293–307.","chicago":"Chatterjee, Krishnendu, Luca De Alfaro, Vishwanath Raman, and César Sánchez. “Analyzing the Impact of Change in Multi-Threaded Programs.” edited by David Rosenblum and Gabriele Taenzer, 6013:293–307. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-12029-9_21\">https://doi.org/10.1007/978-3-642-12029-9_21</a>.","apa":"Chatterjee, K., De Alfaro, L., Raman, V., &#38; Sánchez, C. (2010). Analyzing the impact of change in multi-threaded programs. In D. Rosenblum &#38; G. Taenzer (Eds.) (Vol. 6013, pp. 293–307). Presented at the FASE: Fundamental Approaches To Software Engineering, Paphos, Cyprus: Springer. <a href=\"https://doi.org/10.1007/978-3-642-12029-9_21\">https://doi.org/10.1007/978-3-642-12029-9_21</a>","ama":"Chatterjee K, De Alfaro L, Raman V, Sánchez C. Analyzing the impact of change in multi-threaded programs. In: Rosenblum D, Taenzer G, eds. Vol 6013. Springer; 2010:293-307. doi:<a href=\"https://doi.org/10.1007/978-3-642-12029-9_21\">10.1007/978-3-642-12029-9_21</a>","ista":"Chatterjee K, De Alfaro L, Raman V, Sánchez C. 2010. Analyzing the impact of change in multi-threaded programs. FASE: Fundamental Approaches To Software Engineering, LNCS, vol. 6013, 293–307.","mla":"Chatterjee, Krishnendu, et al. <i>Analyzing the Impact of Change in Multi-Threaded Programs</i>. Edited by David Rosenblum and Gabriele Taenzer, vol. 6013, Springer, 2010, pp. 293–307, doi:<a href=\"https://doi.org/10.1007/978-3-642-12029-9_21\">10.1007/978-3-642-12029-9_21</a>.","short":"K. Chatterjee, L. De Alfaro, V. Raman, C. Sánchez, in:, D. Rosenblum, G. Taenzer (Eds.), Springer, 2010, pp. 293–307."},"language":[{"iso":"eng"}],"month":"04","department":[{"_id":"KrCh"}],"title":"Analyzing the impact of change in multi-threaded programs","publisher":"Springer","oa_version":"None","date_created":"2018-12-11T12:05:35Z","conference":{"name":"FASE: Fundamental Approaches To Software Engineering","end_date":"2010-03-28","location":"Paphos, Cyprus","start_date":"2010-03-20"},"publist_id":"2315","editor":[{"first_name":"David","last_name":"Rosenblum","full_name":"Rosenblum, David"},{"first_name":"Gabriele","last_name":"Taenzer","full_name":"Taenzer, Gabriele"}],"date_published":"2010-04-21T00:00:00Z","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu"},{"last_name":"De Alfaro","first_name":"Luca","full_name":"De Alfaro, Luca"},{"full_name":"Raman, Vishwanath","last_name":"Raman","first_name":"Vishwanath"},{"first_name":"César","last_name":"Sánchez","full_name":"Sánchez, César"}],"date_updated":"2021-01-12T07:52:47Z","doi":"10.1007/978-3-642-12029-9_21","alternative_title":["LNCS"],"scopus_import":1,"abstract":[{"lang":"eng","text":"We introduce a technique for debugging multi-threaded C programs and analyzing the impact of source code changes, and its implementation in the prototype tool DIRECT. Our approach uses a combination of source code instrumentation and runtime management. The source code along with a test harness is instrumented to monitor Operating System (OS) and user defined function calls. DIRECT tracks all concurrency control primitives and, optionally, data from the program. DIRECT maintains an abstract global state that combines information from every thread, including the sequence of function calls and concurrency primitives executed. The runtime manager can insert delays, provoking thread inter-leavings that may exhibit bugs that are difficult to reach otherwise. The runtime manager collects an approximation of the reachable state space and uses this approximation to assess the impact of change in a new version of the program."}],"quality_controlled":"1"},{"conference":{"location":"Edinburgh, UK","start_date":"2010-07-15","name":"CAV: Computer Aided Verification","end_date":"2010-07-19"},"file_date_updated":"2020-07-14T12:46:19Z","scopus_import":1,"quality_controlled":"1","editor":[{"first_name":"Tayssir","last_name":"Touili","full_name":"Touili, Tayssir"},{"last_name":"Cook","first_name":"Byron","full_name":"Cook, Byron"},{"last_name":"Jackson","first_name":"Paul","full_name":"Jackson, Paul"}],"author":[{"last_name":"Bloem","first_name":"Roderick","full_name":"Bloem, Roderick"},{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"},{"last_name":"Greimel","first_name":"Karin","full_name":"Greimel, Karin"},{"first_name":"Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Jobstmann, Barbara","first_name":"Barbara","last_name":"Jobstmann"}],"pubrep_id":"54","date_published":"2010-07-01T00:00:00Z","doi":"10.1007/978-3-642-14295-6_36","alternative_title":["LNCS"],"date_updated":"2021-01-12T07:52:47Z","intvolume":"      6174","publication_status":"published","file":[{"content_type":"application/pdf","date_created":"2018-12-12T10:16:52Z","relation":"main_file","access_level":"open_access","creator":"system","file_size":213083,"checksum":"9d204611c8d7855bed8134f8708a0010","file_name":"IST-2012-54-v1+1_Robustness_in_the_presence_of_liveness.pdf","date_updated":"2020-07-14T12:46:19Z","file_id":"5243"}],"language":[{"iso":"eng"}],"project":[{"call_identifier":"FP7","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","name":"COMponent-Based Embedded Systems design Techniques","grant_number":"215543"},{"call_identifier":"FP7","_id":"25F1337C-B435-11E9-9278-68D0E5697425","name":"Design for Embedded Systems","grant_number":"214373"}],"month":"07","day":"01","ddc":["004"],"oa_version":"Submitted Version","ec_funded":1,"date_created":"2018-12-11T12:05:36Z","publist_id":"2310","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"title":"Robustness in the presence of liveness","publisher":"Springer","abstract":[{"text":"Systems ought to behave reasonably even in circumstances that are not anticipated in their specifications. We propose a definition of robustness for liveness specifications which prescribes, for any number of environment assumptions that are violated, a minimal number of system guarantees that must still be fulfilled. This notion of robustness can be formulated and realized using a Generalized Reactivity formula. We present an algorithm for synthesizing robust systems from such formulas. For the important special case of Generalized Reactivity formulas of rank 1, our algorithm improves the complexity of [PPS06] for large specifications with a small number of assumptions and guarantees.","lang":"eng"}],"_id":"3866","year":"2010","has_accepted_license":"1","page":"410 - 424","volume":6174,"type":"conference","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","citation":{"chicago":"Bloem, Roderick, Krishnendu Chatterjee, Karin Greimel, Thomas A Henzinger, and Barbara Jobstmann. “Robustness in the Presence of Liveness.” edited by Tayssir Touili, Byron Cook, and Paul Jackson, 6174:410–24. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_36\">https://doi.org/10.1007/978-3-642-14295-6_36</a>.","ieee":"R. Bloem, K. Chatterjee, K. Greimel, T. A. Henzinger, and B. Jobstmann, “Robustness in the presence of liveness,” presented at the CAV: Computer Aided Verification, Edinburgh, UK, 2010, vol. 6174, pp. 410–424.","apa":"Bloem, R., Chatterjee, K., Greimel, K., Henzinger, T. A., &#38; Jobstmann, B. (2010). Robustness in the presence of liveness. In T. Touili, B. Cook, &#38; P. Jackson (Eds.) (Vol. 6174, pp. 410–424). Presented at the CAV: Computer Aided Verification, Edinburgh, UK: Springer. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_36\">https://doi.org/10.1007/978-3-642-14295-6_36</a>","ama":"Bloem R, Chatterjee K, Greimel K, Henzinger TA, Jobstmann B. Robustness in the presence of liveness. In: Touili T, Cook B, Jackson P, eds. Vol 6174. Springer; 2010:410-424. doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_36\">10.1007/978-3-642-14295-6_36</a>","ista":"Bloem R, Chatterjee K, Greimel K, Henzinger TA, Jobstmann B. 2010. Robustness in the presence of liveness. CAV: Computer Aided Verification, LNCS, vol. 6174, 410–424.","short":"R. Bloem, K. Chatterjee, K. Greimel, T.A. Henzinger, B. Jobstmann, in:, T. Touili, B. Cook, P. Jackson (Eds.), Springer, 2010, pp. 410–424.","mla":"Bloem, Roderick, et al. <i>Robustness in the Presence of Liveness</i>. Edited by Tayssir Touili et al., vol. 6174, Springer, 2010, pp. 410–24, doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_36\">10.1007/978-3-642-14295-6_36</a>."},"status":"public","oa":1},{"file_date_updated":"2020-07-14T12:46:19Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nd/4.0/legalcode","name":"Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0)","short":"CC BY-ND (4.0)","image":"/image/cc_by_nd.png"},"pubrep_id":"504","date_published":"2010-08-30T00:00:00Z","author":[{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X"},{"full_name":"Doyen, Laurent","last_name":"Doyen","first_name":"Laurent"},{"full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724"}],"related_material":{"record":[{"status":"public","relation":"earlier_version","id":"4540"}]},"doi":"10.2168/LMCS-6(3:10)2010","date_updated":"2023-02-23T12:15:42Z","scopus_import":1,"quality_controlled":"1","license":"https://creativecommons.org/licenses/by-nd/4.0/","intvolume":"         6","file":[{"date_updated":"2020-07-14T12:46:19Z","file_id":"5312","file_size":216598,"file_name":"IST-2012-55-v1+1_Expressiveness_Closure_Properties_Quantitative_Languages.pdf","checksum":"0243da726476817f2ea33b48b78be696","relation":"main_file","access_level":"open_access","creator":"system","content_type":"application/pdf","date_created":"2018-12-12T10:17:54Z"},{"date_created":"2018-12-12T10:17:55Z","content_type":"application/pdf","creator":"system","access_level":"open_access","relation":"main_file","checksum":"5e512b8503a9cb263de26331c4ee9cf2","file_name":"IST-2016-55-v2+1_1007.4018.pdf","file_size":302416,"date_updated":"2020-07-14T12:46:19Z","file_id":"5313"}],"publication_status":"published","ddc":["000","004"],"day":"30","month":"08","project":[{"call_identifier":"FP7","_id":"25F1337C-B435-11E9-9278-68D0E5697425","grant_number":"214373","name":"Design