---
_id: '1407'
abstract:
- lang: eng
  text: We consider the problem of computing the set of initial states of a dynamical
    system such that there exists a control strategy to ensure that the trajectories
    satisfy a temporal logic specification with probability 1 (almost-surely). We
    focus on discrete-time, stochastic linear dynamics and specifications given as
    formulas of the Generalized Reactivity(1) fragment of Linear Temporal Logic over
    linear predicates in the states of the system. We propose a solution based on
    iterative abstraction-refinement, and turn-based 2-player probabilistic games.
    While the theoretical guarantee of our algorithm after any finite number of iterations
    is only a partial solution, we show that if our algorithm terminates, then the
    result is the set of all satisfying initial states. Moreover, for any (partial)
    solution our algorithm synthesizes witness control strategies to ensure almost-sure
    satisfaction of the temporal logic specification. While the proposed algorithm
    guarantees progress and soundness in every iteration, it is computationally demanding.
    We offer an alternative, more efficient solution for the reachability properties
    that decomposes the problem into a series of smaller problems of the same type.
    All algorithms are demonstrated on an illustrative case study.
article_processing_charge: No
arxiv: 1
author:
- first_name: Mária
  full_name: Svoreňová, Mária
  last_name: Svoreňová
- first_name: Jan
  full_name: Kretinsky, Jan
  id: 44CEF464-F248-11E8-B48F-1D18A9856A87
  last_name: Kretinsky
  orcid: 0000-0002-8122-2881
- first_name: Martin
  full_name: Chmelik, Martin
  id: 3624234E-F248-11E8-B48F-1D18A9856A87
  last_name: Chmelik
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Ivana
  full_name: Cěrná, Ivana
  last_name: Cěrná
- first_name: Cǎlin
  full_name: Belta, Cǎlin
  last_name: Belta
citation:
  ama: 'Svoreňová M, Kretinsky J, Chmelik M, Chatterjee K, Cěrná I, Belta C. Temporal
    logic control for stochastic linear systems using abstraction refinement of probabilistic
    games. <i>Nonlinear Analysis: Hybrid Systems</i>. 2017;23(2):230-253. doi:<a href="https://doi.org/10.1016/j.nahs.2016.04.006">10.1016/j.nahs.2016.04.006</a>'
  apa: 'Svoreňová, M., Kretinsky, J., Chmelik, M., Chatterjee, K., Cěrná, I., &#38;
    Belta, C. (2017). Temporal logic control for stochastic linear systems using abstraction
    refinement of probabilistic games. <i>Nonlinear Analysis: Hybrid Systems</i>.
    Elsevier. <a href="https://doi.org/10.1016/j.nahs.2016.04.006">https://doi.org/10.1016/j.nahs.2016.04.006</a>'
  chicago: 'Svoreňová, Mária, Jan Kretinsky, Martin Chmelik, Krishnendu Chatterjee,
    Ivana Cěrná, and Cǎlin Belta. “Temporal Logic Control for Stochastic Linear Systems
    Using Abstraction Refinement of Probabilistic Games.” <i>Nonlinear Analysis: Hybrid
    Systems</i>. Elsevier, 2017. <a href="https://doi.org/10.1016/j.nahs.2016.04.006">https://doi.org/10.1016/j.nahs.2016.04.006</a>.'
  ieee: 'M. Svoreňová, J. Kretinsky, M. Chmelik, K. Chatterjee, I. Cěrná, and C. Belta,
    “Temporal logic control for stochastic linear systems using abstraction refinement
    of probabilistic games,” <i>Nonlinear Analysis: Hybrid Systems</i>, vol. 23, no.
    2. Elsevier, pp. 230–253, 2017.'
  ista: 'Svoreňová M, Kretinsky J, Chmelik M, Chatterjee K, Cěrná I, Belta C. 2017.
