[{"editor":[{"full_name":"Bergmann, Julia","last_name":"Bergmann","first_name":"Julia"},{"orcid":"0000-0002-6026-4409","last_name":"Danowski","first_name":"Patrick","full_name":"Danowski, Patrick","id":"2EBD1598-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"1235","publication":"Handbuch Bibliothek 2.0","oa":1,"year":"2010","day":"23","page":"5 - 20","doi":"10.1515/9783110232103","publication_status":"published","abstract":[{"text":"Mit diesem Buch möchten wir einen Überblick der aktuellen Diskussion zum Thema Bibliothek 2.0 geben und den Stand der tatsächlichen Umsetzung der Web 2.0-Ansätze in deutschsprachigen Bibliotheken beleuchten. An dieser Stelle ist die Frage erlaubt, warum es zu einer Zeit, in der es bereits die ersten \"Web 3.0\"- Konferenzen gibt, eines Handbuches der Bibliothek 2.0 noch bedarf. Und warum es überhaupt ein deutschsprachiges Handbuch zur Bibliothek 2.0 braucht, wo es doch bereits verschiedenste Publikationen zu diesem Thema aus anderen Ländern, insbesondere des angloamerikanischen Raums gibt. Ist dazu nicht bereits alles gesagt?","lang":"ger"}],"series_title":"Bibliotheks- und Informationspraxis 41","ddc":["020"],"file_date_updated":"2020-07-14T12:46:27Z","date_published":"2010-09-23T00:00:00Z","publisher":"De Gruyter","title":"Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch","department":[{"_id":"E-Lib"}],"date_updated":"2021-01-12T07:56:15Z","citation":{"chicago":"Bergmann, Julia, and Patrick Danowski. “Ist Bibliothek 2.0 Überhaupt Noch Relevant? – Eine Einleitung in Das Handbuch.” In <i>Handbuch Bibliothek 2.0</i>, edited by Julia Bergmann and Patrick Danowski, 5–20. Bibliotheks- Und Informationspraxis 41. De Gruyter, 2010. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>.","ista":"Bergmann J, Danowski P. 2010.Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch. In: Handbuch Bibliothek 2.0. , 5–20.","ama":"Bergmann J, Danowski P. Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch. In: Bergmann J, Danowski P, eds. <i>Handbuch Bibliothek 2.0</i>. Bibliotheks- und Informationspraxis 41. De Gruyter; 2010:5-20. doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>","apa":"Bergmann, J., &#38; Danowski, P. (2010). Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch. In J. Bergmann &#38; P. Danowski (Eds.), <i>Handbuch Bibliothek 2.0</i> (pp. 5–20). De Gruyter. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>","ieee":"J. Bergmann and P. Danowski, “Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch,” in <i>Handbuch Bibliothek 2.0</i>, J. Bergmann and P. Danowski, Eds. De Gruyter, 2010, pp. 5–20.","short":"J. Bergmann, P. Danowski, in:, J. Bergmann, P. Danowski (Eds.), Handbuch Bibliothek 2.0, De Gruyter, 2010, pp. 5–20.","mla":"Bergmann, Julia, and Patrick Danowski. “Ist Bibliothek 2.0 Überhaupt Noch Relevant? – Eine Einleitung in Das Handbuch.” <i>Handbuch Bibliothek 2.0</i>, edited by Julia Bergmann and Patrick Danowski, De Gruyter, 2010, pp. 5–20, doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>."},"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","pubrep_id":"12","date_created":"2018-12-11T12:08:21Z","_id":"4339","type":"book_chapter","status":"public","has_accepted_license":"1","month":"09","file":[{"content_type":"application/pdf","date_created":"2018-12-12T10:15:06Z","date_updated":"2020-07-14T12:46:27Z","file_name":"IST-2012-12-v1+1_9783110232103.5.pdf","relation":"main_file","file_id":"5123","checksum":"d42cedd48fffa85d75046f396a309fc3","creator":"system","access_level":"open_access","file_size":567580}],"language":[{"iso":"eng"}],"quality_controlled":"1","oa_version":"Published Version","author":[{"full_name":"Bergmann, Julia","first_name":"Julia","last_name":"Bergmann"},{"full_name":"Danowski, Patrick","id":"2EBD1598-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6026-4409","last_name":"Danowski","first_name":"Patrick"}]},{"publication_identifier":{"isbn":["9-783-1102-3209-7"],"eisbn":["9-783-1102-3210-3"]},"main_file_link":[{"url":"https://www.degruyter.com/document/doi/10.1515/9783110232103/html","open_access":"1"}],"status":"public","date_created":"2018-12-11T12:08:23Z","_id":"4346","type":"book_editor","quality_controlled":"1","oa_version":"Published Version","language":[{"iso":"ger"}],"volume":" 41","article_processing_charge":"No","month":"09","day":"01","page":"405","doi":"10.1515/9783110232103","year":"2010","oa":1,"publist_id":"1228","editor":[{"orcid":"0000-0002-6026-4409","first_name":"Patrick","last_name":"Danowski","full_name":"Danowski, Patrick","id":"2EBD1598-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Bergmann, Julia","first_name":"Julia","last_name":"Bergmann"}],"alternative_title":["Bibliotheks- und Informationspraxis"],"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"department":[{"_id":"E-Lib"}],"date_updated":"2021-12-22T14:41:57Z","citation":{"apa":"Danowski, P., &#38; Bergmann, J. (Eds.). (2010). <i>Handbuch Bibliothek 2.0</i> (Vol. 41). De Gruyter. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>","chicago":"Danowski, Patrick, and Julia Bergmann, eds. <i>Handbuch Bibliothek 2.0</i>. Vol. 41. Bibliothekspraxis. De Gruyter, 2010. <a href=\"https://doi.org/10.1515/9783110232103\">https://doi.org/10.1515/9783110232103</a>.","ista":"Danowski P, Bergmann J eds. 2010. Handbuch Bibliothek 2.0, De Gruyter, 405p.","ama":"Danowski P, Bergmann J, eds. <i>Handbuch Bibliothek 2.0</i>. Vol 41. De Gruyter; 2010. doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>","ieee":"P. Danowski and J. Bergmann, Eds., <i>Handbuch Bibliothek 2.0</i>, vol. 41. De Gruyter, 2010.","mla":"Danowski, Patrick, and Julia Bergmann, editors. <i>Handbuch Bibliothek 2.0</i>. Vol. 41, De Gruyter, 2010, doi:<a href=\"https://doi.org/10.1515/9783110232103\">10.1515/9783110232103</a>.","short":"P. Danowski, J. Bergmann, eds., Handbuch Bibliothek 2.0, De Gruyter, 2010."},"publisher":"De Gruyter","date_published":"2010-09-01T00:00:00Z","title":"Handbuch Bibliothek 2.0","publication_status":"published","abstract":[{"lang":"eng","text":"With the term \"Library 2.0\" the editors mean an institution which applies the principles of the Web 2.0 such as openness, re-use, collaboration and interaction in the entire organization. Libraries are extending their service offerings and work processes to include the potential of Web 2.0 technologies. This changes the job description and self-image of librarians. The collective volume offers a complete overview of the topic Library 2.0 and the current state of developments from a technological, sociological, information theoretical and practice-oriented perspective."}],"series_title":"Bibliothekspraxis"},{"oa":1,"year":"2010","day":"01","page":"94 - 108","doi":"10.1007/978-3-642-12032-9_8","related_material":{"record":[{"relation":"dissertation_contains","id":"1405","status":"public"}]},"scopus_import":1,"editor":[{"full_name":"Ong, Luke","first_name":"Luke","last_name":"Ong"}],"intvolume":"      6014","publist_id":"1099","date_updated":"2023-09-07T11:36:36Z","department":[{"_id":"ToHe"}],"citation":{"ieee":"T. Wies, D. Zufferey, and T. A. Henzinger, “Forward analysis of depth-bounded processes,” presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Paphos, Cyprus, 2010, vol. 6014, pp. 94–108.","chicago":"Wies, Thomas, Damien Zufferey, and Thomas A Henzinger. “Forward Analysis of Depth-Bounded Processes.” edited by Luke Ong, 6014:94–108. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">https://doi.org/10.1007/978-3-642-12032-9_8</a>.","ama":"Wies T, Zufferey D, Henzinger TA. Forward analysis of depth-bounded processes. In: Ong L, ed. Vol 6014. Springer; 2010:94-108. doi:<a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">10.1007/978-3-642-12032-9_8</a>","ista":"Wies T, Zufferey D, Henzinger TA. 2010. Forward analysis of depth-bounded processes. FoSSaCS: Foundations of Software Science and Computation Structures, LNCS, vol. 6014, 94–108.","apa":"Wies, T., Zufferey, D., &#38; Henzinger, T. A. (2010). Forward analysis of depth-bounded processes. In L. Ong (Ed.) (Vol. 6014, pp. 94–108). Presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Paphos, Cyprus: Springer. <a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">https://doi.org/10.1007/978-3-642-12032-9_8</a>","short":"T. Wies, D. Zufferey, T.A. Henzinger, in:, L. Ong (Ed.), Springer, 2010, pp. 94–108.","mla":"Wies, Thomas, et al. <i>Forward Analysis of Depth-Bounded Processes</i>. Edited by Luke Ong, vol. 6014, Springer, 2010, pp. 94–108, doi:<a href=\"https://doi.org/10.1007/978-3-642-12032-9_8\">10.1007/978-3-642-12032-9_8</a>."},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","alternative_title":["LNCS"],"abstract":[{"text":"Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an adequate domain of limits for the well-structured transition systems that are induced by depth-bounded processes. An immediate consequence of our result is that there exists a forward algorithm that decides the covering problem for this class. Unlike backward algorithms, the forward algorithm terminates even if the depth of the process is not known a priori. More importantly, our result suggests a whole spectrum of forward algorithms that enable the effective verification of a large class of mobile systems.","lang":"eng"}],"publication_status":"published","ddc":["004"],"date_published":"2010-03-01T00:00:00Z","publisher":"Springer","file_date_updated":"2020-07-14T12:46:27Z","title":"Forward analysis of depth-bounded processes","date_created":"2018-12-11T12:08:27Z","type":"conference","_id":"4361","status":"public","pubrep_id":"50","conference":{"name":"FoSSaCS: Foundations of Software Science and Computation Structures","location":"Paphos, Cyprus","start_date":"2010-03-20","end_date":"2010-03-28"},"quality_controlled":"1","oa_version":"Submitted Version","author":[{"last_name":"Wies","first_name":"Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","full_name":"Wies, Thomas"},{"id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien","last_name":"Zufferey","first_name":"Damien","orcid":"0000-0002-3197-8736"},{"orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"}],"has_accepted_license":"1","month":"03","file":[{"date_created":"2018-12-12T10:08:17Z","date_updated":"2020-07-14T12:46:27Z","content_type":"application/pdf","file_name":"IST-2012-50-v1+1_Forward_analysis_of_depth-bounded_processes.pdf","relation":"main_file","access_level":"open_access","file_size":240766,"checksum":"3e610de84937d821316362658239134a","file_id":"4677","creator":"system"}],"language":[{"iso":"eng"}],"volume":6014},{"author":[{"id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","full_name":"Singh, Vasu","last_name":"Singh","first_name":"Vasu"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","alternative_title":["LNCS"],"date_updated":"2021-01-12T07:56:25Z","department":[{"_id":"ToHe"}],"quality_controlled":"1","citation":{"apa":"Singh, V. (2010). Runtime verification for software transactional memories. In O. Sokolsky, G. Rosu, N. Tilmann, H. Barringer, Y. Falcone, B. Finkbeiner, … G. Pace (Eds.) (Vol. 6418, pp. 421–435). Presented at the RV: International Conference on Runtime Verification, St. Julians, Malta: Springer. <a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">https://doi.org/10.1007/978-3-642-16612-9_32</a>","ama":"Singh V. Runtime verification for software transactional memories. In: Sokolsky O, Rosu G, Tilmann N, et al., eds. Vol 6418. Springer; 2010:421-435. doi:<a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">10.1007/978-3-642-16612-9_32</a>","chicago":"Singh, Vasu. “Runtime Verification for Software Transactional Memories.” edited by Oleg Sokolsky, Grigore Rosu, Nikolai Tilmann, Howard Barringer, Ylies Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, and Gordon Pace, 6418:421–35. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">https://doi.org/10.1007/978-3-642-16612-9_32</a>.","ista":"Singh V. 2010. Runtime verification for software transactional memories. RV: International Conference on Runtime Verification, LNCS, vol. 6418, 421–435.","ieee":"V. Singh, “Runtime verification for software transactional memories,” presented at the RV: International Conference on Runtime Verification, St. Julians, Malta, 2010, vol. 6418, pp. 421–435.","short":"V. Singh, in:, O. Sokolsky, G. Rosu, N. Tilmann, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund, I. Lee, G. Pace (Eds.), Springer, 2010, pp. 421–435.","mla":"Singh, Vasu. <i>Runtime Verification for Software Transactional Memories</i>. Edited by Oleg Sokolsky et al., vol. 6418, Springer, 2010, pp. 421–35, doi:<a href=\"https://doi.org/10.1007/978-3-642-16612-9_32\">10.1007/978-3-642-16612-9_32</a>."},"oa_version":"None","date_published":"2010-01-01T00:00:00Z","language":[{"iso":"eng"}],"publisher":"Springer","volume":6418,"title":"Runtime verification for software transactional memories","abstract":[{"text":"Software transactional memories (STMs) promise simple and efficient concurrent programming. Several correctness properties have been proposed for STMs. Based on a bounded conflict graph algorithm for verifying correctness of STMs, we develop TRACER, a tool for runtime verification of STM implementations. The novelty of TRACER lies in the way it combines coarse and precise runtime analyses to guarantee sound and complete verification in an efficient manner. We implement TRACER in the TL2 STM implementation. We evaluate the performance of TRACER on STAMP benchmarks. While a precise runtime verification technique based on conflict graphs results in an average slowdown of 60x, the two-level approach of TRACER performs complete verification with an average slowdown of around 25x across different benchmarks.","lang":"eng"}],"month":"01","publication_status":"published","page":"421 - 435","doi":"10.1007/978-3-642-16612-9_32","year":"2010","status":"public","day":"01","date_created":"2018-12-11T12:08:28Z","_id":"4362","type":"conference","intvolume":"      6418","publist_id":"1096","conference":{"start_date":"2010-11-01","end_date":"2010-11-04","name":"RV: International Conference on Runtime Verification","location":"St. Julians, Malta"},"editor":[{"full_name":"Sokolsky, Oleg","last_name":"Sokolsky","first_name":"Oleg"},{"full_name":"Rosu, Grigore","last_name":"Rosu","first_name":"Grigore"},{"full_name":"Tilmann, Nikolai","first_name":"Nikolai","last_name":"Tilmann"},{"full_name":"Barringer, Howard","last_name":"Barringer","first_name":"Howard"},{"full_name":"Falcone, Ylies","first_name":"Ylies","last_name":"Falcone"},{"full_name":"Finkbeiner, Bernd","first_name":"Bernd","last_name":"Finkbeiner"},{"last_name":"Havelund","first_name":"Klaus","full_name":"Havelund, Klaus"},{"first_name":"Insup","last_name":"Lee","full_name":"Lee, Insup"},{"first_name":"Gordon","last_name":"Pace","full_name":"Pace, Gordon"}],"scopus_import":1},{"type":"conference","_id":"4369","date_created":"2018-12-11T12:08:30Z","status":"public","pubrep_id":"49","conference":{"location":"Klosterneuburg, Austria","name":"FORMATS: Formal Modeling and Analysis of Timed Systems","start_date":"2010-09-08","end_date":"2010-09-10"},"ec_funded":1,"oa_version":"Submitted Version","project":[{"call_identifier":"FP7","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","grant_number":"215543","name":"COMponent-Based Embedded Systems design Techniques"},{"_id":"25F1337C-B435-11E9-9278-68D0E5697425","grant_number":"214373","name":"Design for Embedded Systems","call_identifier":"FP7"}],"quality_controlled":"1","author":[{"last_name":"Nickovic","first_name":"Dejan","full_name":"Nickovic, Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Nir","last_name":"Piterman","full_name":"Piterman, Nir"}],"file":[{"file_name":"IST-2012-49-v1+1_From_MTL_to_deterministic_timed_automata.pdf","content_type":"application/pdf","date_updated":"2020-07-14T12:46:27Z","date_created":"2018-12-12T10:13:43Z","creator":"system","file_id":"5028","checksum":"b0ca5f5fbe8a3d20ccbc6f51a344a459","file_size":249789,"access_level":"open_access","relation":"main_file"}],"has_accepted_license":"1","month":"09","volume":6246,"language":[{"iso":"eng"}],"oa":1,"page":"152 - 167","day":"08","year":"2010","doi":"10.1007/978-3-642-15297-9_13","editor":[{"full_name":"Henzinger, Thomas A.","last_name":"Henzinger","first_name":"Thomas A."},{"last_name":"Chatterjee","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu"}],"scopus_import":1,"publist_id":"1090","intvolume":"      6246","citation":{"apa":"Nickovic, D., &#38; Piterman, N. (2010). From MTL to deterministic timed automata. In T. A. Henzinger &#38; K. Chatterjee (Eds.) (Vol. 6246, pp. 152–167). Presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Klosterneuburg, Austria: Springer. <a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">https://doi.org/10.1007/978-3-642-15297-9_13</a>","ista":"Nickovic D, Piterman N. 2010. From MTL to deterministic timed automata. FORMATS: Formal Modeling and Analysis of Timed Systems, LNCS, vol. 6246, 152–167.","ama":"Nickovic D, Piterman N. From MTL to deterministic timed automata. In: Henzinger TA, Chatterjee K, eds. Vol 6246. Springer; 2010:152-167. doi:<a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">10.1007/978-3-642-15297-9_13</a>","chicago":"Nickovic, Dejan, and Nir Piterman. “From MTL to Deterministic Timed Automata.” edited by Thomas A. Henzinger and Krishnendu Chatterjee, 6246:152–67. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">https://doi.org/10.1007/978-3-642-15297-9_13</a>.","ieee":"D. Nickovic and N. Piterman, “From MTL to deterministic timed automata,” presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Klosterneuburg, Austria, 2010, vol. 6246, pp. 152–167.","mla":"Nickovic, Dejan, and Nir Piterman. <i>From MTL to Deterministic Timed Automata</i>. Edited by Thomas A. Henzinger and Krishnendu Chatterjee, vol. 6246, Springer, 2010, pp. 152–67, doi:<a href=\"https://doi.org/10.1007/978-3-642-15297-9_13\">10.1007/978-3-642-15297-9_13</a>.","short":"D. Nickovic, N. Piterman, in:, T.A. Henzinger, K. Chatterjee (Eds.), Springer, 2010, pp. 152–167."},"department":[{"_id":"ToHe"}],"date_updated":"2021-01-12T07:56:27Z","alternative_title":["LNCS"],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","ddc":["004"],"publication_status":"published","abstract":[{"text":"In this paper we propose a novel technique for constructing timed automata from properties expressed in the logic mtl, under bounded-variability assumptions. We handle full mtl and include all future operators. Our construction is based on separation of the continuous time monitoring of the input sequence and discrete predictions regarding the future. The separation of the continuous from the discrete allows us to determinize our automata in an exponential construction that does not increase the number of clocks. This leads to a doubly exponential construction from mtl to deterministic timed automata, compared with triply exponential using existing approaches. We offer an alternative to the existing approach to linear real-time model checking, which has never been implemented. It further offers a unified framework for model checking, runtime monitoring, and synthesis, in an approach that can reuse tools, implementations, and insights from the discrete setting.","lang":"eng"}],"title":"From MTL to deterministic timed automata","publisher":"Springer","file_date_updated":"2020-07-14T12:46:27Z","date_published":"2010-09-08T00:00:00Z"},{"language":[{"iso":"eng"}],"volume":5944,"month":"01","author":[{"full_name":"Kuncak, Viktor","last_name":"Kuncak","first_name":"Viktor"},{"full_name":"Piskac, Ruzica","last_name":"Piskac","first_name":"Ruzica"},{"last_name":"Suter","first_name":"Philippe","full_name":"Suter, Philippe"},{"full_name":"Wies, Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","last_name":"Wies","first_name":"Thomas"}],"quality_controlled":"1","oa_version":"Submitted Version","conference":{"start_date":"2010-01-17","end_date":"2010-01-19","location":"Madrid, Spain","name":"VMCAI: Verification, Model Checking and Abstract Interpretation"},"main_file_link":[{"open_access":"1","url":"https://infoscience.epfl.ch/record/161290/"}],"status":"public","date_created":"2018-12-11T12:08:33Z","_id":"4378","type":"conference","publisher":"Springer","date_published":"2010-01-01T00:00:00Z","title":"Building a calculus of data structures","publication_status":"published","abstract":[{"lang":"eng","text":"Techniques such as verification condition generation, predicate abstraction, and expressive type systems reduce software verification to proving formulas in expressive logics. Programs and their specifications often make use of data structures such as sets, multisets, algebraic data types, or graphs. Consequently, formulas generated from verification also involve such data structures. To automate the proofs of such formulas we propose a logic (a “calculus”) of such data structures. We build the calculus by starting