for Embedded Systems"},{"name":"COMponent-Based Embedded Systems design Techniques","grant_number":"215543","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"}],"language":[{"iso":"eng"}],"publication":"Logical Methods in Computer Science","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"title":"Expressiveness and closure properties for quantitative languages","publisher":"International Federation of Computational Logic","ec_funded":1,"date_created":"2018-12-11T12:05:36Z","oa_version":"Published Version","publist_id":"2311","abstract":[{"lang":"eng","text":"Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages L that assign to each word w a real number L(w). In the case of infinite words, the value of a run is naturally computed as the maximum, limsup, liminf, limit-average, or discounted-sum of the transition weights. The value of a word w is the supremum of the values of the runs over w. We study expressiveness and closure questions about these quantitative languages. We first show that the set of words with value greater than a threshold can be omega-regular for deterministic limit-average and discounted-sum automata, while this set is always omega-regular when the threshold is isolated (i.e., some neighborhood around the threshold contains no word). In the latter case, we prove that the omega-regular language is robust against small perturbations of the transition weights. We next consider automata with transition weights 0 or 1 and show that they are as expressive as general weighted automata in the limit-average case, but not in the discounted-sum case. Third, for quantitative languages L-1 and L-2, we consider the operations max(L-1, L-2), min(L-1, L-2), and 1 - L-1, which generalize the boolean operations on languages, as well as the sum L-1 + L-2. We establish the closure properties of all classes of quantitative languages with respect to these four operations."}],"volume":6,"page":"1 - 23","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","type":"journal_article","_id":"3867","has_accepted_license":"1","year":"2010","oa":1,"status":"public","issue":"3","citation":{"ieee":"K. Chatterjee, L. Doyen, and T. A. Henzinger, “Expressiveness and closure properties for quantitative languages,” <i>Logical Methods in Computer Science</i>, vol. 6, no. 3. International Federation of Computational Logic, pp. 1–23, 2010.","chicago":"Chatterjee, Krishnendu, Laurent Doyen, and Thomas A Henzinger. “Expressiveness and Closure Properties for Quantitative Languages.” <i>Logical Methods in Computer Science</i>. International Federation of Computational Logic, 2010. <a href=\"https://doi.org/10.2168/LMCS-6(3:10)2010\">https://doi.org/10.2168/LMCS-6(3:10)2010</a>.","apa":"Chatterjee, K., Doyen, L., &#38; Henzinger, T. A. (2010). Expressiveness and closure properties for quantitative languages. <i>Logical Methods in Computer Science</i>. International Federation of Computational Logic. <a href=\"https://doi.org/10.2168/LMCS-6(3:10)2010\">https://doi.org/10.2168/LMCS-6(3:10)2010</a>","ama":"Chatterjee K, Doyen L, Henzinger TA. Expressiveness and closure properties for quantitative languages. <i>Logical Methods in Computer Science</i>. 2010;6(3):1-23. doi:<a href=\"https://doi.org/10.2168/LMCS-6(3:10)2010\">10.2168/LMCS-6(3:10)2010</a>","mla":"Chatterjee, Krishnendu, et al. “Expressiveness and Closure Properties for Quantitative Languages.” <i>Logical Methods in Computer Science</i>, vol. 6, no. 3, International Federation of Computational Logic, 2010, pp. 1–23, doi:<a href=\"https://doi.org/10.2168/LMCS-6(3:10)2010\">10.2168/LMCS-6(3:10)2010</a>.","short":"K. Chatterjee, L. Doyen, T.A. Henzinger, Logical Methods in Computer Science 6 (2010) 1–23.","ista":"Chatterjee K, Doyen L, Henzinger TA. 2010. Expressiveness and closure properties for quantitative languages. Logical Methods in Computer Science. 6(3), 1–23."}},{"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nd/4.0/legalcode","name":"Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0)","short":"CC BY-ND (4.0)","image":"/image/cc_by_nd.png"},"file_date_updated":"2020-07-14T12:46:19Z","scopus_import":1,"quality_controlled":"1","date_published":"2010-09-01T00:00:00Z","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","first_name":"Krishnendu"},{"last_name":"De Alfaro","first_name":"Luca","full_name":"De Alfaro, Luca"},{"full_name":"Majumdar, Ritankar","first_name":"Ritankar","last_name":"Majumdar"},{"first_name":"Vishwanath","last_name":"Raman","full_name":"Raman, Vishwanath"}],"pubrep_id":"370","related_material":{"record":[{"id":"3504","relation":"earlier_version","status":"public"}]},"doi":"10.2168/LMCS-6(3:13)2010","date_updated":"2023-02-23T11:30:18Z","intvolume":"         6","publication_status":"published","file":[{"date_updated":"2020-07-14T12:46:19Z","file_id":"4671","file_size":346527,"checksum":"a18988135fef3016c93808ecb15b55f5","file_name":"IST-2015-370-v1+1_0809.4326.pdf","relation":"main_file","creator":"system","access_level":"open_access","content_type":"application/pdf","date_created":"2018-12-12T10:08:11Z"}],"language":[{"iso":"eng"}],"month":"09","day":"01","ddc":["000"],"oa_version":"Published Version","date_created":"2018-12-11T12:05:36Z","publist_id":"2312","title":"Algorithms for game metrics","department":[{"_id":"KrCh"}],"publication":"Logical Methods in Computer Science","publisher":"International Federation of Computational Logic","abstract":[{"lang":"eng","text":"Simulation and bisimulation metrics for stochastic systems provide a quantitative generalization of the classical simulation and bisimulation relations. These metrics capture the similarity of states with respect to quantitative specifications written in the quantitative mu-calculus and related probabilistic logics. We first show that the metrics provide a bound for the difference in long-run average and discounted average behavior across states, indicating that the metrics can be used both in system verification, and in performance evaluation. For turn-based games and MDPs, we provide a polynomial-time algorithm for the computation of the one-step metric distance between states. The algorithm is based on linear programming; it improves on the previous known exponential-time algorithm based on a reduction to the theory of reals. We then present PSPACE algorithms for both the decision problem and the problem of approximating the metric distance between two states, matching the best known algorithms for Markov chains. For the bisimulation kernel of the metric our algorithm works in time O(n(4)) for both turn-based games and MDPs; improving the previously best known O(n(9).log(n)) time algorithm for MDPs. For a concurrent game G, we show that computing the exact distance be tween states is at least as hard as computing the value of concurrent reachability games and the square-root-sum problem in computational geometry. We show that checking whether the metric distance is bounded by a rational r, can be done via a reduction to the theory of real closed fields, involving a formula with three quantifier alternations, yielding O(vertical bar G vertical bar(O(vertical bar G vertical bar 5))) time complexity, improving the previously known reduction, which yielded O(vertical bar G vertical bar(O(vertical bar G vertical bar 7))) time complexity. These algorithms can be iterated to approximate the metrics using binary search"}],"_id":"3868","has_accepted_license":"1","year":"2010","page":"1 - 27","volume":6,"type":"journal_article","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","citation":{"apa":"Chatterjee, K., De Alfaro, L., Majumdar, R., &#38; Raman, V. (2010). Algorithms for game metrics. <i>Logical Methods in Computer Science</i>. International Federation of Computational Logic. <a href=\"https://doi.org/10.2168/LMCS-6(3:13)2010\">https://doi.org/10.2168/LMCS-6(3:13)2010</a>","chicago":"Chatterjee, Krishnendu, Luca De Alfaro, Ritankar Majumdar, and Vishwanath Raman. “Algorithms for Game Metrics.” <i>Logical Methods in Computer Science</i>. International Federation of Computational Logic, 2010. <a href=\"https://doi.org/10.2168/LMCS-6(3:13)2010\">https://doi.org/10.2168/LMCS-6(3:13)2010</a>.","ieee":"K. Chatterjee, L. De Alfaro, R. Majumdar, and V. Raman, “Algorithms for game metrics,” <i>Logical Methods in Computer Science</i>, vol. 6, no. 3. International Federation of Computational Logic, pp. 1–27, 2010.","mla":"Chatterjee, Krishnendu, et al. “Algorithms for Game Metrics.” <i>Logical Methods in Computer Science</i>, vol. 6, no. 3, International Federation of Computational Logic, 2010, pp. 1–27, doi:<a href=\"https://doi.org/10.2168/LMCS-6(3:13)2010\">10.2168/LMCS-6(3:13)2010</a>.","short":"K. Chatterjee, L. De Alfaro, R. Majumdar, V. Raman, Logical Methods in Computer Science 6 (2010) 1–27.","ista":"Chatterjee K, De Alfaro L, Majumdar R, Raman V. 2010. Algorithms for game metrics. Logical Methods in Computer Science. 6(3), 1–27.","ama":"Chatterjee K, De Alfaro L, Majumdar R, Raman V. Algorithms for game metrics. <i>Logical Methods in Computer Science</i>. 