    Temporal logic control for stochastic linear systems using abstraction refinement
    of probabilistic games. Nonlinear Analysis: Hybrid Systems. 23(2), 230–253.'
  mla: 'Svoreňová, Mária, et al. “Temporal Logic Control for Stochastic Linear Systems
    Using Abstraction Refinement of Probabilistic Games.” <i>Nonlinear Analysis: Hybrid
    Systems</i>, vol. 23, no. 2, Elsevier, 2017, pp. 230–53, doi:<a href="https://doi.org/10.1016/j.nahs.2016.04.006">10.1016/j.nahs.2016.04.006</a>.'
  short: 'M. Svoreňová, J. Kretinsky, M. Chmelik, K. Chatterjee, I. Cěrná, C. Belta,
    Nonlinear Analysis: Hybrid Systems 23 (2017) 230–253.'
date_created: 2018-12-11T11:51:50Z
date_published: 2017-02-01T00:00:00Z
date_updated: 2023-09-20T09:43:09Z
day: '01'
department:
- _id: ToHe
- _id: KrCh
doi: 10.1016/j.nahs.2016.04.006
ec_funded: 1
external_id:
  arxiv:
  - '1410.5387'
  isi:
  - '000390637000014'
intvolume: '        23'
isi: 1
issue: '2'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1410.5387
month: '02'
oa: 1
oa_version: Preprint
page: 230 - 253
project:
- _id: 25681D80-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '291734'
  name: International IST Postdoc Fellowship Programme
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
publication: 'Nonlinear Analysis: Hybrid Systems'
publication_status: published
publisher: Elsevier
publist_id: '5800'
quality_controlled: '1'
related_material:
  record:
  - id: '1689'
    relation: earlier_version
    status: public
scopus_import: '1'
status: public
title: Temporal logic control for stochastic linear systems using abstraction refinement
  of probabilistic games
type: journal_article
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 23
year: '2017'
...
---
_id: '941'
abstract:
- lang: eng
  text: 'Recently there has been a proliferation of automated program repair (APR)
    techniques, targeting various programming languages. Such techniques can be generally
    classified into two families: syntactic- and semantics-based. Semantics-based
    APR, on which we focus, typically uses symbolic execution to infer semantic constraints
    and then program synthesis to construct repairs conforming to them. While syntactic-based
    APR techniques have been shown successful on bugs in real-world programs written
    in both C and Java, semantics-based APR techniques mostly target C programs. This
    leaves empirical comparisons of the APR families not fully explored, and developers
    without a Java-based semantics APR technique. We present JFix, a semantics-based
    APR framework that targets Java, and an associated Eclipse plugin. JFix is implemented
    atop Symbolic PathFinder, a well-known symbolic execution engine for Java programs.
    It extends one particular APR technique (Angelix), and is designed to be sufficiently
    generic to support a variety of such techniques. We demonstrate that semantics-based
    APR can indeed efficiently and effectively repair a variety of classes of bugs
    in large real-world Java programs. This supports our claim that the framework
    can both support developers seeking semantics-based repair of bugs in Java programs,
    as well as enable larger scale empirical studies comparing syntactic- and semantics-based
    APR targeting Java. The demonstration of our tool is available via the project
    website at: https://xuanbachle.github.io/semanticsrepair/ '
author:
- first_name: Xuan
  full_name: Le, Xuan
  last_name: Le
- first_name: Duc Hiep
  full_name: Chu, Duc Hiep
  id: 3598E630-F248-11E8-B48F-1D18A9856A87
  last_name: Chu
- first_name: David
  full_name: Lo, David
  last_name: Lo
- first_name: Claire
  full_name: Le Goues, Claire
  last_name: Le Goues
- first_name: Willem
  full_name: Visser, Willem
  last_name: Visser
citation:
  ama: 'Le X, Chu DH, Lo D, Le Goues C, Visser W. JFIX: Semantics-based repair of
    Java programs via symbolic  PathFinder. In: <i>Proceedings of the 26th ACM SIGSOFT
    International Symposium on Software Testing and Analysis</i>. ACM; 2017:376-379.
    doi:<a href="https://doi.org/10.1145/3092703.3098225">10.1145/3092703.3098225</a>'
  apa: 'Le, X., Chu, D. H., Lo, D., Le Goues, C., &#38; Visser, W. (2017). JFIX: Semantics-based
    repair of Java programs via symbolic  PathFinder. In <i>Proceedings of the 26th
    ACM SIGSOFT International Symposium on Software Testing and Analysis</i> (pp.