from decidable logics of individual data structures, and connecting them through functions and sets, in ways that go beyond the frameworks such as Nelson-Oppen. The result are new decidable logics that can simultaneously specify properties of different kinds of data structures and overcome the limitations of the individual logics. Several of our decidable logics include abstraction functions that map a data structure into its more abstract view (a tree into a multiset, a multiset into a set), into a numerical quantity (the size or the height), or into the truth value of a candidate data structure invariant (sortedness, or the heap property). For algebraic data types, we identify an asymptotic many-to-one condition on the abstraction function that guarantees the existence of a decision procedure. In addition to the combination based on abstraction functions, we can combine multiple data structure theories if they all reduce to the same data structure logic. As an instance of this approach, we describe a decidable logic whose formulas are propositional combinations of formulas in: weak monadic second-order logic of two successors, two-variable logic with counting, multiset algebra with Presburger arithmetic, the Bernays-Schönfinkel-Ramsey class of first-order logic, and the logic of algebraic data types with the set content function. The subformulas in this combination can share common variables that refer to sets of objects along with the common set algebra operations. Such sound and complete combination is possible because the relations on sets definable in the component logics are all expressible in Boolean Algebra with Presburger Arithmetic. Presburger arithmetic and its new extensions play an important role in our decidability results. In several cases, when we combine logics that belong to NP, we can prove the satisfiability for the combined logic is still in NP."}],"alternative_title":["LNCS"],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"ToHe"}],"date_updated":"2021-01-12T07:56:31Z","citation":{"short":"V. Kuncak, R. Piskac, P. Suter, T. Wies, in:, G. Barthe, M. Hermenegildo (Eds.), Springer, 2010, pp. 26–44.","mla":"Kuncak, Viktor, et al. <i>Building a Calculus of Data Structures</i>. Edited by Gilles Barthe and Manuel Hermenegildo, vol. 5944, Springer, 2010, pp. 26–44, doi:<a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">10.1007/978-3-642-11319-2_6</a>.","ieee":"V. Kuncak, R. Piskac, P. Suter, and T. Wies, “Building a calculus of data structures,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Madrid, Spain, 2010, vol. 5944, pp. 26–44.","ista":"Kuncak V, Piskac R, Suter P, Wies T. 2010. Building a calculus of data structures. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 5944, 26–44.","chicago":"Kuncak, Viktor, Ruzica Piskac, Philippe Suter, and Thomas Wies. “Building a Calculus of Data Structures.” edited by Gilles Barthe and Manuel Hermenegildo, 5944:26–44. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">https://doi.org/10.1007/978-3-642-11319-2_6</a>.","ama":"Kuncak V, Piskac R, Suter P, Wies T. Building a calculus of data structures. In: Barthe G, Hermenegildo M, eds. Vol 5944. Springer; 2010:26-44. doi:<a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">10.1007/978-3-642-11319-2_6</a>","apa":"Kuncak, V., Piskac, R., Suter, P., &#38; Wies, T. (2010). Building a calculus of data structures. In G. Barthe &#38; M. Hermenegildo (Eds.) (Vol. 5944, pp. 26–44). Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Madrid, Spain: Springer. <a href=\"https://doi.org/10.1007/978-3-642-11319-2_6\">https://doi.org/10.1007/978-3-642-11319-2_6</a>"},"publist_id":"1081","intvolume":"      5944","editor":[{"full_name":"Barthe, Gilles","last_name":"Barthe","first_name":"Gilles"},{"last_name":"Hermenegildo","first_name":"Manuel","full_name":"Hermenegildo, Manuel"}],"scopus_import":1,"day":"01","year":"2010","page":"26 - 44","doi":"10.1007/978-3-642-11319-2_6","oa":1},{"title":"A marketplace for cloud resources","file_date_updated":"2020-07-14T12:46:28Z","date_published":"2010-10-24T00:00:00Z","publisher":"ACM","ddc":["005"],"abstract":[{"text":"Cloud computing is an emerging paradigm aimed to offer users pay-per-use computing resources, while leaving the burden of managing the computing infrastructure to the cloud provider. We present a new programming and pricing model that gives the cloud user the flexibility of trading execution speed and price on a per-job basis. We discuss the scheduling and resource management challenges for the cloud provider that arise in the implementation of this model. We argue that techniques from real-time and embedded software can be useful in this context.","lang":"eng"}],"publication_status":"published","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"mla":"Henzinger, Thomas A., et al. <i>A Marketplace for Cloud Resources</i>. ACM, 2010, pp. 1–8, doi:<a href=\"https://doi.org/10.1145/1879021.1879022\">10.1145/1879021.1879022</a>.","short":"T.A. Henzinger, A. Tomar, V. Singh, T. Wies, D. Zufferey, in:, ACM, 2010, pp. 1–8.","ama":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. A marketplace for cloud resources. In: ACM; 2010:1-8. doi:<a href=\"https://doi.org/10.1145/1879021.1879022\">10.1145/1879021.1879022</a>","chicago":"Henzinger, Thomas A, Anmol Tomar, Vasu Singh, Thomas Wies, and Damien Zufferey. “A Marketplace for Cloud Resources,” 1–8. ACM, 2010. <a href=\"https://doi.org/10.1145/1879021.1879022\">https://doi.org/10.1145/1879021.1879022</a>.","ista":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. 2010. A marketplace for cloud resources. EMSOFT: Embedded Software , 1–8.","apa":"Henzinger, T. A., Tomar, A., Singh, V., Wies, T., &#38; Zufferey, D. (2010). A marketplace for cloud resources (pp. 1–8). Presented at the EMSOFT: Embedded Software , Arizona, USA: ACM. <a href=\"https://doi.org/10.1145/1879021.1879022\">https://doi.org/10.1145/1879021.1879022</a>","ieee":"T. A. Henzinger, A. Tomar, V. Singh, T. Wies, and D. Zufferey, “A marketplace for cloud resources,” presented at the EMSOFT: Embedded Software , Arizona, USA, 2010, pp. 1–8."},"date_updated":"2021-01-12T07:56:32Z","department":[{"_id":"ToHe"}],"publist_id":"1078","scopus_import":1,"year":"2010","doi":"10.1145/1879021.1879022","page":"1 - 8","day":"24","oa":1,"language":[{"iso":"eng"}],"file":[{"file_name":"IST-2012-48-v1+1_A_marketplace_for_cloud_resources.pdf","content_type":"application/pdf","date_created":"2018-12-12T10:09:42Z","date_updated":"2020-07-14T12:46:28Z","file_id":"4767","checksum":"7680dd24016810710f7c977bc94f85e9","creator":"system","access_level":"open_access","file_size":222626,"relation":"main_file"}],"month":"10","has_accepted_license":"1","author":[{"last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"last_name":"Tomar","first_name":"Anmol","id":"3D8D36B6-F248-11E8-B48F-1D18A9856A87","full_name":"Tomar, Anmol"},{"full_name":"Singh, Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","last_name":"Singh","first_name":"Vasu"},{"first_name":"Thomas","last_name":"Wies","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","full_name":"Wies, Thomas"},{"id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien","first_name":"Damien","last_name":"Zufferey","orcid":"0000-0002-3197-8736"}],"oa_version":"Submitted Version","quality_controlled":"1","conference":{"start_date":"2010-10-24","end_date":"2010-10-29","name":"EMSOFT: Embedded Software ","location":"Arizona, USA"},"pubrep_id":"48","status":"public","_id":"4380","type":"conference","date_created":"2018-12-11T12:08:33Z"},{"_id":"4381","type":"conference","date_created":"2018-12-11T12:08:33Z","status":"public","pubrep_id":"47","conference":{"location":"Miami, USA","name":"CLOUD: Cloud Computing","end_date":"2010-07-10","start_date":"2010-07-05"},"oa_version":"Submitted Version","quality_controlled":"1","author":[{"orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Tomar","first_name":"Anmol","full_name":"Tomar, Anmol","id":"3D8D36B6-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Vasu","last_name":"Singh","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","full_name":"Singh, Vasu"},{"full_name":"Wies, Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas","last_name":"Wies"},{"last_name":"Zufferey","first_name":"Damien","orcid":"0000-0002-3197-8736","id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien"}],"file":[{"file_size":467436,"access_level":"open_access","creator":"system","checksum":"98e534675339a8e2beca08890d048145","file_id":"5188","relation":"main_file","file_name":"IST-2012-47-v1+1_FlexPRICE-_Flexible_provisioning_of_resources_in_a_cloud_environment.pdf","date_updated":"2020-07-14T12:46:28Z","date_created":"2018-12-12T10:16:03Z","content_type":"application/pdf"}],"has_accepted_license":"1","month":"08","article_processing_charge":"No","language":[{"iso":"eng"}],"oa":1,"year":"2010","day":"26","doi":"10.1109/CLOUD.2010.71","page":"83 - 90","scopus_import":1,"publist_id":"1077","citation":{"mla":"Henzinger, Thomas A., et al. <i>FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment</i>. IEEE, 2010, pp. 83–90, doi:<a href=\"https://doi.org/10.1109/CLOUD.2010.71\">10.1109/CLOUD.2010.71</a>.","short":"T.A. Henzinger, A. Tomar, V. Singh, T. Wies, D. Zufferey, in:, IEEE, 2010, pp. 83–90.","ista":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. 2010. FlexPRICE: Flexible provisioning of resources in a cloud environment. CLOUD: Cloud Computing, 83–90.","chicago":"Henzinger, Thomas A, Anmol Tomar, Vasu Singh, Thomas Wies, and Damien Zufferey. “FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment,” 83–90. IEEE, 2010. <a href=\"https://doi.org/10.1109/CLOUD.2010.71\">https://doi.org/10.1109/CLOUD.2010.71</a>.","ama":"Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. FlexPRICE: Flexible provisioning of resources in a cloud environment. In: IEEE; 2010:83-90. doi:<a href=\"https://doi.org/10.1109/CLOUD.2010.71\">10.1109/CLOUD.2010.71</a>","apa":"Henzinger, T. A., Tomar, A., Singh, V., Wies, T., &#38; Zufferey, D. (2010). FlexPRICE: Flexible provisioning of resources in a cloud environment (pp. 83–90). Presented at the CLOUD: Cloud Computing, Miami, USA: IEEE. <a href=\"https://doi.org/10.1109/CLOUD.2010.71\">https://doi.org/10.1109/CLOUD.2010.71</a>","ieee":"T. A. Henzinger, A. Tomar, V. Singh, T. Wies, and D. Zufferey, “FlexPRICE: Flexible provisioning of resources in a cloud environment,” presented at the CLOUD: Cloud Computing, Miami, USA, 2010, pp. 83–90."