2010;6(3):1-27. doi:<a href=\"https://doi.org/10.2168/LMCS-6(3:13)2010\">10.2168/LMCS-6(3:13)2010</a>"},"oa":1,"status":"public","issue":"3"},{"file_date_updated":"2020-07-14T12:46:21Z","quality_controlled":"1","scopus_import":1,"date_updated":"2021-01-12T07:53:04Z","doi":"10.1109/TVCG.2010.139","date_published":"2010-10-28T00:00:00Z","pubrep_id":"536","author":[{"first_name":"Paul","last_name":"Bendich","full_name":"Bendich, Paul","id":"43F6EC54-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Herbert","orcid":"0000-0002-9823-6833","last_name":"Edelsbrunner","full_name":"Edelsbrunner, Herbert","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87"},{"id":"36E4574A-F248-11E8-B48F-1D18A9856A87","full_name":"Kerber, Michael","orcid":"0000-0002-8030-9299","last_name":"Kerber","first_name":"Michael"}],"publication_status":"published","file":[{"date_created":"2018-12-12T10:17:10Z","content_type":"application/pdf","creator":"system","access_level":"open_access","relation":"main_file","file_name":"IST-2016-536-v1+1_2010-J-02-PersistenceforImages.pdf","checksum":"f6d813c04f4b46023cec6b9a17f15472","file_size":721994,"file_id":"5262","date_updated":"2020-07-14T12:46:21Z"}],"intvolume":"        16","language":[{"iso":"eng"}],"month":"10","day":"28","ddc":["000"],"publist_id":"2253","oa_version":"Submitted Version","date_created":"2018-12-11T12:05:47Z","publisher":"IEEE","title":"Computing robustness and persistence for images","department":[{"_id":"HeEd"}],"publication":"IEEE Transactions of Visualization and Computer Graphics","abstract":[{"text":"We are interested in 3-dimensional images given as arrays of voxels with intensity values. Extending these values to acontinuous function, we study the robustness of homology classes in its level and interlevel sets, that is, the amount of perturbationneeded to destroy these classes. The structure of the homology classes and their robustness, over all level and interlevel sets, can bevisualized by a triangular diagram of dots obtained by computing the extended persistence of the function. We give a fast hierarchicalalgorithm using the dual complexes of oct-tree approximations of the function. In addition, we show that for balanced oct-trees, thedual complexes are geometrically realized in $R^3$ and can thus be used to construct level and interlevel sets. We apply these tools tostudy 3-dimensional images of plant root systems.","lang":"eng"}],"has_accepted_license":"1","year":"2010","_id":"3901","type":"journal_article","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","page":"1251 - 1260","volume":16,"citation":{"ama":"Bendich P, Edelsbrunner H, Kerber M. Computing robustness and persistence for images. <i>IEEE Transactions of Visualization and Computer Graphics</i>. 2010;16(6):1251-1260. doi:<a href=\"https://doi.org/10.1109/TVCG.2010.139\">10.1109/TVCG.2010.139</a>","ista":"Bendich P, Edelsbrunner H, Kerber M. 2010. Computing robustness and persistence for images. IEEE Transactions of Visualization and Computer Graphics. 16(6), 1251–1260.","mla":"Bendich, Paul, et al. “Computing Robustness and Persistence for Images.” <i>IEEE Transactions of Visualization and Computer Graphics</i>, vol. 16, no. 6, IEEE, 2010, pp. 1251–60, doi:<a href=\"https://doi.org/10.1109/TVCG.2010.139\">10.1109/TVCG.2010.139</a>.","short":"P. Bendich, H. Edelsbrunner, M. Kerber, IEEE Transactions of Visualization and Computer Graphics 16 (2010) 1251–1260.","chicago":"Bendich, Paul, Herbert Edelsbrunner, and Michael Kerber. “Computing Robustness and Persistence for Images.” <i>IEEE Transactions of Visualization and Computer Graphics</i>. IEEE, 2010. <a href=\"https://doi.org/10.1109/TVCG.2010.139\">https://doi.org/10.1109/TVCG.2010.139</a>.","ieee":"P. Bendich, H. Edelsbrunner, and M. Kerber, “Computing robustness and persistence for images,” <i>IEEE Transactions of Visualization and Computer Graphics</i>, vol. 16, no. 6. IEEE, pp. 1251–1260, 2010.","apa":"Bendich, P., Edelsbrunner, H., &#38; Kerber, M. (2010). Computing robustness and persistence for images. <i>IEEE Transactions of Visualization and Computer Graphics</i>. IEEE. <a href=\"https://doi.org/10.1109/TVCG.2010.139\">https://doi.org/10.1109/TVCG.2010.139</a>"},"issue":"6","status":"public","oa":1},{"month":"07","language":[{"iso":"eng"}],"publication_identifier":{"issn":["2663-337X"]},"citation":{"ista":"Pflicke H. 2010.   Dendritic cell migration across basement membranes in the skin. Institute of Science and Technology Austria.","mla":"Pflicke, Holger. <i>  Dendritic Cell Migration across Basement Membranes in the Skin</i>. Institute of Science and Technology Austria, 2010.","short":"H. Pflicke,   Dendritic Cell Migration across Basement Membranes in the Skin, Institute of Science and Technology Austria, 2010.","ama":"Pflicke H.   Dendritic cell migration across basement membranes in the skin. 2010.","apa":"Pflicke, H. (2010). <i>  Dendritic cell migration across basement membranes in the skin</i>. Institute of Science and Technology Austria.","ieee":"H. Pflicke, “  Dendritic cell migration across basement membranes in the skin,” Institute of Science and Technology Austria, 2010.","chicago":"Pflicke, Holger. “  Dendritic Cell Migration across Basement Membranes in the Skin.” Institute of Science and Technology Austria, 2010."},"day":"01","status":"public","year":"2010","publication_status":"published","_id":"3962","supervisor":[{"full_name":"Heisenberg, Carl-Philipp J","id":"39427864-F248-11E8-B48F-1D18A9856A87","first_name":"Carl-Philipp J","orcid":"0000-0002-0912-4566","last_name":"Heisenberg"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","type":"dissertation","degree_awarded":"PhD","article_processing_charge":"No","date_updated":"2023-09-07T11:28:47Z","alternative_title":["ISTA Thesis"],"date_published":"2010-07-01T00:00:00Z","author":[{"first_name":"Holger","last_name":"Pflicke","full_name":"Pflicke, Holger","id":"CAA57A9A-5B61-11E9-B130-E0C1E1F2C83D"}],"publist_id":"2165","date_created":"2018-12-11T12:06:08Z","oa_version":"None","publisher":"Institute of Science and Technology Austria","title":"﻿﻿Dendritic cell migration across basement membranes in the skin","department":[{"_id":"CaHe"},{"_id":"GradSch"}]},{"intvolume":"        13","publication_status":"published","month":"03","project":[{"call_identifier":"FP7","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme"}],"language":[{"iso":"eng"}],"day":"15","scopus_import":1,"quality_controlled":"1","author":[{"first_name":"Jon","last_name":"Bridle","full_name":"Bridle, Jon"},{"id":"3BBFB084-F248-11E8-B48F-1D18A9856A87","full_name":"Polechova, Jitka","orcid":"0000-0003-0951-3112","last_name":"Polechova","first_name":"Jitka"},{"full_name":"Kawata, Masakado","last_name":"Kawata","first_name":"Masakado"},{"first_name":"Roger","last_name":"Butlin","full_name":"Butlin, Roger"}],"date_published":"2010-03-15T00:00:00Z","date_updated":"2021-01-12T07:54:45Z","doi":"10.1111/j.1461-0248.2010.01442.x","_id":"4134","year":"2010","volume":13,"page":"485 - 494","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","type":"journal_article","citation":{"chicago":"Bridle, Jon, Jitka Polechova, Masakado Kawata, and Roger Butlin. “Why Is Adaptation Prevented at Ecological Margins? New Insights from Individual-Based Simulations.” <i>Ecology Letters</i>. Wiley-Blackwell, 2010. <a href=\"https://doi.org/10.1111/j.1461-0248.2010.01442.x\">https://doi.org/10.1111/j.1461-0248.2010.01442.x</a>.","ieee":"J. Bridle, J. Polechova, M. Kawata, and R. Butlin, “Why is adaptation prevented at ecological margins? New insights from individual-based simulations,” <i>Ecology Letters</i>, vol. 13, no. 4. Wiley-Blackwell, pp. 485–494, 2010.","apa":"Bridle, J., Polechova, J., Kawata, M., &#38; Butlin, R. (2010). Why is adaptation prevented at ecological margins? New insights from individual-based simulations. <i>Ecology Letters</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.1111/j.1461-0248.2010.01442.x\">https://doi.org/10.1111/j.1461-0248.2010.01442.x</a>","ama":"Bridle J, Polechova J, Kawata M, Butlin R. Why is adaptation prevented at ecological margins? New insights from individual-based simulations. <i>Ecology Letters</i>. 2010;13(4):485-494. doi:<a href=\"https://doi.org/10.1111/j.1461-0248.2010.01442.x\">10.1111/j.1461-0248.2010.01442.x</a>","ista":"Bridle J, Polechova J, Kawata M, Butlin R. 2010. Why is adaptation prevented at ecological margins? New insights from individual-based simulations. Ecology Letters. 13(4), 485–494.","short":"J. Bridle, J. Polechova, M. Kawata, R. Butlin, Ecology Letters 13 (2010) 485–494.","mla":"Bridle, Jon, et al. “Why Is Adaptation Prevented at Ecological Margins? New Insights from Individual-Based Simulations.” <i>Ecology Letters</i>, vol. 13, no. 4, Wiley-Blackwell, 2010, pp. 485–94, doi:<a href=\"https://doi.org/10.1111/j.1461-0248.2010.01442.x\">10.1111/j.1461-0248.2010.01442.x</a>."},"status":"public","acknowledgement":"We are very grateful to Nick Barton.","issue":"4","ec_funded":1,"date_created":"2018-12-11T12:07:08Z","oa_version":"None","publist_id":"1987","publication":"Ecology Letters","department":[{"_id":"NiBa"}],"title":"Why is adaptation prevented at ecological margins? New insights from individual-based simulations","publisher":"Wiley-Blackwell","abstract":[{"lang":"eng","text":"All species are restricted in their distribution. Currently, ecological models can only explain such limits if patches vary in quality, leading to asymmetrical dispersal, or if genetic variation is too low at the margins for adaptation. However, population genetic models suggest that the increase in genetic variance resulting from dispersal should allow adaptation to almost any ecological gradient. Clearly therefore, these models miss something that prevents evolution in natural populations. We developed an individual-based simulation to explore stochastic effects in these models. At high carrying capacities, our simulations largely agree with deterministic predictions. However, when carrying capacity is low, the population fails to establish for a wide range of parameter values where adaptation was expected from previous models. Stochastic or transient effects appear critical around the boundaries in parameter space between simulation behaviours. Dispersal, gradient steepness, and population density emerge as key factors determining adaptation on an ecological gradient. "}]},{"page":"2753 - 2768","volume":29,"type":"journal_article","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"4157","year":"2010","status":"public","oa":1,"external_id":{"pmid":["20717145"]},"issue":"16","citation":{"ama":"Papusheva E, Heisenberg C-PJ. Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis. <i>EMBO Journal</i>. 