    376–379). Santa Barbara, CA, United States: ACM. <a href="https://doi.org/10.1145/3092703.3098225">https://doi.org/10.1145/3092703.3098225</a>'
  chicago: 'Le, Xuan, Duc Hiep Chu, David Lo, Claire Le Goues, and Willem Visser.
    “JFIX: Semantics-Based Repair of Java Programs via Symbolic  PathFinder.” In <i>Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>,
    376–79. ACM, 2017. <a href="https://doi.org/10.1145/3092703.3098225">https://doi.org/10.1145/3092703.3098225</a>.'
  ieee: 'X. Le, D. H. Chu, D. Lo, C. Le Goues, and W. Visser, “JFIX: Semantics-based
    repair of Java programs via symbolic  PathFinder,” in <i>Proceedings of the 26th
    ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, Santa
    Barbara, CA, United States, 2017, pp. 376–379.'
  ista: 'Le X, Chu DH, Lo D, Le Goues C, Visser W. 2017. JFIX: Semantics-based repair
    of Java programs via symbolic  PathFinder. Proceedings of the 26th ACM SIGSOFT
    International Symposium on Software Testing and Analysis. ISSTA: International
    Symposium on Software Testing and Analysis, 376–379.'
  mla: 'Le, Xuan, et al. “JFIX: Semantics-Based Repair of Java Programs via Symbolic 
    PathFinder.” <i>Proceedings of the 26th ACM SIGSOFT International Symposium on
    Software Testing and Analysis</i>, ACM, 2017, pp. 376–79, doi:<a href="https://doi.org/10.1145/3092703.3098225">10.1145/3092703.3098225</a>.'
  short: X. Le, D.H. Chu, D. Lo, C. Le Goues, W. Visser, in:, Proceedings of the 26th
    ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2017,
    pp. 376–379.
conference:
  end_date: 2017-07-14
  location: Santa Barbara, CA, United States
  name: 'ISSTA: International Symposium on Software Testing and Analysis'
  start_date: 2017-07-10
date_created: 2018-12-11T11:49:19Z
date_published: 2017-07-10T00:00:00Z
date_updated: 2021-01-12T08:22:05Z
day: '10'
department:
- _id: ToHe
doi: 10.1145/3092703.3098225
language:
- iso: eng
month: '07'
oa_version: None
page: '376 - 379 '
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication: Proceedings of the 26th ACM SIGSOFT International Symposium on Software
  Testing and Analysis
publication_status: published
publisher: ACM
publist_id: '6478'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'JFIX: Semantics-based repair of Java programs via symbolic  PathFinder'
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2017'
...
---
_id: '942'
abstract:
- lang: eng
  text: 'A notable class of techniques for automatic program repair is known as semantics-based.
    Such techniques, e.g., Angelix, infer semantic specifications via symbolic execution,
    and then use program synthesis to construct new code that satisfies those inferred
    specifications. However, the obtained specifications are naturally incomplete,
    leaving the synthesis engine with a difficult task of synthesizing a general solution
    from a sparse space of many possible solutions that are consistent with the provided
    specifications but that do not necessarily generalize. We present S3, a new repair
    synthesis engine that leverages programming-by-examples methodology to synthesize
    high-quality bug repairs. The novelty in S3 that allows it to tackle the sparse
    search space to create more general repairs is three-fold: (1) A systematic way
    to customize and constrain the syntactic search space via a domain-specific language,
    (2) An efficient enumeration-based search strategy over the constrained search
    space, and (3) A number of ranking features based on measures of the syntactic
    and semantic distances between candidate solutions and the original buggy program.