},"date_updated":"2021-01-12T07:56:33Z","department":[{"_id":"ToHe"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","ddc":["004"],"abstract":[{"text":"Cloud computing aims to give users virtually unlimited pay-per-use computing resources without the burden of managing the underlying infrastructure. We claim that, in order to realize the full potential of cloud computing, the user must be presented with a pricing model that offers flexibility at the requirements level, such as a choice between different degrees of execution speed and the cloud provider must be presented with a programming model that offers flexibility at the execution level, such as a choice between different scheduling policies. In such a flexible framework, with each job, the user purchases a virtual computer with the desired speed and cost characteristics, and the cloud provider can optimize the utilization of resources across a stream of jobs from different users. We designed a flexible framework to test our hypothesis, which is called FlexPRICE (Flexible Provisioning of Resources in a Cloud Environment) and works as follows. A user presents a job to the cloud. The cloud finds different schedules to execute the job and presents a set of quotes to the user in terms of price and duration for the execution. The user then chooses a particular quote and the cloud is obliged to execute the job according to the chosen quote. FlexPRICE thus hides the complexity of the actual scheduling decisions from the user, but still provides enough flexibility to meet the users actual demands. We implemented FlexPRICE in a simulator called PRICES that allows us to experiment with our framework. We observe that FlexPRICE provides a wide range of execution options-from fast and expensive to slow and cheap-- for the whole spectrum of data-intensive and computation-intensive jobs. We also observe that the set of quotes computed by FlexPRICE do not vary as the number of simultaneous jobs increases.","lang":"eng"}],"publication_status":"published","title":"FlexPRICE: Flexible provisioning of resources in a cloud environment","date_published":"2010-08-26T00:00:00Z","publisher":"IEEE","file_date_updated":"2020-07-14T12:46:28Z"},{"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","author":[{"first_name":"Rachid","last_name":"Guerraoui","full_name":"Guerraoui, Rachid"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Michal","last_name":"Kapalka","full_name":"Kapalka, Michal"},{"full_name":"Singh, Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","last_name":"Singh","first_name":"Vasu"}],"oa_version":"Submitted Version","citation":{"short":"R. Guerraoui, T.A. Henzinger, M. Kapalka, V. Singh, in:, ACM, 2010, pp. 263–272.","mla":"Guerraoui, Rachid, et al. <i>Transactions in the Jungle</i>. ACM, 2010, pp. 263–72, doi:<a href=\"https://doi.org/10.1145/1810479.1810529\">10.1145/1810479.1810529</a>.","ieee":"R. Guerraoui, T. A. Henzinger, M. Kapalka, and V. Singh, “Transactions in the jungle,” presented at the SPAA: ACM Symposium on Parallel Algorithms and Architectures, Santorini, Greece, 2010, pp. 263–272.","apa":"Guerraoui, R., Henzinger, T. A., Kapalka, M., &#38; Singh, V. (2010). Transactions in the jungle (pp. 263–272). Presented at the SPAA: ACM Symposium on Parallel Algorithms and Architectures, Santorini, Greece: ACM. <a href=\"https://doi.org/10.1145/1810479.1810529\">https://doi.org/10.1145/1810479.1810529</a>","ama":"Guerraoui R, Henzinger TA, Kapalka M, Singh V. Transactions in the jungle. In: ACM; 2010:263-272. doi:<a href=\"https://doi.org/10.1145/1810479.1810529\">10.1145/1810479.1810529</a>","chicago":"Guerraoui, Rachid, Thomas A Henzinger, Michal Kapalka, and Vasu Singh. “Transactions in the Jungle,” 263–72. ACM, 2010. <a href=\"https://doi.org/10.1145/1810479.1810529\">https://doi.org/10.1145/1810479.1810529</a>.","ista":"Guerraoui R, Henzinger TA, Kapalka M, Singh V. 2010. Transactions in the jungle. SPAA: ACM Symposium on Parallel Algorithms and Architectures, 263–272."},"date_updated":"2021-01-12T07:56:33Z","department":[{"_id":"ToHe"}],"quality_controlled":"1","title":"Transactions in the jungle","language":[{"iso":"eng"}],"publisher":"ACM","file_date_updated":"2020-07-14T12:46:28Z","date_published":"2010-06-13T00:00:00Z","file":[{"date_created":"2018-12-12T10:14:28Z","date_updated":"2020-07-14T12:46:28Z","content_type":"application/pdf","file_name":"IST-2012-46-v1+1_Transactions_in_the_jungle.pdf","relation":"main_file","access_level":"open_access","file_size":246409,"checksum":"f2ad6c00a6304da34bf21bcdcfd36c4b","file_id":"5080","creator":"system"}],"ddc":["005"],"abstract":[{"text":"Transactional memory (TM) has shown potential to simplify the task of writing concurrent programs. Inspired by classical work on databases, formal definitions of the semantics of TM executions have been proposed. Many of these definitions assumed that accesses to shared data are solely performed through transactions. In practice, due to legacy code and concurrency libraries, transactions in a TM have to share data with non-transactional operations. The semantics of such interaction, while widely discussed by practitioners, lacks a clear formal specification. Those interactions can vary, sometimes in subtle ways, between TM implementations and underlying memory models. We propose a correctness condition for TMs, parametrized opacity, to formally capture the now folklore notion of strong atomicity by stipulating the two following intuitive requirements: first, every transaction appears as if it is executed instantaneously with respect to other transactions and non-transactional operations, and second, non-transactional operations conform to the given underlying memory model. We investigate the inherent cost of implementing parametrized opacity. We first prove that parametrized opacity requires either instrumenting non-transactional operations (for most memory models) or writing to memory by transactions using potentially expensive read-modify-write instructions (such as compare-and-swap). Then, we show that for a class of practical relaxed memory models, parametrized opacity can indeed be implemented with constant-time instrumentation of non-transactional writes and no instrumentation of non-transactional reads. We show that, in practice, parametrizing the notion of correctness allows developing more efficient TM implementations.","lang":"eng"}],"has_accepted_license":"1","month":"06","publication_status":"published","year":"2010","page":"263 - 272","doi":"10.1145/1810479.1810529","status":"public","day":"13","_id":"4382","type":"conference","oa":1,"date_created":"2018-12-11T12:08:34Z","conference":{"end_date":"2010-06-15","start_date":"2010-06-13","location":"Santorini, Greece","name":"SPAA: ACM Symposium on Parallel Algorithms and Architectures"},"publist_id":"1076","pubrep_id":"46"},{"scopus_import":1,"related_material":{"record":[{"relation":"earlier_version","id":"5393","status":"public"}]},"publist_id":"1068","arxiv":1,"intvolume":"      6174","oa":1,"doi":"10.1007/978-3-642-14295-6_57","page":"665 - 669","year":"2010","day":"01","ddc":["004"],"publication_status":"published","abstract":[{"lang":"eng","text":"GIST is a tool that (a) solves the qualitative analysis problem of turn-based probabilistic games with ω-regular objectives; and (b) synthesizes reasonable environment assumptions for synthesis of unrealizable specifications. Our tool provides the first and efficient implementations of several reduction-based techniques to solve turn-based probabilistic games, and uses the analysis of turn-based probabilistic games for synthesizing environment assumptions for unrealizable specifications."}],"title":"GIST: A solver for probabilistic games","publisher":"Springer","date_published":"2010-07-01T00:00:00Z","file_date_updated":"2020-07-14T12:46:28Z","citation":{"apa":"Chatterjee, K., Henzinger, T. A., Jobstmann, B., &#38; Radhakrishna, A. (2010). GIST: A solver for probabilistic games (Vol. 6174, pp. 665–669). Presented at the CAV: Computer Aided Verification, Edinburgh, UK: Springer. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">https://doi.org/10.1007/978-3-642-14295-6_57</a>","ista":"Chatterjee K, Henzinger TA, Jobstmann B, Radhakrishna A. 2010. GIST: A solver for probabilistic games. CAV: Computer Aided Verification, LNCS, vol. 6174, 665–669.","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, Barbara Jobstmann, and Arjun Radhakrishna. “GIST: A Solver for Probabilistic Games,” 6174:665–69. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">https://doi.org/10.1007/978-3-642-14295-6_57</a>.","ama":"Chatterjee K, Henzinger TA, Jobstmann B, Radhakrishna A. GIST: A solver for probabilistic games. In: Vol 6174. Springer; 2010:665-669. doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">10.1007/978-3-642-14295-6_57</a>","ieee":"K. Chatterjee, T. A. Henzinger, B. Jobstmann, and A. Radhakrishna, “GIST: A solver for probabilistic games,” presented at the CAV: Computer Aided Verification, Edinburgh, UK, 2010, vol. 6174, pp. 665–669.","mla":"Chatterjee, Krishnendu, et al. <i>GIST: A Solver for Probabilistic Games</i>. Vol. 6174, Springer, 2010, pp. 665–69, doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_57\">10.1007/978-3-642-14295-6_57</a>.","short":"K. Chatterjee, T.A. Henzinger, B. Jobstmann, A. Radhakrishna, in:, Springer, 2010, pp. 665–669."