2010;29(16):2753-2768. doi:<a href=\"https://doi.org/10.1038/emboj.2010.182\">10.1038/emboj.2010.182</a>","short":"E. Papusheva, C.-P.J. Heisenberg, EMBO Journal 29 (2010) 2753–2768.","ista":"Papusheva E, Heisenberg C-PJ. 2010. Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis. EMBO Journal. 29(16), 2753–2768.","mla":"Papusheva, Ekaterina, and Carl-Philipp J. Heisenberg. “Spatial Organization of Adhesion: Force-Dependent Regulation and Function in Tissue Morphogenesis.” <i>EMBO Journal</i>, vol. 29, no. 16, Wiley-Blackwell, 2010, pp. 2753–68, doi:<a href=\"https://doi.org/10.1038/emboj.2010.182\">10.1038/emboj.2010.182</a>.","ieee":"E. Papusheva and C.-P. J. Heisenberg, “Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis,” <i>EMBO Journal</i>, vol. 29, no. 16. Wiley-Blackwell, pp. 2753–2768, 2010.","chicago":"Papusheva, Ekaterina, and Carl-Philipp J Heisenberg. “Spatial Organization of Adhesion: Force-Dependent Regulation and Function in Tissue Morphogenesis.” <i>EMBO Journal</i>. Wiley-Blackwell, 2010. <a href=\"https://doi.org/10.1038/emboj.2010.182\">https://doi.org/10.1038/emboj.2010.182</a>.","apa":"Papusheva, E., &#38; Heisenberg, C.-P. J. (2010). Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis. <i>EMBO Journal</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.1038/emboj.2010.182\">https://doi.org/10.1038/emboj.2010.182</a>"},"title":"Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis","department":[{"_id":"Bio"},{"_id":"CaHe"}],"publication":"EMBO Journal","publisher":"Wiley-Blackwell","oa_version":"Submitted Version","date_created":"2018-12-11T12:07:17Z","publist_id":"1962","abstract":[{"text":"Integrin- and cadherin-mediated adhesion is central for cell and tissue morphogenesis, allowing cells and tissues to change shape without loosing integrity. Studies predominantly in cell culture showed that mechanosensation through adhesion structures is achieved by force-mediated modulation of their molecular composition. The specific molecular composition of adhesion sites in turn determines their signalling activity and dynamic reorganization. Here, we will review how adhesion sites respond to mecanical stimuli, and how spatially and temporally regulated signalling from different adhesion sites controls cell migration and tissue morphogenesis.","lang":"eng"}],"main_file_link":[{"open_access":"1","url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2924654/"}],"intvolume":"        29","publication_status":"published","pmid":1,"day":"18","language":[{"iso":"eng"}],"month":"08","acknowledged_ssus":[{"_id":"Bio"}],"author":[{"first_name":"Ekaterina","last_name":"Papusheva","full_name":"Papusheva, Ekaterina","id":"41DB591E-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Carl-Philipp J","orcid":"0000-0002-0912-4566","last_name":"Heisenberg","full_name":"Heisenberg, Carl-Philipp J","id":"39427864-F248-11E8-B48F-1D18A9856A87"}],"date_published":"2010-08-18T00:00:00Z","doi":"10.1038/emboj.2010.182","date_updated":"2021-01-12T07:54:55Z","scopus_import":1,"quality_controlled":"1"},{"ddc":["576"],"day":"03","month":"02","language":[{"iso":"eng"}],"intvolume":"        15","file":[{"access_level":"open_access","creator":"system","relation":"main_file","date_created":"2018-12-12T10:15:21Z","content_type":"application/pdf","file_id":"5140","date_updated":"2020-07-14T12:46:26Z","checksum":"bab577546dd4e8f882e9a9dd645cd01e","file_name":"IST-2015-369-v1+1_741-2535-1-PB.pdf","file_size":450171}],"publication_status":"published","date_published":"2010-02-03T00:00:00Z","pubrep_id":"369","author":[{"full_name":"Barton, Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","first_name":"Nicholas H","last_name":"Barton","orcid":"0000-0002-8548-5240"},{"last_name":"Etheridge","first_name":"Alison","full_name":"Etheridge, Alison"},{"full_name":"Véber, Amandine","first_name":"Amandine","last_name":"Véber"}],"doi":"10.1214/EJP.v15-741","date_updated":"2021-01-12T07:55:34Z","scopus_import":1,"quality_controlled":"1","file_date_updated":"2020-07-14T12:46:26Z","tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"oa":1,"status":"public","issue":"7","citation":{"chicago":"Barton, Nicholas H, Alison Etheridge, and Amandine Véber. “A New Model for Evolution in a Spatial Continuum.” <i>Electronic Journal of Probability</i>. Institute of Mathematical Statistics, 2010. <a href=\"https://doi.org/10.1214/EJP.v15-741\">https://doi.org/10.1214/EJP.v15-741</a>.","ieee":"N. H. Barton, A. Etheridge, and A. Véber, “A new model for evolution in a spatial continuum,” <i>Electronic Journal of Probability</i>, vol. 15, no. 7. Institute of Mathematical Statistics, pp. 162–216, 2010.","apa":"Barton, N. H., Etheridge, A., &#38; Véber, A. (2010). A new model for evolution in a spatial continuum. <i>Electronic Journal of Probability</i>. Institute of Mathematical Statistics. <a href=\"https://doi.org/10.1214/EJP.v15-741\">https://doi.org/10.1214/EJP.v15-741</a>","ama":"Barton NH, Etheridge A, Véber A. A new model for evolution in a spatial continuum. <i>Electronic Journal of Probability</i>. 2010;15(7):162-216. doi:<a href=\"https://doi.org/10.1214/EJP.v15-741\">10.1214/EJP.v15-741</a>","short":"N.H. Barton, A. Etheridge, A. Véber, Electronic Journal of Probability 15 (2010) 162–216.","ista":"Barton NH, Etheridge A, Véber A. 2010. A new model for evolution in a spatial continuum. Electronic Journal of Probability. 15(7), 162–216.","mla":"Barton, Nicholas H., et al. “A New Model for Evolution in a Spatial Continuum.” <i>Electronic Journal of Probability</i>, vol. 15, no. 7, Institute of Mathematical Statistics, 2010, pp. 162–216, doi:<a href=\"https://doi.org/10.1214/EJP.v15-741\">10.1214/EJP.v15-741</a>."},"volume":15,"page":"162 - 216","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","type":"journal_article","_id":"4243","year":"2010","has_accepted_license":"1","abstract":[{"lang":"eng","text":"We investigate a new model for populations evolving in a spatial continuum. This model can be thought of as a spatial version of the Lambda-Fleming-Viot process. It explicitly incorporates both small scale reproduction events and large scale extinction-recolonisation events. The lineages ancestral to a sample from a population evolving according to this model can be described in terms of a spatial version of the Lambda-coalescent. Using a technique of Evans (1997), we prove existence and uniqueness in law for the model. We then investigate the asymptotic behaviour of the genealogy of a finite number of individuals sampled uniformly at random (or more generally `far enough apart') from a two-dimensional torus of sidelength L as L tends to infinity. Under appropriate conditions (and on a suitable timescale) we can obtain as limiting genealogical processes a Kingman coalescent, a more general Lambda-coalescent or a system of coalescing Brownian motions (with a non-local coalescence mechanism)."}],"publication":"Electronic Journal of Probability","title":"A new model for evolution in a spatial continuum","department":[{"_id":"NiBa"}],"publisher":"Institute of Mathematical Statistics","date_created":"2018-12-11T12:07:48Z","oa_version":"Published Version","publist_id":"1863"},{"status":"public","oa":1,"citation":{"ama":"Bergmann J, Danowski P. Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch. In: Bergmann J, Danowski P, eds. <i>Handbuch Bibliothek 2.0</i>. Bibliotheks- und Informationspraxis 41. De Gruyter; 2010:5-20. doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>","short":"J. Bergmann, P. Danowski, in:, J. Bergmann, P. Danowski (Eds.), Handbuch Bibliothek 2.0, De Gruyter, 2010, pp. 5–20.","ista":"Bergmann J, Danowski P. 2010.Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch. In: Handbuch Bibliothek 2.0. , 5–20.","mla":"Bergmann, Julia, and Patrick Danowski. “Ist Bibliothek 2.0 Überhaupt Noch Relevant? – Eine Einleitung in Das Handbuch.” <i>Handbuch Bibliothek 2.0</i>, edited by Julia Bergmann and Patrick Danowski, De Gruyter, 2010, pp. 5–20, doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>.","ieee":"J. Bergmann and P. Danowski, “Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch,” in <i>Handbuch Bibliothek 2.0</i>, J. Bergmann and P. Danowski, Eds. De Gruyter, 2010, pp. 5–20.","chicago":"Bergmann, Julia, and Patrick Danowski. “Ist Bibliothek 2.0 Überhaupt Noch Relevant? – Eine Einleitung in Das Handbuch.” In <i>Handbuch Bibliothek 2.0</i>, edited by Julia Bergmann and Patrick Danowski, 5–20. Bibliotheks- Und Informationspraxis 41. De Gruyter, 2010. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>.","apa":"Bergmann, J., &#38; Danowski, P. (2010). Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch. In J. Bergmann &#38; P. Danowski (Eds.), <i>Handbuch Bibliothek 2.0</i> (pp. 5–20). De Gruyter. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>"},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","type":"book_chapter","page":"5 - 20","has_accepted_license":"1","year":"2010","_id":"4339","series_title":"Bibliotheks- und Informationspraxis 41","abstract":[{"text":"Mit diesem Buch möchten wir einen Überblick der aktuellen Diskussion zum Thema Bibliothek 2.0 geben und den Stand der tatsächlichen Umsetzung der Web 2.0-Ansätze in deutschsprachigen Bibliotheken beleuchten. An dieser Stelle ist die Frage erlaubt, warum es zu einer Zeit, in der es bereits die ersten \"Web 3.0\"- Konferenzen gibt, eines Handbuches der Bibliothek 2.0 noch bedarf. Und warum es überhaupt ein deutschsprachiges Handbuch zur Bibliothek 2.0 braucht, wo es doch bereits verschiedenste Publikationen zu diesem Thema aus anderen Ländern, insbesondere des angloamerikanischen Raums gibt. Ist dazu nicht bereits alles gesagt?","lang":"ger"}],"publisher":"De Gruyter","publication":"Handbuch Bibliothek 2.0","department":[{"_id":"E-Lib"}],"title":"Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch","publist_id":"1235","date_created":"2018-12-11T12:08:21Z","oa_version":"Published Version","ddc":["020"],"day":"23","month":"09","language":[{"iso":"eng"}],"file":[{"date_updated":"2020-07-14T12:46:27Z","file_id":"5123","file_size":567580,"file_name":"IST-2012-12-v1+1_9783110232103.5.pdf","checksum":"d42cedd48fffa85d75046f396a309fc3","relation":"main_file","access_level":"open_access","creator":"system","content_type":"application/pdf","date_created":"2018-12-12T10:15:06Z"}],"publication_status":"published","doi":"10.1515/9783110232103","date_updated":"2021-01-12T07:56:15Z","pubrep_id":"12","date_published":"2010-09-23T00:00:00Z","author":[{"full_name":"Bergmann, Julia","first_name":"Julia","last_name":"Bergmann"},{"first_name":"Patrick","last_name":"Danowski","orcid":"0000-0002-6026-4409","full_name":"Danowski, Patrick","id":"2EBD1598-F248-11E8-B48F-1D18A9856A87"}],"editor":[{"full_name":"Bergmann, Julia","first_name":"Julia","last_name":"Bergmann"},{"first_name":"Patrick","last_name":"Danowski","orcid":"0000-0002-6026-4409","full_name":"Danowski, Patrick","id":"2EBD1598-F248-11E8-B48F-1D18A9856A87"}],"quality_controlled":"1","file_date_updated":"2020-07-14T12:46:27Z","tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"}},{"year":"2010","_id":"4346","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","type":"book_editor","volume":" 41","page":"405","publication_identifier":{"eisbn":["9-783-1102-3210-3"],"isbn":["9-783-1102-3209-7"]},"citation":{"ieee":"P. Danowski and J. Bergmann, Eds., <i>Handbuch Bibliothek 2.0</i>, vol. 41. De Gruyter, 2010.","chicago":"Danowski, Patrick, and Julia Bergmann, eds. <i>Handbuch Bibliothek 2.0</i>. Vol. 41. Bibliothekspraxis. De Gruyter, 2010. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>.","apa":"Danowski, P., &#38; Bergmann, J. (Eds.). (2010). <i>Handbuch Bibliothek 2.0</i> (Vol. 41). De Gruyter. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>","ama":"Danowski P, Bergmann J, eds. <i>Handbuch Bibliothek 2.0</i>. Vol 41. De Gruyter; 2010. doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>","mla":"Danowski, Patrick, and Julia Bergmann, editors. <i>Handbuch Bibliothek 2.0</i>. Vol. 41, De Gruyter, 2010, doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>.","short":"P. Danowski, J. Bergmann, eds., Handbuch Bibliothek 2.0, De Gruyter, 2010.","ista":"Danowski P, Bergmann J eds. 2010. Handbuch Bibliothek 2.0, De Gruyter, 405p."},"oa":1,"status":"public","publist_id":"1228","date_created":"2018-12-11T12:08:23Z","oa_version":"Published Version","publisher":"De Gruyter","title":"Handbuch Bibliothek 2.0","department":[{"_id":"E-Lib"}],"series_title":"Bibliothekspraxis","abstract":[{"text":"With the term \"Library 2.0\" the editors mean an institution which applies the principles of the Web 2.0 such as openness, re-use, collaboration and interaction in the entire organization. Libraries are extending their service offerings and work processes to include the potential of Web 2.0 technologies. This changes the job description and self-image of librarians. The collective volume offers a complete overview of the topic Library 2.0 and the current state of developments from a technological, sociological, information theoretical and practice-oriented perspective.","lang":"eng"}],"publication_status":"published","main_file_link":[{"url":"https://www.degruyter.com/document/doi/10.1515/9783110232103/html","open_access":"1"}],"month":"09","language":[{"iso":"ger"}],"day":"01","tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"quality_controlled":"1","article_processing_charge":"No","doi":"10.1515/9783110232103","alternative_title":["Bibliotheks- und Informationspraxis"],"date_updated":"2021-12-22T14:41:57Z","date_published":"2010-09-01T00:00:00Z","editor":[{"first_name":"Patrick","last_name":"Danowski","orcid":"0000-0002-6026-4409","full_name":"Danowski, Patrick","id":"2EBD1598-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Julia","last_name":"Bergmann","full_name":"Bergmann, Julia"}]},{"has_accepted_license":"1","year":"2010","_id":"4361","type":"conference","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","page":"94 - 108","volume":6014,"citation":{"apa":"Wies, T., Zufferey, D., &#38; Henzinger, T. A. (2010). Forward analysis of depth-bounded processes. In L. Ong (Ed.) (Vol. 6014, pp. 94–108). Presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Paphos, Cyprus: Springer. <a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">https://doi.org/10.1007/978-3-642-12032-9_8</a>","chicago":"Wies, Thomas, Damien Zufferey, and Thomas A Henzinger. “Forward Analysis of Depth-Bounded Processes.” edited by Luke Ong, 6014:94–108. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">https://doi.org/10.1007/978-3-642-12032-9_8</a>.","ieee":"T. Wies, D. Zufferey, and T. A. Henzinger, “Forward analysis of depth-bounded processes,” presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Paphos, Cyprus, 2010, vol. 6014, pp. 94–108.","short":"T. Wies, D. Zufferey, T.A. Henzinger, in:, L. Ong (Ed.), Springer, 2010, pp. 94–108.","ista":"Wies T, Zufferey D, Henzinger TA. 2010. Forward analysis of depth-bounded processes. FoSSaCS: Foundations of Software Science and Computation Structures, LNCS, vol. 6014, 94–108.","mla":"Wies, Thomas, et al. <i>Forward Analysis of Depth-Bounded Processes</i>. Edited by Luke Ong, vol. 6014, Springer, 2010, pp. 94–108, doi:<a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">10.1007/978-3-642-12032-9_8</a>.","ama":"Wies T, Zufferey D, Henzinger TA. Forward analysis of depth-bounded processes. In: Ong L, ed. Vol 6014. Springer; 2010:94-108. doi:<a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">10.1007/978-3-642-12032-9_8</a>"},"status":"public","oa":1,"publist_id":"1099","oa_version":"Submitted Version","date_created":"2018-12-11T12:08:27Z","publisher":"Springer","department":[{"_id":"ToHe"}],"title":"Forward analysis of depth-bounded processes","abstract":[{"lang":"eng","text":"Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an adequate domain of limits for the well-structured transition systems that are induced by depth-bounded processes. An immediate consequence of our result is that there exists a forward algorithm that decides the covering problem for this class. Unlike backward algorithms, the forward algorithm terminates even if the depth of the process is not known a priori. More importantly, our result suggests a whole spectrum of forward algorithms that enable the effective verification of a large class of mobile systems."}],"publication_status":"published","file":[{"content_type":"application/pdf","date_created":"2018-12-12T10:08:17Z","relation":"main_file","creator":"system","access_level":"open_access","file_size":240766,"file_name":"IST-2012-50-v1+1_Forward_analysis_of_depth-bounded_processes.pdf","checksum":"3e610de84937d821316362658239134a","file_id":"4677","date_updated":"2020-07-14T12:46:27Z"}],"intvolume":"      6014","language":[{"iso":"eng"}],"month":"03","day":"01","ddc":["004"],"conference":{"end_date":"2010-03-28","name":"FoSSaCS: Foundations of Software Science and Computation Structures","start_date":"2010-03-20","location":"Paphos, Cyprus"},"file_date_updated":"2020-07-14T12:46:27Z","quality_controlled":"1","scopus_import":1,"alternative_title":["LNCS"],"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"1405"}]},"date_updated":"2023-09-07T11:36:36Z","doi":"10.1007/978-3-642-12032-9_8","editor":[{"first_name":"Luke","last_name":"Ong","full_name":"Ong, Luke"}],"pubrep_id":"50","date_published":"2010-03-01T00:00:00Z","author":[{"full_name":"Wies, Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas","last_name":"Wies"},{"id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien","orcid":"0000-0002-3197-8736","last_name":"Zufferey","first_name":"Damien"},{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"}]},{"author":[{"first_name":"Vasu","last_name":"Singh","full_name":"Singh, Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87"}],"date_published":"2010-01-01T00:00:00Z","editor":[{"full_name":"Sokolsky, Oleg","last_name":"Sokolsky","first_name":"Oleg"},{"last_name":"Rosu","first_name":"Grigore","full_name":"Rosu, Grigore"},{"first_name":"Nikolai","last_name":"Tilmann","full_name":"Tilmann, Nikolai"},{"first_name":"Howard","last_name":"Barringer","full_name":"Barringer, Howard"},{"full_name":"Falcone, Ylies","last_name":"Falcone","first_name":"Ylies"},{"full_name":"Finkbeiner, Bernd","first_name":"Bernd","last_name":"Finkbeiner"},{"first_name":"Klaus","last_name":"Havelund","full_name":"Havelund, Klaus"},{"full_name":"Lee, Insup","last_name":"Lee","first_name":"Insup"},{"last_name":"Pace","first_name":"Gordon","full_name":"Pace, Gordon"}],"alternative_title":["LNCS"],"doi":"10.1007/978-3-642-16612-9_32","date_updated":"2021-01-12T07:56:25Z","abstract":[{"lang":"eng","text":"Software transactional memories (STMs) promise simple and efficient concurrent programming. Several correctness properties have been proposed for STMs. Based on a bounded conflict graph algorithm for verifying correctness of STMs, we develop TRACER, a tool for runtime verification of STM implementations. The novelty of TRACER lies in the way it combines coarse and precise runtime analyses to guarantee sound and complete verification in an efficient manner. We implement TRACER in the TL2 STM implementation. We evaluate the performance of TRACER on STAMP benchmarks. While a precise runtime verification technique based on conflict graphs results in an average slowdown of 60x, the two-level approach of TRACER performs complete verification with an average slowdown of around 25x across different benchmarks."