    We compare S3’s repair effectiveness with state-of-the-art synthesis engines Angelix,
    Enumerative, and CVC4. S3 can successfully and correctly fix at least three times
    more bugs than the best baseline on datasets of 52 bugs in small programs, and
    100 bugs in real-world large programs. '
article_processing_charge: No
author:
- first_name: Xuan
  full_name: Le, Xuan
  last_name: Le
- first_name: Duc Hiep
  full_name: Chu, Duc Hiep
  id: 3598E630-F248-11E8-B48F-1D18A9856A87
  last_name: Chu
- first_name: David
  full_name: Lo, David
  last_name: Lo
- first_name: Claire
  full_name: Le Goues, Claire
  last_name: Le Goues
- first_name: Willem
  full_name: Visser, Willem
  last_name: Visser
citation:
  ama: 'Le X, Chu DH, Lo D, Le Goues C, Visser W. S3: Syntax- and semantic-guided
    repair synthesis via programming by examples. In: Vol F130154. ACM; 2017:593-604.
    doi:<a href="https://doi.org/10.1145/3106237.3106309">10.1145/3106237.3106309</a>'
  apa: 'Le, X., Chu, D. H., Lo, D., Le Goues, C., &#38; Visser, W. (2017). S3: Syntax-
    and semantic-guided repair synthesis via programming by examples (Vol. F130154,
    pp. 593–604). Presented at the FSE: Foundations of Software Engineering, Paderborn,
    Germany: ACM. <a href="https://doi.org/10.1145/3106237.3106309">https://doi.org/10.1145/3106237.3106309</a>'
  chicago: 'Le, Xuan, Duc Hiep Chu, David Lo, Claire Le Goues, and Willem Visser.
    “S3: Syntax- and Semantic-Guided Repair Synthesis via Programming by Examples,”
    F130154:593–604. ACM, 2017. <a href="https://doi.org/10.1145/3106237.3106309">https://doi.org/10.1145/3106237.3106309</a>.'
  ieee: 'X. Le, D. H. Chu, D. Lo, C. Le Goues, and W. Visser, “S3: Syntax- and semantic-guided
    repair synthesis via programming by examples,” presented at the FSE: Foundations
    of Software Engineering, Paderborn, Germany, 2017, vol. F130154, pp. 593–604.'
  ista: 'Le X, Chu DH, Lo D, Le Goues C, Visser W. 2017. S3: Syntax- and semantic-guided
    repair synthesis via programming by examples. FSE: Foundations of Software Engineering
    vol. F130154, 593–604.'
  mla: 'Le, Xuan, et al. <i>S3: Syntax- and Semantic-Guided Repair Synthesis via Programming
    by Examples</i>. Vol. F130154, ACM, 2017, pp. 593–604, doi:<a href="https://doi.org/10.1145/3106237.3106309">10.1145/3106237.3106309</a>.'
  short: X. Le, D.H. Chu, D. Lo, C. Le Goues, W. Visser, in:, ACM, 2017, pp. 593–604.
conference:
  end_date: 2017-09-08
  location: Paderborn, Germany
  name: 'FSE: Foundations of Software Engineering'
  start_date: 2017-09-04
date_created: 2018-12-11T11:49:19Z
date_published: 2017-09-01T00:00:00Z
date_updated: 2023-09-26T15:38:36Z
day: '01'
department:
- _id: ToHe
doi: 10.1145/3106237.3106309
external_id:
  isi:
  - '000414279300055'
isi: 1
language:
- iso: eng
month: '09'
oa_version: None
page: 593 - 604
project:
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_identifier:
  isbn:
  - 978-145035105-8
publication_status: published
publisher: ACM
publist_id: '6477'
quality_controlled: '1'
scopus_import: '1'
status: public
title: 'S3: Syntax- and semantic-guided repair synthesis via programming by examples'
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: F130154
year: '2017'
...