},"department":[{"_id":"KrCh"},{"_id":"ToHe"}],"date_updated":"2023-02-23T12:24:17Z","external_id":{"arxiv":["1004.2367"]},"alternative_title":["LNCS"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","pubrep_id":"43","conference":{"location":"Edinburgh, UK","name":"CAV: Computer Aided Verification","start_date":"2010-07-15","end_date":"2010-07-17"},"ec_funded":1,"_id":"4388","type":"conference","date_created":"2018-12-11T12:08:36Z","status":"public","file":[{"relation":"main_file","file_size":293605,"access_level":"open_access","creator":"system","checksum":"0b2ef8c4037ffccc6902d93081af24f7","file_id":"5221","date_updated":"2020-07-14T12:46:28Z","date_created":"2018-12-12T10:16:33Z","content_type":"application/pdf","file_name":"IST-2012-43-v1+1_GIST-_A_solver_for_probabilistic_games.pdf"}],"month":"07","has_accepted_license":"1","volume":6174,"article_processing_charge":"No","language":[{"iso":"eng"}],"oa_version":"Submitted Version","quality_controlled":"1","project":[{"call_identifier":"FP7","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","grant_number":"215543","name":"COMponent-Based Embedded Systems design Techniques"},{"call_identifier":"FP7","grant_number":"214373","_id":"25F1337C-B435-11E9-9278-68D0E5697425","name":"Design for Embedded Systems"}],"author":[{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Jobstmann, Barbara","last_name":"Jobstmann","first_name":"Barbara"},{"id":"3B51CAC4-F248-11E8-B48F-1D18A9856A87","full_name":"Radhakrishna, Arjun","last_name":"Radhakrishna","first_name":"Arjun"}]},{"scopus_import":1,"publist_id":"1069","oa":1,"doi":"10.1109/ACSD.2010.26","day":"23","year":"2010","page":"77 - 84","abstract":[{"text":"Digital components play a central role in the design of complex embedded systems. These components are interconnected with other, possibly analog, devices and the physical environment. This environment cannot be entirely captured and can provide inaccurate input data to the component. It is thus important for digital components to have a robust behavior, i.e. the presence of a small change in the input sequences should not result in a drastic change in the output sequences. In this paper, we study a notion of robustness for sequential circuits. However, since sequential circuits may have parts that are naturally discontinuous (e.g., digital controllers with switching behavior), we need a flexible framework that accommodates this fact and leaves discontinuous parts of the circuit out from the robustness analysis. As a consequence, we consider sequential circuits that have their input variables partitioned into two disjoint sets: control and disturbance variables. Our contributions are (1) a definition of robustness for sequential circuits as a form of continuity with respect to disturbance variables, (2) the characterization of the exact class of sequential circuits that are robust according to our definition, (3) an algorithm to decide whether a sequential circuit is robust or not.","lang":"eng"}],"publication_status":"published","ddc":["004"],"publisher":"IEEE","date_published":"2010-08-23T00:00:00Z","file_date_updated":"2020-07-14T12:46:28Z","title":"Robustness of sequential circuits","date_updated":"2021-01-12T07:56:36Z","department":[{"_id":"ToHe"}],"citation":{"ama":"Doyen L, Henzinger TA, Legay A, Nickovic D. Robustness of sequential circuits. In: IEEE; 2010:77-84. doi:<a href=\"https://doi.org/10.1109/ACSD.2010.26\">10.1109/ACSD.2010.26</a>","chicago":"Doyen, Laurent, Thomas A Henzinger, Axel Legay, and Dejan Nickovic. “Robustness of Sequential Circuits,” 77–84. IEEE, 2010. <a href=\"https://doi.org/10.1109/ACSD.2010.26\">https://doi.org/10.1109/ACSD.2010.26</a>.","ista":"Doyen L, Henzinger TA, Legay A, Nickovic D. 2010. Robustness of sequential circuits. ACSD: Application of Concurrency to System Design, 77–84.","apa":"Doyen, L., Henzinger, T. A., Legay, A., &#38; Nickovic, D. (2010). Robustness of sequential circuits (pp. 77–84). Presented at the ACSD: Application of Concurrency to System Design, IEEE. <a href=\"https://doi.org/10.1109/ACSD.2010.26\">https://doi.org/10.1109/ACSD.2010.26</a>","ieee":"L. Doyen, T. A. Henzinger, A. Legay, and D. Nickovic, “Robustness of sequential circuits,” presented at the ACSD: Application of Concurrency to System Design, 2010, pp. 77–84.","short":"L. Doyen, T.A. Henzinger, A. Legay, D. Nickovic, in:, IEEE, 2010, pp. 77–84.","mla":"Doyen, Laurent, et al. <i>Robustness of Sequential Circuits</i>. IEEE, 2010, pp. 77–84, doi:<a href=\"https://doi.org/10.1109/ACSD.2010.26\">10.1109/ACSD.2010.26</a>."},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","pubrep_id":"44","conference":{"name":"ACSD: Application of Concurrency to System Design"},"date_created":"2018-12-11T12:08:36Z","_id":"4389","type":"conference","status":"public","month":"08","has_accepted_license":"1","file":[{"date_updated":"2020-07-14T12:46:28Z","date_created":"2018-12-12T10:09:10Z","content_type":"application/pdf","file_name":"IST-2012-44-v1+1_Robustness_of_sequential_circuits.pdf","relation":"main_file","file_size":159920,"access_level":"open_access","creator":"system","checksum":"42b2952bfc6b6974617bd554842b904a","file_id":"4733"}],"language":[{"iso":"eng"}],"quality_controlled":"1","oa_version":"Submitted Version","author":[{"full_name":"Doyen, Laurent","first_name":"Laurent","last_name":"Doyen"},{"full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"},{"full_name":"Legay, Axel","last_name":"Legay","first_name":"Axel"},{"first_name":"Dejan","last_name":"Nickovic","full_name":"Nickovic, Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87"}]},{"volume":6174,"article_processing_charge":"No","language":[{"iso":"eng"}],"file":[{"file_size":3633276,"access_level":"open_access","creator":"dernst","checksum":"2eb211ce40b3c4988bce3a3592980704","file_id":"7873","relation":"main_file","file_name":"2010_CAV_Cerny.pdf","date_updated":"2020-07-14T12:46:28Z","date_created":"2020-05-19T16:31:56Z","content_type":"application/pdf"}],"month":"07","has_accepted_license":"1","author":[{"full_name":"Cerny, Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","last_name":"Cerny","first_name":"Pavol"},{"first_name":"Arjun","last_name":"Radhakrishna","id":"3B51CAC4-F248-11E8-B48F-1D18A9856A87","full_name":"Radhakrishna, Arjun"},{"first_name":"Damien","last_name":"Zufferey","orcid":"0000-0002-3197-8736","id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien"},{"last_name":"Chaudhuri","first_name":"Swarat","full_name":"Chaudhuri, Swarat"},{"last_name":"Alur","first_name":"Rajeev","full_name":"Alur, Rajeev"}],"oa_version":"Submitted Version","quality_controlled":"1","conference":{"end_date":"2010-07-17","start_date":"2010-07-15","location":"Edinburgh, UK","name":"CAV: Computer Aided Verification"},"pubrep_id":"27","status":"public","type":"conference","_id":"4390","date_created":"2018-12-11T12:08:36Z","title":"Model checking of linearizability of concurrent list implementations","publisher":"Springer","file_date_updated":"2020-07-14T12:46:28Z","date_published":"2010-07-01T00:00:00Z","ddc":["000"],"publication_status":"published","abstract":[{"text":"Concurrent data structures with fine-grained synchronization are notoriously difficult to implement correctly. The difficulty of reasoning about these implementations does not stem from the number of variables or the program size, but rather from the large number of possible interleavings. These implementations are therefore prime candidates for model checking. We introduce an algorithm for verifying linearizability of singly-linked heap-based concurrent data structures. We consider a model consisting of an unbounded heap where each vertex stores an element from an unbounded data domain, with a restricted set of operations for testing and updating pointers and data elements. Our main result is that linearizability is decidable for programs that invoke a fixed number of methods, possibly in parallel. This decidable fragment covers many of the common implementation techniques — fine-grained locking, lazy synchronization, and lock-free synchronization. We also show how the technique can be used to verify optimistic implementations with the help of programmer annotations. We developed a verification tool CoLT and evaluated it on a representative sample of Java implementations of the concurrent set data structure. The tool verified linearizability of a number of implementations, found a known error in a lock-free implementation and proved that the corrected version is linearizable.","lang":"eng"}],"alternative_title":["LNCS"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"short":"P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, R. Alur, in:, Springer, 2010, pp. 465–479.","mla":"Cerny, Pavol, et al. <i>Model Checking of Linearizability of Concurrent List Implementations</i>. Vol. 6174, Springer, 2010, pp. 465–79, doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_41\">10.1007/978-3-642-14295-6_41</a>.","ieee":"P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, and R. Alur, “Model checking of linearizability of concurrent list implementations,” presented at the CAV: Computer Aided Verification, Edinburgh, UK, 2010, vol. 6174, pp. 465–479.","ista":"Cerny P, Radhakrishna A, Zufferey D, Chaudhuri S, Alur R. 2010. Model checking of linearizability of concurrent list implementations. CAV: Computer Aided Verification, LNCS, vol. 6174, 465–479.","chicago":"Cerny, Pavol, Arjun Radhakrishna, Damien Zufferey, Swarat Chaudhuri, and Rajeev Alur. “Model Checking of Linearizability of Concurrent List Implementations,” 6174:465–79. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_41\">https://doi.org/10.1007/978-3-642-14295-6_41</a>.","ama":"Cerny P, Radhakrishna A, Zufferey D, Chaudhuri S, Alur R. Model checking of linearizability of concurrent list implementations. In: Vol 6174. Springer; 2010:465-479. doi:<a href=\"https://doi.org/10.1007/978-3-642-14295-6_41\">10.1007/978-3-642-14295-6_41</a>","apa":"Cerny, P., Radhakrishna, A., Zufferey, D., Chaudhuri, S., &#38; Alur, R. (2010). Model checking of linearizability of concurrent list implementations (Vol. 6174, pp. 465–479). Presented at the CAV: Computer Aided Verification, Edinburgh, UK: Springer. <a href=\"https://doi.org/10.1007/978-3-642-14295-6_41\">https://doi.org/10.1007/978-3-642-14295-6_41</a>"},"department":[{"_id":"ToHe"}],"date_updated":"2023-02-23T12:24:12Z","publist_id":"1066","intvolume":"      6174","related_material":{"record":[{"relation":"earlier_version","id":"5391","status":"public"}]},"doi":"10.1007/978-3-642-14295-6_41","year":"2010","page":"465 - 479","day":"01","oa":1},{"date_updated":"2021-01-12T07:56:38Z","department":[{"_id":"ToHe"}],"citation":{"short":"P. Cerny, T.A. Henzinger, A. Radhakrishna, in:, Z. Manna, D. Peled (Eds.), Time For Verification: Essays in Memory of Amir Pnueli, Springer, 2010, pp. 42–60.","mla":"Cerny, Pavol, et al. “Quantitative Simulation Games.” <i>Time For Verification: Essays in Memory of Amir Pnueli</i>, edited by Zohar Manna and Doron Peled, vol. 6200, Springer, 2010, pp. 42–60, doi:<a href=\"https://doi.org/10.1007/978-3-642-13754-9_3\">10.1007/978-3-642-13754-9_3</a>.","ama":"Cerny P, Henzinger TA, Radhakrishna A. Quantitative Simulation Games. In: Manna Z, Peled D, eds. <i>Time For Verification: Essays in Memory of Amir Pnueli</i>. Vol 6200. Essays in Memory of Amir Pnueli. Springer; 2010:42-60. doi:<a href=\"https://doi.org/10.1007/978-3-642-13754-9_3\">10.1007/978-3-642-13754-9_3</a>","chicago":"Cerny, Pavol, Thomas A Henzinger, and Arjun Radhakrishna. “Quantitative Simulation Games.” In <i>Time For Verification: Essays in Memory of Amir Pnueli</i>, edited by Zohar Manna and Doron Peled, 6200:42–60. Essays in Memory of Amir Pnueli. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-13754-9_3\">https://doi.org/10.1007/978-3-642-13754-9_3</a>.","ista":"Cerny P, Henzinger TA, Radhakrishna A. 2010.Quantitative Simulation Games. In: Time For Verification: Essays in Memory of Amir Pnueli. LNCS, vol. 6200, 42–60.","apa":"Cerny, P., Henzinger, T. A., &#38; Radhakrishna, A. (2010). Quantitative Simulation Games. In Z. Manna &#38; D. Peled (Eds.), <i>Time For Verification: Essays in Memory of Amir Pnueli</i> (Vol. 6200, pp. 42–60). Springer. <a href=\"https://doi.org/10.1007/978-3-642-13754-9_3\">https://doi.org/10.1007/978-3-642-13754-9_3</a>","ieee":"P. Cerny, T. A. Henzinger, and A. Radhakrishna, “Quantitative Simulation Games,” in <i>Time For Verification: Essays in Memory of Amir Pnueli</i>, vol. 6200, Z. Manna and D. Peled, Eds. Springer, 2010, pp. 42–60."},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","alternative_title":["LNCS"],"abstract":[{"text":"While a boolean notion of correctness is given by a preorder on systems and properties, a quantitative notion of correctness is defined by a distance function on systems and properties, where the distance between a system and a property provides a measure of “fit” or “desirability.” In this article, we explore several ways how the simulation preorder can be generalized to a distance function. This is done by equipping the classical simulation game between a system and a property with quantitative objectives. In particular, for systems that satisfy a property, a quantitative simulation game can measure the “robustness” of the satisfaction, that is, how much the system can deviate from its nominal behavior while still satisfying the property. For systems that violate a property, a quantitative simulation game can measure the “seriousness” of the violation, that is, how much the property has to be modified so that it is satisfied by the system. These distances can be computed in polynomial time, since the computation reduces to the value problem in limit average games with constant weights. Finally, we demonstrate how the robustness distance can be used to measure how many transmission errors are tolerated by error correcting codes. ","lang":"eng"}],"publication_status":"published","series_title":"Essays in Memory of Amir Pnueli","date_published":"2010-07-29T00:00:00Z","publisher":"Springer","title":"Quantitative Simulation Games","year":"2010","day":"29","doi":"10.1007/978-3-642-13754-9_3","page":"42 - 60","scopus_import":1,"editor":[{"full_name":"Manna, Zohar","last_name":"Manna","first_name":"Zohar"},{"full_name":"Peled, Doron","last_name":"Peled","first_name":"Doron"}],"intvolume":"      6200","publist_id":"1064","publication":"Time For Verification: Essays in Memory of Amir Pnueli","project":[{"_id":"25EFB36C-B435-11E9-9278-68D0E5697425","grant_number":"215543","name":"COMponent-Based Embedded Systems design Techniques","call_identifier":"FP7"},{"call_identifier":"FP7","name":"Design for Embedded Systems","_id":"25F1337C-B435-11E9-9278-68D0E5697425","grant_number":"214373"}],"quality_controlled":"1","oa_version":"None","author":[{"last_name":"Cerny","first_name":"Pavol","full_name":"Cerny, Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"first_name":"Arjun","last_name":"Radhakrishna","id":"3B51CAC4-F248-11E8-B48F-1D18A9856A87","full_name":"Radhakrishna, Arjun"}],"month":"07","language":[{"iso":"eng"}],"volume":6200,"date_created":"2018-12-11T12:08:37Z","_id":"4392","type":"book_chapter","status":"public","ec_funded":1},{"type":"conference","_id":"4393","date_created":"2018-12-11T12:08:37Z","status":"public","pubrep_id":"42","conference":{"start_date":"2010-08-31","end_date":"2010-09-03","name":"CONCUR: Concurrency Theory","location":"Paris, France"},"ec_funded":1,"oa_version":"Submitted Version","quality_controlled":"1","project":[{"call_identifier":"FP7","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","grant_number":"215543","name":"COMponent-Based Embedded Systems design Techniques"},{"call_identifier":"FP7","grant_number":"214373","_id":"25F1337C-B435-11E9-9278-68D0E5697425","name":"Design for Embedded Systems"}],"author":[{"last_name":"Cerny","first_name":"Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","full_name":"Cerny, Pavol"},{"orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Arjun","last_name":"Radhakrishna","id":"3B51CAC4-F248-11E8-B48F-1D18A9856A87","full_name":"Radhakrishna, Arjun"}],"file":[{"date_created":"2018-12-12T10:15:12Z","date_updated":"2020-07-14T12:46:28Z","content_type":"application/pdf","file_name":"IST-2012-42-v1+1_Simulation_distances.pdf","relation":"main_file","access_level":"open_access","file_size":198913,"file_id":"5130","checksum":"ea567903676ba8afe0507ee11313dce5","creator":"system"}],"month":"11","has_accepted_license":"1","volume":6269,"language":[{"iso":"eng"}],"oa":1,"doi":"10.1007/978-3-642-15375-4_18","year":"2010","page":"235 - 268","day":"01","acknowledgement":"This work was partially supported by the European Union project COMBEST and the European Network of Excellence ArtistDesign.","scopus_import":1,"related_material":{"record":[{"status":"public","relation":"later_version","id":"3249"},{"id":"5389","relation":"earlier_version","status":"public"}]},"publist_id":"1065","intvolume":"      6269","citation":{"mla":"Cerny, Pavol, et al. <i>Simulation Distances</i>. Vol. 6269, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2010, pp. 235–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-15375-4_18\">10.1007/978-3-642-15375-4_18</a>.","short":"P. Cerny, T.A. Henzinger, A. Radhakrishna, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2010, pp. 235–268.","ieee":"P. Cerny, T. A. Henzinger, and A. Radhakrishna, “Simulation distances,” presented at the CONCUR: Concurrency Theory, Paris, France, 2010, vol. 6269, pp. 235–268.","apa":"Cerny, P., Henzinger, T. A., &#38; Radhakrishna, A. (2010). Simulation distances (Vol. 6269, pp. 235–268). Presented at the CONCUR: Concurrency Theory, Paris, France: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.1007/978-3-642-15375-4_18\">https://doi.org/10.1007/978-3-642-15375-4_18</a>","ista":"Cerny P, Henzinger TA, Radhakrishna A. 2010. Simulation distances. CONCUR: Concurrency Theory, LNCS, vol. 6269, 235–268.","chicago":"Cerny, Pavol, Thomas A Henzinger, and Arjun Radhakrishna. “Simulation Distances,” 6269:235–68. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2010. <a href=\"https://doi.org/10.1007/978-3-642-15375-4_18\">https://doi.org/10.1007/978-3-642-15375-4_18</a>.","ama":"Cerny P, Henzinger TA, Radhakrishna A. Simulation distances. In: Vol 6269. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2010:235-268. doi:<a href=\"https://doi.org/10.1007/978-3-642-15375-4_18\">10.1007/978-3-642-15375-4_18</a>"},"department":[{"_id":"ToHe"}],"date_updated":"2023-02-23T12:24:04Z","alternative_title":["LNCS"],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","ddc":["005"],"publication_status":"published","abstract":[{"text":"Boolean notions of correctness are formalized by preorders on systems. Quantitative measures of correctness can be formalized by real-valued distance functions between systems, where the distance between implementation and specification provides a measure of “fit” or “desirability.” We extend the simulation preorder to the quantitative setting, by making each player of a simulation game pay a certain price for her choices. We use the resulting games with quantitative objectives to define three different simulation distances. The correctness distance measures how much the specification must be changed in order to be satisfied by the implementation. The coverage distance measures how much the implementation restricts the degrees of freedom offered by the specification. The robustness distance measures how much a system can deviate from the implementation description without violating the specification. We consider these distances for safety as well as liveness specifications. The distances can be computed in polynomial time for safety specifications, and for liveness specifications given by weak fairness constraints. We show that the distance functions satisfy the triangle inequality, that the distance between two systems does not increase under parallel composition with a third system, and that the distance between two systems can be bounded from above and below by distances between abstractions of the two systems. These properties suggest that our simulation distances provide an appropriate basis for a quantitative theory of discrete systems. We also demonstrate how the robustness distance can be used to measure how many transmission errors are tolerated by error correcting codes.","lang":"eng"}],"title":"Simulation distances","file_date_updated":"2020-07-14T12:46:28Z","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","date_published":"2010-11-01T00:00:00Z"},{"oa":1,"doi":"10.1007/978-3-642-12029-9_19","day":"21","year":"2010","page":"263 - 277","editor":[{"last_name":"Rosenblum","first_name":"David","full_name":"Rosenblum, David"},{"last_name":"Taenzer","first_name":"Gabriele","full_name":"Taenzer, Gabriele"}],"scopus_import":1,"intvolume":"      6013","publist_id":"1061","date_updated":"2021-01-12T07:56:40Z","department":[{"_id":"ToHe"}],"citation":{"short":"D. Beyer, T.A. Henzinger, G. Théoduloz, D. Zufferey, in:, D. Rosenblum, G. Taenzer (Eds.), Springer, 2010, pp. 263–277.","mla":"Beyer, Dirk, et al. <i>Shape Refinement through Explicit Heap Analysis</i>. Edited by David Rosenblum and Gabriele Taenzer, vol. 6013, Springer, 2010, pp. 263–77, doi:<a href=\"https://doi.org/10.1007/978-3-642-12029-9_19\">10.1007/978-3-642-12029-9_19</a>.","ieee":"D. Beyer, T. A. Henzinger, G. Théoduloz, and D. Zufferey, “Shape refinement through explicit heap analysis,” presented at the FASE: Fundamental Approaches To Software Engineering, Paphos, Cyprus, 2010, vol. 6013, pp. 263–277.","chicago":"Beyer, Dirk, Thomas A Henzinger, Grégory Théoduloz, and Damien Zufferey. “Shape Refinement through Explicit Heap Analysis.” edited by David Rosenblum and Gabriele Taenzer, 6013:263–77. Springer, 2010. <a href=\"https://doi.org/10.1007/978-3-642-12029-9_19\">https://doi.org/10.1007/978-3-642-12029-9_19</a>.","ama":"Beyer