}],"scopus_import":1,"quality_controlled":"1","department":[{"_id":"ToHe"}],"title":"Runtime verification for software transactional memories","publisher":"Springer","date_created":"2018-12-11T12:08:28Z","conference":{"location":"St. Julians, Malta","start_date":"2010-11-01","name":"RV: International Conference on Runtime Verification","end_date":"2010-11-04"},"oa_version":"None","publist_id":"1096","status":"public","day":"01","citation":{"ieee":"V. Singh, “Runtime verification for software transactional memories,” presented at the RV: International Conference on Runtime Verification, St. Julians, Malta, 2010, vol. 6418, pp. 421–435.","chicago":"Singh, Vasu. “Runtime Verification for Software Transactional Memories.” edited by Oleg Sokolsky, Grigore Rosu, Nikolai Tilmann, Howard Barringer, Ylies Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, and Gordon Pace, 6418:421–35. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">https://doi.org/10.1007/978-3-642-16612-9_32</a>.","apa":"Singh, V. (2010). Runtime verification for software transactional memories. In O. Sokolsky, G. Rosu, N. Tilmann, H. Barringer, Y. Falcone, B. Finkbeiner, … G. Pace (Eds.) (Vol. 6418, pp. 421–435). Presented at the RV: International Conference on Runtime Verification, St. Julians, Malta: Springer. <a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">https://doi.org/10.1007/978-3-642-16612-9_32</a>","ama":"Singh V. Runtime verification for software transactional memories. In: Sokolsky O, Rosu G, Tilmann N, et al., eds. Vol 6418. Springer; 2010:421-435. doi:<a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">10.1007/978-3-642-16612-9_32</a>","ista":"Singh V. 2010. Runtime verification for software transactional memories. RV: International Conference on Runtime Verification, LNCS, vol. 6418, 421–435.","mla":"Singh, Vasu. <i>Runtime Verification for Software Transactional Memories</i>. Edited by Oleg Sokolsky et al., vol. 6418, Springer, 2010, pp. 421–35, doi:<a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">10.1007/978-3-642-16612-9_32</a>.","short":"V. Singh, in:, O. Sokolsky, G. Rosu, N. Tilmann, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund, I. Lee, G. Pace (Eds.), Springer, 2010, pp. 421–435."},"month":"01","language":[{"iso":"eng"}],"volume":6418,"page":"421 - 435","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","type":"conference","intvolume":"      6418","_id":"4362","year":"2010","publication_status":"published"},{"language":[{"iso":"eng"}],"project":[{"grant_number":"215543","name":"COMponent-Based Embedded Systems design Techniques","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"},{"name":"Design for Embedded Systems","grant_number":"214373","_id":"25F1337C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"}],"month":"09","day":"08","ddc":["004"],"intvolume":"      6246","publication_status":"published","file":[{"file_size":249789,"checksum":"b0ca5f5fbe8a3d20ccbc6f51a344a459","file_name":"IST-2012-49-v1+1_From_MTL_to_deterministic_timed_automata.pdf","file_id":"5028","date_updated":"2020-07-14T12:46:27Z","content_type":"application/pdf","date_created":"2018-12-12T10:13:43Z","relation":"main_file","creator":"system","access_level":"open_access"}],"scopus_import":1,"quality_controlled":"1","editor":[{"full_name":"Henzinger, Thomas A.","first_name":"Thomas A.","last_name":"Henzinger"},{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","first_name":"Krishnendu"}],"pubrep_id":"49","date_published":"2010-09-08T00:00:00Z","author":[{"last_name":"Nickovic","first_name":"Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87","full_name":"Nickovic, Dejan"},{"first_name":"Nir","last_name":"Piterman","full_name":"Piterman, Nir"}],"alternative_title":["LNCS"],"date_updated":"2021-01-12T07:56:27Z","doi":"10.1007/978-3-642-15297-9_13","conference":{"start_date":"2010-09-08","location":"Klosterneuburg, Austria","end_date":"2010-09-10","name":"FORMATS: Formal Modeling and Analysis of Timed Systems"},"file_date_updated":"2020-07-14T12:46:27Z","citation":{"ista":"Nickovic D, Piterman N. 2010. From MTL to deterministic timed automata. FORMATS: Formal Modeling and Analysis of Timed Systems, LNCS, vol. 6246, 152–167.","mla":"Nickovic, Dejan, and Nir Piterman. <i>From MTL to Deterministic Timed Automata</i>. Edited by Thomas A. Henzinger and Krishnendu Chatterjee, vol. 6246, Springer, 2010, pp. 152–67, doi:<a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">10.1007/978-3-642-15297-9_13</a>.","short":"D. Nickovic, N. Piterman, in:, T.A. Henzinger, K. Chatterjee (Eds.), Springer, 2010, pp. 152–167.","ama":"Nickovic D, Piterman N. From MTL to deterministic timed automata. In: Henzinger TA, Chatterjee K, eds. Vol 6246. Springer; 2010:152-167. doi:<a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">10.1007/978-3-642-15297-9_13</a>","apa":"Nickovic, D., &#38; Piterman, N. (2010). From MTL to deterministic timed automata. In T. A. Henzinger &#38; K. Chatterjee (Eds.) (Vol. 6246, pp. 152–167). Presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Klosterneuburg, Austria: Springer. <a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">https://doi.org/10.1007/978-3-642-15297-9_13</a>","ieee":"D. Nickovic and N. Piterman, “From MTL to deterministic timed automata,” presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Klosterneuburg, Austria, 2010, vol. 6246, pp. 152–167.","chicago":"Nickovic, Dejan, and Nir Piterman. “From MTL to Deterministic Timed Automata.” edited by Thomas A. Henzinger and Krishnendu Chatterjee, 6246:152–67. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">https://doi.org/10.1007/978-3-642-15297-9_13</a>."},"oa":1,"status":"public","_id":"4369","year":"2010","has_accepted_license":"1","page":"152 - 167","volume":6246,"type":"conference","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","abstract":[{"text":"In this paper we propose a novel technique for constructing timed automata from properties expressed in the logic mtl, under bounded-variability assumptions. We handle full mtl and include all future operators. Our construction is based on separation of the continuous time monitoring of the input sequence and discrete predictions regarding the future. The separation of the continuous from the discrete allows us to determinize our automata in an exponential construction that does not increase the number of clocks. This leads to a doubly exponential construction from mtl to deterministic timed automata, compared with triply exponential using existing approaches. We offer an alternative to the existing approach to linear real-time model checking, which has never been implemented. It further offers a unified framework for model checking, runtime monitoring, and synthesis, in an approach that can reuse tools, implementations, and insights from the discrete setting.","lang":"eng"}],"oa_version":"Submitted Version","ec_funded":1,"date_created":"2018-12-11T12:08:30Z","publist_id":"1090","title":"From MTL to deterministic timed automata","department":[{"_id":"ToHe"}],"publisher":"Springer"},{"date_published":"2010-01-01T00:00:00Z","author":[{"first_name":"Viktor","last_name":"Kuncak","full_name":"Kuncak, Viktor"},{"last_name":"Piskac","first_name":"Ruzica","full_name":"Piskac, Ruzica"},{"first_name":"Philippe","last_name":"Suter","full_name":"Suter, Philippe"},{"first_name":"Thomas","last_name":"Wies","full_name":"Wies, Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87"}],"editor":[{"last_name":"Barthe","first_name":"Gilles","full_name":"Barthe, Gilles"},{"last_name":"Hermenegildo","first_name":"Manuel","full_name":"Hermenegildo, Manuel"}],"alternative_title":["LNCS"],"date_updated":"2021-01-12T07:56:31Z","doi":"10.1007/978-3-642-11319-2_6","scopus_import":1,"quality_controlled":"1","conference":{"location":"Madrid, Spain","start_date":"2010-01-17","name":"VMCAI: Verification, Model Checking and Abstract Interpretation","end_date":"2010-01-19"},"day":"01","month":"01","language":[{"iso":"eng"}],"main_file_link":[{"url":"https://infoscience.epfl.ch/record/161290/","open_access":"1"}],"intvolume":"      5944","publication_status":"published","abstract":[{"text":"Techniques such as verification condition generation, predicate abstraction, and expressive type systems reduce software verification to proving formulas in expressive logics. Programs and their specifications often make use of data structures such as sets, multisets, algebraic data types, or graphs. Consequently, formulas generated from verification also involve such data structures. To automate the proofs of such formulas we propose a logic (a “calculus”) of such data structures. We build the calculus by starting from decidable logics of individual data structures, and connecting them through functions and sets, in ways that go beyond the frameworks such as Nelson-Oppen. The result are new decidable logics that can simultaneously specify properties of different kinds of data structures and overcome the limitations of the individual logics. Several of our decidable logics include abstraction functions that map a data structure into its more abstract view (a tree into a multiset, a multiset into a set), into a numerical quantity (the size or the height), or into the truth value of a candidate data structure invariant (sortedness, or the heap property). For algebraic data types, we identify an asymptotic many-to-one condition on the abstraction function that guarantees the existence of a decision procedure. In addition to the combination based on abstraction functions, we can combine multiple data structure theories if they all reduce to the same data structure logic. As an instance of this approach, we describe a decidable logic whose formulas are propositional combinations of formulas in: weak monadic second-order logic of two successors, two-variable logic with counting, multiset algebra with Presburger arithmetic, the Bernays-Schönfinkel-Ramsey class of first-order logic, and the logic of algebraic data types with the set content function. The subformulas in this combination can share common variables that refer to sets of objects along with the common set algebra operations. Such sound and complete combination is possible because the relations on sets definable in the component logics are all expressible in Boolean Algebra with Presburger Arithmetic. Presburger arithmetic and its new extensions play an important role in our decidability results. In several cases, when we combine logics that belong to NP, we can prove the satisfiability for the combined logic is still in NP.","lang":"eng"}],"department":[{"_id":"ToHe"}],"title":"Building a calculus of data structures","publisher":"Springer","date_created":"2018-12-11T12:08:33Z","oa_version":"Submitted Version","publist_id":"1081","oa":1,"status":"public","citation":{"ieee":"V. Kuncak, R. Piskac, P. Suter, and T. Wies, “Building a calculus of data structures,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Madrid, Spain, 2010, vol. 5944, pp. 26–44.","chicago":"Kuncak, Viktor, Ruzica Piskac, Philippe Suter, and Thomas Wies. “Building a Calculus of Data Structures.” edited by Gilles Barthe and Manuel Hermenegildo, 5944:26–44. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">https://doi.org/10.1007/978-3-642-11319-2_6</a>.","apa":"Kuncak, V., Piskac, R., Suter, P., &#38; Wies, T. (2010). Building a calculus of data structures. In G. Barthe &#38; M. Hermenegildo (Eds.) (Vol. 5944, pp. 26–44). Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Madrid, Spain: Springer. <a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">https://doi.org/10.1007/978-3-642-11319-2_6</a>","ama":"Kuncak V, Piskac R, Suter P, Wies T. Building a calculus of data structures. In: Barthe G, Hermenegildo M, eds. Vol 5944. Springer; 2010:26-44. doi:<a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">10.1007/978-3-642-11319-2_6</a>","mla":"Kuncak, Viktor, et al. <i>Building a Calculus of Data Structures</i>. Edited by Gilles Barthe and Manuel Hermenegildo, vol. 5944, Springer, 2010, pp. 26–44, doi:<a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">10.1007/978-3-642-11319-2_6</a>.","short":"V. Kuncak, R. Piskac, P. Suter, T. Wies, in:, G. Barthe, M. Hermenegildo (Eds.), Springer, 2010, pp. 26–44.","ista":"Kuncak V, Piskac R, Suter P, Wies T. 2010. Building a calculus of data structures. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 5944, 26–44."},"volume":5944,"page":"26 - 44","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","type":"conference","_id":"4378","year":"2010"},{"ddc":["005"],"day":"24","month":"10","language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","date_created":"2018-12-12T10:09:42Z","relation":"main_file","access_level":"open_access","creator":"system","file_size":222626,"checksum":"7680dd24016810710f7c977bc94f85e9","file_name":"IST-2012-48-v1+1_A_marketplace_for_cloud_resources.pdf","file_id":"4767","date_updated":"2020-07-14T12:46:28Z"}],"publication_status":"published","author":[{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"last_name":"Tomar","first_name":"Anmol","id":"3D8D36B6-F248-11E8-B48F-1D18A9856A87","full_name":"Tomar, Anmol"},{"full_name":"Singh, Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","first_name":"Vasu","last_name":"Singh"},{"first_name":"Thomas","last_name":"Wies","full_name":"Wies, Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0002-3197-8736","last_name":"Zufferey","first_name":"Damien","id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien"}],"date_published":"2010-10-24T00:00:00Z","pubrep_id":"48","doi":"10.1145/1879021.1879022","date_updated":"2021-01-12T07:56:32Z","scopus_import":1,"quality_controlled":"1","file_date_updated":"2020-07-14T12:46:28Z","conference":{"location":"Arizona, USA","start_date":"2010-10-24","name":"EMSOFT: Embedded Software ","end_date":"2010-10-29"},"status":"public","oa":1,"citation":{"ama":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. A marketplace for cloud resources. In: ACM; 2010:1-8. doi:<a href=\"https://doi.org/10.1145/1879021.1879022\">10.1145/1879021.1879022</a>","short":"T.A. Henzinger, A. Tomar, V. Singh, T. Wies, D. Zufferey, in:, ACM, 2010, pp. 1–8.","mla":"Henzinger, Thomas A., et al. <i>A Marketplace for Cloud Resources</i>. ACM, 2010, pp. 1–8, doi:<a href=\"https://doi.org/10.1145/1879021.1879022\">10.1145/1879021.1879022</a>.","ista":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. 2010. A marketplace for cloud resources. EMSOFT: Embedded Software , 1–8.","ieee":"T. A. Henzinger, A. Tomar, V. Singh, T. Wies, and D. Zufferey, “A marketplace for cloud resources,” presented at the EMSOFT: Embedded Software , Arizona, USA, 2010, pp. 1–8.","chicago":"Henzinger, Thomas A, Anmol Tomar, Vasu Singh, Thomas Wies, and Damien Zufferey. “A Marketplace for Cloud Resources,” 1–8. ACM, 2010. <a href=\"https://doi.org/10.1145/1879021.1879022\">https://doi.org/10.1145/1879021.1879022</a>.","apa":"Henzinger, T. A., Tomar, A., Singh, V., Wies, T., &#38; Zufferey, D. (2010). A marketplace for cloud resources (pp. 1–8). Presented at the EMSOFT: Embedded Software , Arizona, USA: ACM. <a href=\"https://doi.org/10.1145/1879021.1879022\">https://doi.org/10.1145/1879021.1879022</a>"},"page":"1 - 8","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","type":"conference","_id":"4380","has_accepted_license":"1","year":"2010","abstract":[{"text":"Cloud computing is an emerging paradigm aimed to offer users pay-per-use computing resources, while leaving the burden of managing the computing infrastructure to the cloud provider. We present a new programming and pricing model that gives the cloud user the flexibility of trading execution speed and price on a per-job basis. We discuss the scheduling and resource management challenges for the cloud provider that arise in the implementation of this model. We argue that techniques from real-time and embedded software can be useful in this context.","lang":"eng"}],"department":[{"_id":"ToHe"}],"title":"A marketplace for cloud resources","publisher":"ACM","date_created":"2018-12-11T12:08:33Z","oa_version":"Submitted Version","publist_id":"1078"},{"publication_status":"published","file":[{"checksum":"98e534675339a8e2beca08890d048145","file_name":"IST-2012-47-v1+1_FlexPRICE-_Flexible_provisioning_of_resources_in_a_cloud_environment.pdf","file_size":467436,"date_updated":"2020-07-14T12:46:28Z","file_id":"5188","date_created":"2018-12-12T10:16:03Z","content_type":"application/pdf","creator":"system","access_level":"open_access","relation":"main_file"}],"language":[{"iso":"eng"}],"month":"08","day":"26","ddc":["004"],"conference":{"location":"Miami, USA","start_date":"2010-07-05","name":"CLOUD: Cloud Computing","end_date":"2010-07-10"},"file_date_updated":"2020-07-14T12:46:28Z","quality_controlled":"1","scopus_import":1,"doi":"10.1109/CLOUD.2010.71","date_updated":"2021-01-12T07:56:33Z","article_processing_charge":"No","date_published":"2010-08-26T00:00:00Z","pubrep_id":"47","author":[{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"},{"last_name":"Tomar","first_name":"Anmol","id":"3D8D36B6-F248-11E8-B48F-1D18A9856A87","full_name":"Tomar, Anmol"},{"full_name":"Singh, Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","first_name":"Vasu","last_name":"Singh"},{"full_name":"Wies, Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas","last_name":"Wies"},{"id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien","last_name":"Zufferey","orcid":"0000-0002-3197-8736","first_name":"Damien"}],"year":"2010","has_accepted_license":"1","_id":"4381","type":"conference","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","page":"83 - 90","citation":{"apa":"Henzinger, T. A., Tomar, A., Singh, V., Wies, T., &#38; Zufferey, D. (2010). FlexPRICE: Flexible provisioning of resources in a cloud environment (pp. 83–90). Presented at the CLOUD: Cloud Computing, Miami, USA: IEEE. <a href=\"https://doi.org/10.1109/CLOUD.2010.71\">https://doi.org/10.1109/CLOUD.2010.71</a>","chicago":"Henzinger, Thomas A, Anmol Tomar, Vasu Singh, Thomas Wies, and Damien Zufferey. “FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment,” 83–90. IEEE, 2010. <a href=\"https://doi.org/10.1109/CLOUD.2010.71\">https://doi.org/10.1109/CLOUD.2010.71</a>.","ieee":"T. A. Henzinger, A. Tomar, V. Singh, T. Wies, and D. Zufferey, “FlexPRICE: Flexible provisioning of resources in a cloud environment,” presented at the CLOUD: Cloud Computing, Miami, USA, 2010, pp. 83–90.","ista":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. 2010. FlexPRICE: Flexible provisioning of resources in a cloud environment. CLOUD: Cloud Computing, 83–90.","short":"T.A. Henzinger, A. Tomar, V. Singh, T. Wies, D. Zufferey, in:, IEEE, 2010, pp. 83–90.","mla":"Henzinger, Thomas A., et al. <i>FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment</i>. IEEE, 2010, pp. 83–90, doi:<a href=\"https://doi.org/10.1109/CLOUD.2010.71\">10.1109/CLOUD.2010.71</a>.","ama":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. FlexPRICE: Flexible provisioning of resources in a cloud environment. In: IEEE; 2010:83-90. doi:<a href=\"https://doi.org/10.1109/CLOUD.2010.71\">10.1109/CLOUD.2010.71</a>"},"status":"public","oa":1,"publist_id":"1077","oa_version":"Submitted Version","date_created":"2018-12-11T12:08:33Z","publisher":"IEEE","department":[{"_id":"ToHe"}],"title":"FlexPRICE: Flexible provisioning of resources in a cloud environment","abstract":[{"text":"Cloud computing aims to give users virtually unlimited pay-per-use computing resources without the burden of managing the underlying infrastructure. We claim that, in order to realize the full potential of cloud computing, the user must be presented with a pricing model that offers flexibility at the requirements level, such as a choice between different degrees of execution speed and the cloud provider must be presented with a programming model that offers flexibility at the execution level, such as a choice between different scheduling policies. In such a flexible framework, with each job, the user purchases a virtual computer with the desired speed and cost