---
_id: '950'
abstract:
- lang: eng
  text: "Two-player games on graphs are widely studied in formal methods as they model
    the interaction between a system and its environment. The game is played by moving
    a token throughout a graph to produce an infinite path. There are several common
    modes to determine how the players move the token through the graph; e.g., in
    turn-based games the players alternate turns in moving the token. We study the
    bidding mode of moving the token, which, to the best of our knowledge, has never
    been studied in infinite-duration games. Both players have separate budgets, which
    sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously,
    and a bid is legal if it does not exceed the available budget. The winner of the
    bidding pays his bid to the other player and moves the token. For reachability
    objectives, repeated bidding games have been studied and are called Richman games.
    There, a central question is the existence and computation of threshold budgets;
    namely, a value t\\in [0,1] such that if\\PO's budget exceeds $t$, he can win
    the game, and if\\PT's budget exceeds 1-t, he can win the game. We focus on parity
    games and mean-payoff games. We show the existence of threshold budgets in these
    games, and reduce the problem of finding them to Richman games. We also determine
    the strategy-complexity of an optimal strategy. Our most interesting result shows
    that memoryless strategies suffice for mean-payoff bidding games. \r\n"
alternative_title:
- LIPIcs
article_number: '17'
arxiv: 1
author:
- first_name: Guy
  full_name: Avni, Guy
  id: 463C8BC2-F248-11E8-B48F-1D18A9856A87
  last_name: Avni
  orcid: 0000-0001-5588-8287
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Ventsislav K
  full_name: Chonev, Ventsislav K
  id: 36CBE2E6-F248-11E8-B48F-1D18A9856A87
  last_name: Chonev
citation:
  ama: 'Avni G, Henzinger TA, Chonev VK. Infinite-duration bidding games. In: Vol
    85. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:<a href="https://doi.org/10.4230/LIPIcs.CONCUR.2017.21">10.4230/LIPIcs.CONCUR.2017.21</a>'
  apa: 'Avni, G., Henzinger, T. A., &#38; Chonev, V. K. (2017). Infinite-duration
    bidding games (Vol. 85). Presented at the CONCUR: Concurrency Theory, Berlin,
    Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.CONCUR.2017.21">https://doi.org/10.4230/LIPIcs.CONCUR.2017.21</a>'
  chicago: Avni, Guy, Thomas A Henzinger, and Ventsislav K Chonev. “Infinite-Duration
    Bidding Games,” Vol. 85. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
    <a href="https://doi.org/10.4230/LIPIcs.CONCUR.2017.21">https://doi.org/10.4230/LIPIcs.CONCUR.2017.21</a>.
  ieee: 'G. Avni, T. A. Henzinger, and V. K. Chonev, “Infinite-duration bidding games,”
    presented at the CONCUR: Concurrency Theory, Berlin, Germany, 2017, vol. 85.'
  ista: 'Avni G, Henzinger TA, Chonev VK. 2017. Infinite-duration bidding games. CONCUR:
    Concurrency Theory, LIPIcs, vol. 85, 17.'
  mla: Avni, Guy, et al. <i>Infinite-Duration Bidding Games</i>. Vol. 85, 17, Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPIcs.CONCUR.2017.21">10.4230/LIPIcs.CONCUR.2017.21</a>.
  short: G. Avni, T.A. Henzinger, V.K. Chonev, in:, Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2017.
conference:
  end_date: 2017-09-07
  location: Berlin, Germany
  name: 'CONCUR: Concurrency Theory'
  start_date: 2017-09-05
date_created: 2018-12-11T11:49:22Z
date_published: 2017-09-01T00:00:00Z
date_updated: 2023-08-29T07:02:13Z
day: '01'
ddc:
- '000'
department:
- _id: ToHe
- _id: KrCh
doi: 10.4230/LIPIcs.CONCUR.2017.21
external_id:
  arxiv:
  - '1705.01433'
file:
- access_level: open_access
  checksum: 6d5cccf755207b91ccbef95d8275b013
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:18:00Z
  date_updated: 2020-07-14T12:48:16Z
  file_id: '5318'
  file_name: IST-2017-844-v1+1_concur-cr.pdf
  file_size: 335170
  relation: main_file
file_date_updated: 2020-07-14T12:48:16Z
has_accepted_license: '1'
intvolume: '        85'
language:
- iso: eng
month: '09'
oa: 1
oa_version: Published Version
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_identifier:
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6466'
pubrep_id: '844'
quality_controlled: '1'
related_material:
  record:
  - id: '6752'
    relation: later_version
    status: public
scopus_import: 1
status: public
title: Infinite-duration bidding games
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 85
year: '2017'
...