D, Henzinger TA, Théoduloz G, Zufferey D. Shape refinement through explicit heap analysis. In: Rosenblum D, Taenzer G, eds. Vol 6013. Springer; 2010:263-277. doi:<a href=\"https://doi.org/10.1007/978-3-642-12029-9_19\">10.1007/978-3-642-12029-9_19</a>","ista":"Beyer D, Henzinger TA, Théoduloz G, Zufferey D. 2010. Shape refinement through explicit heap analysis. FASE: Fundamental Approaches To Software Engineering, LNCS, vol. 6013, 263–277.","apa":"Beyer, D., Henzinger, T. A., Théoduloz, G., &#38; Zufferey, D. (2010). Shape refinement through explicit heap analysis. In D. Rosenblum &#38; G. Taenzer (Eds.) (Vol. 6013, pp. 263–277). Presented at the FASE: Fundamental Approaches To Software Engineering, Paphos, Cyprus: Springer. <a href=\"https://doi.org/10.1007/978-3-642-12029-9_19\">https://doi.org/10.1007/978-3-642-12029-9_19</a>"},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"Shape analysis is a promising technique to prove program properties about recursive data structures. The challenge is to automatically determine the data-structure type, and to supply the shape analysis with the necessary information about the data structure. We present a stepwise approach to the selection of instrumentation predicates for a TVLA-based shape analysis, which takes us a step closer towards the fully automatic verification of data structures. The approach uses two techniques to guide the refinement of shape abstractions: (1) during program exploration, an explicit heap analysis collects sample instances of the heap structures, which are used to identify the data structures that are manipulated by the program; and (2) during abstraction refinement along an infeasible error path, we consider different possible heap abstractions and choose the coarsest one that eliminates the infeasible path. We have implemented this combined approach for automatic shape refinement as an extension of the software model checker BLAST. Example programs from a data-structure library that manipulate doubly-linked lists and trees were successfully verified by our tool."}],"publication_status":"published","ddc":["004"],"publisher":"Springer","date_published":"2010-04-21T00:00:00Z","file_date_updated":"2020-07-14T12:46:29Z","title":"Shape refinement through explicit heap analysis","date_created":"2018-12-11T12:08:38Z","_id":"4396","type":"conference","status":"public","pubrep_id":"41","conference":{"name":"FASE: Fundamental Approaches To Software Engineering","location":"Paphos, Cyprus","start_date":"2010-03-20","end_date":"2010-03-28"},"quality_controlled":"1","project":[{"name":"Microsoft Research Faculty Fellowship","_id":"2587B514-B435-11E9-9278-68D0E5697425"}],"oa_version":"Submitted Version","author":[{"full_name":"Beyer, Dirk","first_name":"Dirk","last_name":"Beyer"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724"},{"first_name":"Grégory","last_name":"Théoduloz","full_name":"Théoduloz, Grégory"},{"first_name":"Damien","last_name":"Zufferey","orcid":"0000-0002-3197-8736","id":"4397AC76-F248-11E8-B48F-1D18A9856A87","full_name":"Zufferey, Damien"}],"has_accepted_license":"1","month":"04","file":[{"file_size":312147,"access_level":"open_access","creator":"system","checksum":"7d26e59a9681487d7283eba337292b2c","file_id":"5332","relation":"main_file","file_name":"IST-2012-41-v1+1_Shape_refinement_through_explicit_heap_analysis.pdf","date_updated":"2020-07-14T12:46:29Z","date_created":"2018-12-12T10:18:13Z","content_type":"application/pdf"}],"language":[{"iso":"eng"}],"volume":6013},{"type":"conference","_id":"4569","date_created":"2018-12-11T12:09:31Z","main_file_link":[{"url":"http://arxiv.org/abs/0904.2638","open_access":"1"}],"status":"public","conference":{"name":"CAV: Computer Aided Verification","location":"Grenoble, France","end_date":"2009-07-02","start_date":"2009-06-26"},"ec_funded":1,"oa_version":"Preprint","project":[{"call_identifier":"FP7","grant_number":"215543","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","name":"COMponent-Based Embedded Systems design Techniques"}],"quality_controlled":"1","author":[{"full_name":"Bloem, Roderick","last_name":"Bloem","first_name":"Roderick"},{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"first_name":"Barbara","last_name":"Jobstmann","full_name":"Jobstmann, Barbara"}],"month":"06","volume":5643,"language":[{"iso":"eng"}],"oa":1,"day":"19","page":"140 - 156","doi":"10.1007/978-3-642-02658-4_14","year":"2009","acknowledgement":"This research was supported by the Swiss National Science Foundation (Indo-Swiss Research Program and NCCR MICS) and the European Union projects COMBEST and COCONUT.","arxiv":1,"publist_id":"141","intvolume":"      5643","citation":{"short":"R. Bloem, K. Chatterjee, T.A. Henzinger, B. Jobstmann, in:, Springer, 2009, pp. 140–156.","mla":"Bloem, Roderick, et al. <i>Better Quality in Synthesis through Quantitative Objectives</i>. Vol. 5643, Springer, 2009, pp. 140–56, doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">10.1007/978-3-642-02658-4_14</a>.","ieee":"R. Bloem, K. Chatterjee, T. A. Henzinger, and B. Jobstmann, “Better quality in synthesis through quantitative objectives,” presented at the CAV: Computer Aided Verification, Grenoble, France, 2009, vol. 5643, pp. 140–156.","ista":"Bloem R, Chatterjee K, Henzinger TA, Jobstmann B. 2009. Better quality in synthesis through quantitative objectives. CAV: Computer Aided Verification, LNCS, vol. 5643, 140–156.","chicago":"Bloem, Roderick, Krishnendu Chatterjee, Thomas A Henzinger, and Barbara Jobstmann. “Better Quality in Synthesis through Quantitative Objectives,” 5643:140–56. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">https://doi.org/10.1007/978-3-642-02658-4_14</a>.","ama":"Bloem R, Chatterjee K, Henzinger TA, Jobstmann B. Better quality in synthesis through quantitative objectives. In: Vol 5643. Springer; 2009:140-156. doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">10.1007/978-3-642-02658-4_14</a>","apa":"Bloem, R., Chatterjee, K., Henzinger, T. A., &#38; Jobstmann, B. (2009). Better quality in synthesis through quantitative objectives (Vol. 5643, pp. 140–156). Presented at the CAV: Computer Aided Verification, Grenoble, France: Springer. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">https://doi.org/10.1007/978-3-642-02658-4_14</a>"},"department":[{"_id":"KrCh"}],"date_updated":"2021-01-12T07:59:46Z","external_id":{"arxiv":["0904.2638"]},"alternative_title":["LNCS"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication_status":"published","abstract":[{"lang":"eng","text":"Most specification languages express only qualitative constraints. However, among two implementations that satisfy a given specification, one may be preferred to another. For example, if a specification asks that every request is followed by a response, one may prefer an implementation that generates responses quickly but does not generate unnecessary responses. We use quantitative properties to measure the “goodness” of an implementation. Using games with corresponding quantitative objectives, we can synthesize “optimal” implementations, which are preferred among the set of possible implementations that satisfy a given specification.\r\nIn particular, we show how automata with lexicographic mean-payoff conditions can be used to express many interesting quantitative properties for reactive systems. In this framework, the synthesis of optimal implementations requires the solution of lexicographic mean-payoff games (for safety requirements), and the solution of games with both lexicographic mean-payoff and parity objectives (for liveness requirements). We present algorithms for solving both kinds of novel graph games."}],"title":"Better quality in synthesis through quantitative objectives","date_published":"2009-06-19T00:00:00Z","publisher":"Springer"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","alternative_title":["IST Austria Technical Report"],"author":[{"first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"}],"oa_version":"Published Version","citation":{"apa":"Chatterjee, K. (2009). <i>Probabilistic automata on infinite words: Decidability and undecidability results</i>. IST Austria. <a href=\"https://doi.org/10.15479/AT:IST-2009-0004\">https://doi.org/10.15479/AT:IST-2009-0004</a>","chicago":"Chatterjee, Krishnendu. <i>Probabilistic Automata on Infinite Words: Decidability and Undecidability Results</i>. IST Austria, 2009. <a href=\"https://doi.org/10.15479/AT:IST-2009-0004\">https://doi.org/10.15479/AT:IST-2009-0004</a>.","ama":"Chatterjee K. <i>Probabilistic Automata on Infinite Words: Decidability and Undecidability Results</i>. IST Austria; 2009. doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0004\">10.15479/AT:IST-2009-0004</a>","ista":"Chatterjee K. 2009. Probabilistic automata on infinite words: Decidability and undecidability results, IST Austria, 17p.","ieee":"K. Chatterjee, <i>Probabilistic automata on infinite words: Decidability and undecidability results</i>. IST Austria, 2009.","mla":"Chatterjee, Krishnendu. <i>Probabilistic Automata on Infinite Words: Decidability and Undecidability Results</i>. IST Austria, 2009, doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0004\">10.15479/AT:IST-2009-0004</a>.","short":"K. Chatterjee, Probabilistic Automata on Infinite Words: Decidability and Undecidability Results, IST Austria, 2009."},"date_updated":"2023-02-23T11:45:44Z","department":[{"_id":"KrCh"}],"title":"Probabilistic automata on infinite words: Decidability and undecidability results","file_date_updated":"2020-07-14T12:46:43Z","language":[{"iso":"eng"}],"publisher":"IST Austria","date_published":"2009-11-02T00:00:00Z","ddc":["005"],"file":[{"relation":"main_file","file_size":311065,"access_level":"open_access","creator":"system","file_id":"5530","checksum":"fb7563150231325b00b1718d956f687b","date_updated":"2020-07-14T12:46:43Z","date_created":"2018-12-12T11:54:08Z","content_type":"application/pdf","file_name":"IST-2009-0004_IST-2009-0004.pdf"}],"abstract":[{"lang":"eng","text":"We consider probabilistic automata on infinite words with acceptance defined by safety, reachability, Büchi, coBüchi and limit-average conditions. We consider quantitative and qualitative decision problems. We present extensions and adaptations of proofs of [GO09] and present a precise characterization of the decidability and undecidability frontier of the quantitative and qualitative decision problems."