characteristics, and the cloud provider can optimize the utilization of resources across a stream of jobs from different users. We designed a flexible framework to test our hypothesis, which is called FlexPRICE (Flexible Provisioning of Resources in a Cloud Environment) and works as follows. A user presents a job to the cloud. The cloud finds different schedules to execute the job and presents a set of quotes to the user in terms of price and duration for the execution. The user then chooses a particular quote and the cloud is obliged to execute the job according to the chosen quote. FlexPRICE thus hides the complexity of the actual scheduling decisions from the user, but still provides enough flexibility to meet the users actual demands. We implemented FlexPRICE in a simulator called PRICES that allows us to experiment with our framework. We observe that FlexPRICE provides a wide range of execution options-from fast and expensive to slow and cheap-- for the whole spectrum of data-intensive and computation-intensive jobs. We also observe that the set of quotes computed by FlexPRICE do not vary as the number of simultaneous jobs increases.","lang":"eng"}]},{"abstract":[{"lang":"eng","text":"Transactional memory (TM) has shown potential to simplify the task of writing concurrent programs. Inspired by classical work on databases, formal definitions of the semantics of TM executions have been proposed. Many of these definitions assumed that accesses to shared data are solely performed through transactions. In practice, due to legacy code and concurrency libraries, transactions in a TM have to share data with non-transactional operations. The semantics of such interaction, while widely discussed by practitioners, lacks a clear formal specification. Those interactions can vary, sometimes in subtle ways, between TM implementations and underlying memory models. We propose a correctness condition for TMs, parametrized opacity, to formally capture the now folklore notion of strong atomicity by stipulating the two following intuitive requirements: first, every transaction appears as if it is executed instantaneously with respect to other transactions and non-transactional operations, and second, non-transactional operations conform to the given underlying memory model. We investigate the inherent cost of implementing parametrized opacity. We first prove that parametrized opacity requires either instrumenting non-transactional operations (for most memory models) or writing to memory by transactions using potentially expensive read-modify-write instructions (such as compare-and-swap). Then, we show that for a class of practical relaxed memory models, parametrized opacity can indeed be implemented with constant-time instrumentation of non-transactional writes and no instrumentation of non-transactional reads. We show that, in practice, parametrizing the notion of correctness allows developing more efficient TM implementations."}],"quality_controlled":"1","author":[{"full_name":"Guerraoui, Rachid","first_name":"Rachid","last_name":"Guerraoui"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"},{"full_name":"Kapalka, Michal","first_name":"Michal","last_name":"Kapalka"},{"id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","full_name":"Singh, Vasu","last_name":"Singh","first_name":"Vasu"}],"date_published":"2010-06-13T00:00:00Z","pubrep_id":"46","doi":"10.1145/1810479.1810529","date_updated":"2021-01-12T07:56:33Z","oa_version":"Submitted Version","conference":{"name":"SPAA: ACM Symposium on Parallel Algorithms and Architectures","end_date":"2010-06-15","location":"Santorini, Greece","start_date":"2010-06-13"},"date_created":"2018-12-11T12:08:34Z","publist_id":"1076","department":[{"_id":"ToHe"}],"title":"Transactions in the jungle","file_date_updated":"2020-07-14T12:46:28Z","publisher":"ACM","citation":{"ieee":"R. Guerraoui, T. A. Henzinger, M. Kapalka, and V. Singh, “Transactions in the jungle,” presented at the SPAA: ACM Symposium on Parallel Algorithms and Architectures, Santorini, Greece, 2010, pp. 263–272.","chicago":"Guerraoui, Rachid, Thomas A Henzinger, Michal Kapalka, and Vasu Singh. “Transactions in the Jungle,” 263–72. ACM, 2010. <a href=\"https://doi.org/10.1145/1810479.1810529\">https://doi.org/10.1145/1810479.1810529</a>.","apa":"Guerraoui, R., Henzinger, T. A., Kapalka, M., &#38; Singh, V. (2010). Transactions in the jungle (pp. 263–272). Presented at the SPAA: ACM Symposium on Parallel Algorithms and Architectures, Santorini, Greece: ACM. <a href=\"https://doi.org/10.1145/1810479.1810529\">https://doi.org/10.1145/1810479.1810529</a>","ama":"Guerraoui R, Henzinger TA, Kapalka M, Singh V. Transactions in the jungle. In: ACM; 2010:263-272. doi:<a href=\"https://doi.org/10.1145/1810479.1810529\">10.1145/1810479.1810529</a>","mla":"Guerraoui, Rachid, et al. <i>Transactions in the Jungle</i>. ACM, 2010, pp. 263–72, doi:<a href=\"https://doi.org/10.1145/1810479.1810529\">10.1145/1810479.1810529</a>.","short":"R. Guerraoui, T.A. Henzinger, M. Kapalka, V. Singh, in:, ACM, 2010, pp. 263–272.","ista":"Guerraoui R, Henzinger TA, Kapalka M, Singh V. 2010. Transactions in the jungle. SPAA: ACM Symposium on Parallel Algorithms and Architectures, 263–272."},"language":[{"iso":"eng"}],"month":"06","status":"public","oa":1,"day":"13","ddc":["005"],"_id":"4382","publication_status":"published","file":[{"relation":"main_file","access_level":"open_access","creator":"system","content_type":"application/pdf","date_created":"2018-12-12T10:14:28Z","file_id":"5080","date_updated":"2020-07-14T12:46:28Z","file_size":246409,"file_name":"IST-2012-46-v1+1_Transactions_in_the_jungle.pdf","checksum":"f2ad6c00a6304da34bf21bcdcfd36c4b"}],"year":"2010","has_accepted_license":"1","page":"263 - 272","type":"conference","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87"},{"conference":{"end_date":"2010-07-17","name":"CAV: Computer Aided Verification","start_date":"2010-07-15","location":"Edinburgh, UK"},"file_date_updated":"2020-07-14T12:46:28Z","quality_controlled":"1","scopus_import":1,"article_processing_charge":"No","related_material":{"record":[{"relation":"earlier_version","status":"public","id":"5393"}]},"doi":"10.1007/978-3-642-14295-6_57","date_updated":"2023-02-23T12:24:17Z","alternative_title":["LNCS"],"date_published":"2010-07-01T00:00:00Z","author":[{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"},{"full_name":"Jobstmann, Barbara","last_name":"Jobstmann","first_name":"Barbara"},{"first_name":"Arjun","last_name":"Radhakrishna","full_name":"Radhakrishna, Arjun","id":"3B51CAC4-F248-11E8-B48F-1D18A9856A87"}],"pubrep_id":"43","file":[{"date_updated":"2020-07-14T12:46:28Z","file_id":"5221","checksum":"0b2ef8c4037ffccc6902d93081af24f7","file_name":"IST-2012-43-v1+1_GIST-_A_solver_for_probabilistic_games.pdf","file_size":293605,"access_level":"open_access","creator":"system","relation":"main_file","date_created":"2018-12-12T10:16:33Z","content_type":"application/pdf"}],"publication_status":"published","intvolume":"      6174","month":"07","language":[{"iso":"eng"}],"project":[{"name":"COMponent-Based Embedded Systems design Techniques","grant_number":"215543","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"},{"call_identifier":"FP7","_id":"25F1337C-B435-11E9-9278-68D0E5697425","grant_number":"214373","name":"Design for Embedded Systems"}],"ddc":["004"],"day":"01","publist_id":"1068","ec_funded":1,"date_created":"2018-12-11T12:08:36Z","oa_version":"Submitted Version","publisher":"Springer","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"title":"GIST: A solver for probabilistic games","abstract":[{"text":"GIST is a tool that (a) solves the qualitative analysis problem of turn-based probabilistic games with ω-regular objectives; and (b) synthesizes reasonable environment assumptions for synthesis of unrealizable specifications. Our tool provides the first and efficient implementations of several reduction-based techniques to solve turn-based probabilistic games, and uses the analysis of turn-based probabilistic games for synthesizing environment assumptions for unrealizable specifications.","lang":"eng"}],"arxiv":1,"year":"2010","has_accepted_license":"1","_id":"4388","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","type":"conference","volume":6174,"page":"665 - 669","citation":{"ama":"Chatterjee K, Henzinger TA, Jobstmann B, Radhakrishna A. GIST: A solver for probabilistic games. In: Vol 6174. Springer; 2010:665-669. doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">10.1007/978-3-642-14295-6_57</a>","short":"K. Chatterjee, T.A. Henzinger, B. Jobstmann, A. Radhakrishna, in:, Springer, 2010, pp. 665–669.","mla":"Chatterjee, Krishnendu, et al. <i>GIST: A Solver for Probabilistic Games</i>. Vol. 6174, Springer, 2010, pp. 665–69, doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">10.1007/978-3-642-14295-6_57</a>.","ista":"Chatterjee K, Henzinger TA, Jobstmann B, Radhakrishna A. 2010. GIST: A solver for probabilistic games. CAV: Computer Aided Verification, LNCS, vol. 6174, 665–669.","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, Barbara Jobstmann, and Arjun Radhakrishna. “GIST: A Solver for Probabilistic Games,” 6174:665–69. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">https://doi.org/10.1007/978-3-642-14295-6_57</a>.","ieee":"K. Chatterjee, T. A. Henzinger, B. Jobstmann, and A. Radhakrishna, “GIST: A solver for probabilistic games,” presented at the CAV: Computer Aided Verification, Edinburgh, UK, 2010, vol. 6174, pp. 665–669.","apa":"Chatterjee, K., Henzinger, T. A., Jobstmann, B., &#38; Radhakrishna, A. (2010). GIST: A solver for probabilistic games (Vol. 6174, pp. 665–669). Presented at the CAV: Computer Aided Verification, Edinburgh, UK: Springer. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">https://doi.org/10.1007/978-3-642-14295-6_57</a>"},"external_id":{"arxiv":["1004.2367"]},"oa":1,"status":"public"}]