---
_id: '962'
abstract:
- lang: eng
  text: 'We present a new algorithm for model counting of a class of string constraints.
    In addition to the classic operation of concatenation, our class includes some
    recursively defined operations such as Kleene closure, and replacement of substrings.
    Additionally, our class also includes length constraints on the string expressions,
    which means, by requiring reasoning about numbers, that we face a multi-sorted
    logic. In the end, our string constraints are motivated by their use in programming
    for web applications. Our algorithm comprises two novel features: the ability
    to use a technique of (1) partial derivatives for constraints that are already
    in a solved form, i.e. a form where its (string) satisfiability is clearly displayed,
    and (2) non-progression, where cyclic reasoning in the reduction process may be
    terminated (thus allowing for the algorithm to look elsewhere). Finally, we experimentally
    compare our model counter with two recent works on model counting of similar constraints,
    SMC [18] and ABC [5], to demonstrate its superior performance.'
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Minh
  full_name: Trinh, Minh
  last_name: Trinh
- first_name: Duc Hiep
  full_name: Chu, Duc Hiep
  id: 3598E630-F248-11E8-B48F-1D18A9856A87
  last_name: Chu
- first_name: Joxan
  full_name: Jaffar, Joxan
  last_name: Jaffar
citation:
  ama: 'Trinh M, Chu DH, Jaffar J. Model counting for recursively-defined strings.
    In: Majumdar R, Kunčak V, eds. Vol 10427. Springer; 2017:399-418. doi:<a href="https://doi.org/10.1007/978-3-319-63390-9_21">10.1007/978-3-319-63390-9_21</a>'
  apa: 'Trinh, M., Chu, D. H., &#38; Jaffar, J. (2017). Model counting for recursively-defined
    strings. In R. Majumdar &#38; V. Kunčak (Eds.) (Vol. 10427, pp. 399–418). Presented
    at the CAV: Computer Aided Verification, Heidelberg, Germany: Springer. <a href="https://doi.org/10.1007/978-3-319-63390-9_21">https://doi.org/10.1007/978-3-319-63390-9_21</a>'
  chicago: Trinh, Minh, Duc Hiep Chu, and Joxan Jaffar. “Model Counting for Recursively-Defined
    Strings.” edited by Rupak Majumdar and Viktor Kunčak, 10427:399–418. Springer,
    2017. <a href="https://doi.org/10.1007/978-3-319-63390-9_21">https://doi.org/10.1007/978-3-319-63390-9_21</a>.
  ieee: 'M. Trinh, D. H. Chu, and J. Jaffar, “Model counting for recursively-defined
    strings,” presented at the CAV: Computer Aided Verification, Heidelberg, Germany,
    2017, vol. 10427, pp. 399–418.'
  ista: 'Trinh M, Chu DH, Jaffar J. 2017. Model counting for recursively-defined strings.
    CAV: Computer Aided Verification, LNCS, vol. 10427, 399–418.'
  mla: Trinh, Minh, et al. <i>Model Counting for Recursively-Defined Strings</i>.