}],"month":"11","has_accepted_license":"1","publication_status":"published","page":"17","publication_identifier":{"issn":["2664-1690"]},"year":"2009","doi":"10.15479/AT:IST-2009-0004","status":"public","day":"02","_id":"5392","type":"technical_report","date_created":"2018-12-12T11:39:04Z","oa":1,"pubrep_id":"28","related_material":{"record":[{"status":"public","id":"3857","relation":"later_version"}]}},{"year":"2009","day":"09","status":"public","page":"12","doi":"10.15479/AT:IST-2009-0003","publication_identifier":{"issn":["2664-1690"]},"type":"technical_report","_id":"5393","oa":1,"date_created":"2018-12-12T11:39:05Z","pubrep_id":"29","related_material":{"record":[{"status":"public","id":"4388","relation":"later_version"}]},"alternative_title":["IST Austria Technical Report"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu"},{"last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"last_name":"Jobstmann","first_name":"Barbara","full_name":"Jobstmann, Barbara"},{"first_name":"Arjun","last_name":"Radhakrishna","full_name":"Radhakrishna, Arjun","id":"3B51CAC4-F248-11E8-B48F-1D18A9856A87"}],"oa_version":"Published Version","citation":{"mla":"Chatterjee, Krishnendu, et al. <i>Gist: A Solver for Probabilistic Games</i>. IST Austria, 2009, doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0003\">10.15479/AT:IST-2009-0003</a>.","short":"K. Chatterjee, T.A. Henzinger, B. Jobstmann, A. Radhakrishna, Gist: A Solver for Probabilistic Games, IST Austria, 2009.","ama":"Chatterjee K, Henzinger TA, Jobstmann B, Radhakrishna A. <i>Gist: A Solver for Probabilistic Games</i>. IST Austria; 2009. doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0003\">10.15479/AT:IST-2009-0003</a>","ista":"Chatterjee K, Henzinger TA, Jobstmann B, Radhakrishna A. 2009. Gist: A solver for probabilistic games, IST Austria, 12p.","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, Barbara Jobstmann, and Arjun Radhakrishna. <i>Gist: A Solver for Probabilistic Games</i>. IST Austria, 2009. <a href=\"https://doi.org/10.15479/AT:IST-2009-0003\">https://doi.org/10.15479/AT:IST-2009-0003</a>.","apa":"Chatterjee, K., Henzinger, T. A., Jobstmann, B., &#38; Radhakrishna, A. (2009). <i>Gist: A solver for probabilistic games</i>. IST Austria. <a href=\"https://doi.org/10.15479/AT:IST-2009-0003\">https://doi.org/10.15479/AT:IST-2009-0003</a>","ieee":"K. Chatterjee, T. A. Henzinger, B. Jobstmann, and A. Radhakrishna, <i>Gist: A solver for probabilistic games</i>. IST Austria, 2009."},"department":[{"_id":"KrCh"},{"_id":"ToHe"}],"date_updated":"2023-02-23T12:09:01Z","title":"Gist: A solver for probabilistic games","file_date_updated":"2020-07-14T12:46:43Z","language":[{"iso":"eng"}],"date_published":"2009-10-09T00:00:00Z","publisher":"IST Austria","ddc":["000","005"],"file":[{"relation":"main_file","access_level":"open_access","file_size":386866,"checksum":"49551ac552915b17593a14c993845274","file_id":"5459","creator":"system","date_created":"2018-12-12T11:52:58Z","date_updated":"2020-07-14T12:46:43Z","content_type":"application/pdf","file_name":"IST-2009-0003_IST-2009-0003.pdf"}],"month":"10","publication_status":"published","has_accepted_license":"1","abstract":[{"text":"Gist is a tool that (a) solves the qualitative analysis problem of turn-based probabilistic games with ω-regular objectives; and (b) synthesizes reasonable environment assumptions for synthesis of unrealizable specifications. Our tool provides efficient implementations of several reduction based techniques to solve turn-based probabilistic games, and uses the analysis of turn-based probabilistic games for synthesizing environment assumptions for unrealizable specifications.","lang":"eng"}]},{"title":"Improved lower bounds for request-response and finitary Streett games","publisher":"IST Austria","date_published":"2009-09-09T00:00:00Z","language":[{"iso":"eng"}],"file_date_updated":"2020-07-14T12:46:43Z","ddc":["004"],"file":[{"file_name":"IST-2009-0002_IST-2009-0002.pdf","date_updated":"2020-07-14T12:46:43Z","date_created":"2018-12-12T11:53:50Z","content_type":"application/pdf","file_size":238091,"access_level":"open_access","creator":"system","checksum":"1c50a9723fbae1b2c46d18138968efb3","file_id":"5511","relation":"main_file"}],"has_accepted_license":"1","month":"09","publication_status":"published","abstract":[{"text":"We consider two-player games played on graphs with request-response and finitary Streett objectives. We show these games are PSPACE-hard, improving the previous known NP-hardness. We also improve the lower bounds on memory required by the winning strategies for the players.","lang":"eng"}],"alternative_title":["IST Austria Technical Report"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"},{"full_name":"Horn, Florian","id":"37327ACE-F248-11E8-B48F-1D18A9856A87","first_name":"Florian","last_name":"Horn"}],"citation":{"apa":"Chatterjee, K., Henzinger, T. A., &#38; Horn, F. (2009). <i>Improved lower bounds for request-response and finitary Streett games</i>. IST Austria. <a href=\"https://doi.org/10.15479/AT:IST-2009-0002\">https://doi.org/10.15479/AT:IST-2009-0002</a>","ista":"Chatterjee K, Henzinger TA, Horn F. 2009. Improved lower bounds for request-response and finitary Streett games, IST Austria, 11p.","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, and Florian Horn. <i>Improved Lower Bounds for Request-Response and Finitary Streett Games</i>. IST Austria, 2009. <a href=\"https://doi.org/10.15479/AT:IST-2009-0002\">https://doi.org/10.15479/AT:IST-2009-0002</a>.","ama":"Chatterjee K, Henzinger TA, Horn F. <i>Improved Lower Bounds for Request-Response and Finitary Streett Games</i>. IST Austria; 2009. doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0002\">10.15479/AT:IST-2009-0002</a>","ieee":"K. Chatterjee, T. A. Henzinger, and F. Horn, <i>Improved lower bounds for request-response and finitary Streett games</i>. IST Austria, 2009.","mla":"Chatterjee, Krishnendu, et al. <i>Improved Lower Bounds for Request-Response and Finitary Streett Games</i>. IST Austria, 2009, doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0002\">10.15479/AT:IST-2009-0002</a>.","short":"K. Chatterjee, T.A. Henzinger, F. Horn, Improved Lower Bounds for Request-Response and Finitary Streett Games, IST Austria, 2009."},"oa_version":"Published Version","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"date_updated":"2020-07-14T23:07:47Z","pubrep_id":"30","page":"11","publication_identifier":{"issn":["2664-1690"]},"doi":"10.15479/AT:IST-2009-0002","year":"2009","status":"public","day":"09","_id":"5394","type":"technical_report","oa":1,"date_created":"2018-12-12T11:39:05Z"},{"related_material":{"record":[{"status":"public","id":"3855","relation":"later_version"}]},"pubrep_id":"31","day":"09","year":"2009","status":"public","page":"20","publication_identifier":{"issn":["2664-1690"]},"doi":"10.15479/AT:IST-2009-0001","type":"technical_report","_id":"5395","date_created":"2018-12-12T11:39:05Z","oa":1,"title":"Qualitative analysis of partially-observable Markov decision processes","file_date_updated":"2020-07-14T12:46:43Z","language":[{"iso":"eng"}],"publisher":"IST Austria","date_published":"2009-09-09T00:00:00Z","ddc":["005"],"file":[{"relation":"main_file","file_size":342088,"access_level":"open_access","creator":"system","file_id":"5486","checksum":"04d9cc065cc19598a4e8631c47f1a562","date_updated":"2020-07-14T12:46:43Z","date_created":"2018-12-12T11:53:25Z","content_type":"application/pdf","file_name":"IST-2009-0001_IST-2009-0001.pdf"}],"publication_status":"published","month":"09","has_accepted_license":"1","abstract":[{"text":"We study observation-based strategies for partially-observable Markov decision processes (POMDPs) with omega-regular objectives. An observation-based strategy relies on partial information about the history of a play, namely, on the past sequence of observa- tions. We consider the qualitative analysis problem: given a POMDP with an omega-regular objective, whether there is an observation-based strategy to achieve the objective with probability 1 (almost-sure winning), or with positive probability (positive winning). Our main results are twofold. First, we present a complete picture of the computational complexity of the qualitative analysis of POMDPs with parity objectives (a canonical form to express omega-regular objectives) and its subclasses. Our contribution consists in establishing several upper and lower bounds that were not known in literature. Second, we present optimal bounds (matching upper and lower bounds) on the memory required by pure and randomized observation-based strategies for the qualitative analysis of POMDPs with parity objectives and its subclasses.","lang":"eng"}],"alternative_title":["IST Austria Technical Report"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu"},{"first_name":"Laurent","last_name":"Doyen","full_name":"Doyen, Laurent"},{"full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"}],"oa_version":"Published Version","citation":{"ieee":"K. Chatterjee, L. Doyen, and T. A. Henzinger, <i>Qualitative analysis of partially-observable Markov decision processes</i>. IST Austria, 2009.","apa":"Chatterjee, K., Doyen, L., &#38; Henzinger, T. A. (2009). <i>Qualitative analysis of partially-observable Markov decision processes</i>. IST Austria. <a href=\"https://doi.org/10.15479/AT:IST-2009-0001\">https://doi.org/10.15479/AT:IST-2009-0001</a>","chicago":"Chatterjee, Krishnendu, Laurent Doyen, and Thomas A Henzinger. <i>Qualitative Analysis of Partially-Observable Markov Decision Processes</i>. IST Austria, 2009. <a href=\"https://doi.org/10.15479/AT:IST-2009-0001\">https://doi.org/10.15479/AT:IST-2009-0001</a>.","ista":"Chatterjee K, Doyen L, Henzinger TA. 2009. Qualitative analysis of partially-observable Markov decision processes, IST Austria, 20p.","ama":"Chatterjee K, Doyen L, Henzinger TA. <i>Qualitative Analysis of Partially-Observable Markov Decision Processes</i>. IST Austria; 2009. doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0001\">10.15479/AT:IST-2009-0001</a>","short":"K. Chatterjee, L. Doyen, T.A. Henzinger, Qualitative Analysis of Partially-Observable Markov Decision Processes, IST Austria, 2009.","mla":"Chatterjee, Krishnendu, et al. <i>Qualitative Analysis of Partially-Observable Markov Decision Processes</i>. IST Austria, 2009, doi:<a href=\"https://doi.org/10.15479/AT:IST-2009-0001\">10.15479/AT:IST-2009-0001</a>."},"department":[{"_id":"KrCh"},{"_id":"ToHe"}],"date_updated":"2023-02-23T11:45:39Z"}]