    Edited by Rupak Majumdar and Viktor Kunčak, vol. 10427, Springer, 2017, pp. 399–418,
    doi:<a href="https://doi.org/10.1007/978-3-319-63390-9_21">10.1007/978-3-319-63390-9_21</a>.
  short: M. Trinh, D.H. Chu, J. Jaffar, in:, R. Majumdar, V. Kunčak (Eds.), Springer,
    2017, pp. 399–418.
conference:
  end_date: 2017-07-28
  location: Heidelberg, Germany
  name: 'CAV: Computer Aided Verification'
  start_date: 2017-07-24
date_created: 2018-12-11T11:49:26Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2023-09-22T09:58:02Z
day: '01'
department:
- _id: ToHe
doi: 10.1007/978-3-319-63390-9_21
editor:
- first_name: Rupak
  full_name: Majumdar, Rupak
  last_name: Majumdar
- first_name: Viktor
  full_name: Kunčak, Viktor
  last_name: Kunčak
external_id:
  isi:
  - '000431900900021'
intvolume: '     10427'
isi: 1
language:
- iso: eng
month: '01'
oa_version: None
page: 399 - 418
project:
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_identifier:
  issn:
  - '03029743'
publication_status: published
publisher: Springer
publist_id: '6443'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Model counting for recursively-defined strings
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 10427
year: '2017'
...
---
_id: '963'
abstract:
- lang: eng
  text: 'Network games are widely used as a model for selfish resource-allocation
    problems. In the classical model, each player selects a path connecting her source
    and target vertex. The cost of traversing an edge depends on the number of players
    that traverse it. Thus, it abstracts the fact that different users may use a resource
    at different times and for different durations, which plays an important role
    in defining the costs of the users in reality. For example, when transmitting
    packets in a communication network, routing traffic in a road network, or processing
    a task in a production system, the traversal of the network involves an inherent
    delay, and so sharing and congestion of resources crucially depends on time. We
    study timed network games , which add a time component to network games. Each
    vertex v in the network is associated with a cost function, mapping the load on
    v to the price that a player pays for staying in v for one time unit with this
    load. In addition, each edge has a guard, describing time intervals in which the
    edge can be traversed, forcing the players to spend time on vertices. Unlike earlier
    work that add a time component to network games, the time in our model is continuous
    and cannot be discretized. In particular, players have uncountably many strategies,
    and a game may have uncountably many pure Nash equilibria. We study properties
    of timed network games with cost-sharing or congestion cost functions: their stability,
    equilibrium inefficiency, and complexity. In particular, we show that the answer
    to the question whether we can restrict attention to boundary strategies, namely
    ones in which edges are traversed only at the boundaries of guards, is mixed. '
alternative_title:
- LIPIcs
article_number: '37'
author:
- first_name: Guy
  full_name: Avni, Guy
  id: 463C8BC2-F248-11E8-B48F-1D18A9856A87
  last_name: Avni
  orcid: 0000-0001-5588-8287
- first_name: Shibashis
  full_name: Guha, Shibashis
  last_name: Guha
- first_name: Orna
  full_name: Kupferman, Orna
  last_name: Kupferman
citation:
  ama: 'Avni G, Guha S, Kupferman O. Timed network games with clocks. In: Vol 83.
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:<a href="https://doi.org/10.4230/LIPIcs.MFCS.2017.37">10.4230/LIPIcs.MFCS.2017.37</a>'
  apa: 'Avni, G., Guha, S., &#38; Kupferman, O. (2017). Timed network games with clocks
    (Vol. 83). Presented at the MFCS: Mathematical Foundations of Computer Science
    (SG), Aalborg, Denmark: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a
    href="https://doi.org/10.4230/LIPIcs.MFCS.2017.37">https://doi.org/10.4230/LIPIcs.MFCS.2017.37</a>'
  chicago: Avni, Guy, Shibashis Guha, and Orna Kupferman. “Timed Network Games with
    Clocks,” Vol. 83. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. <a
    href="https://doi.org/10.4230/LIPIcs.MFCS.2017.37">https://doi.org/10.4230/LIPIcs.MFCS.2017.37</a>.
  ieee: 'G. Avni, S. Guha, and O. Kupferman, “Timed network games with clocks,” presented
    at the MFCS: Mathematical Foundations of Computer Science (SG), Aalborg, Denmark,
    2017, vol. 83.'
  ista: 'Avni G, Guha S, Kupferman O. 2017. Timed network games with clocks. MFCS:
    Mathematical Foundations of Computer Science (SG), LIPIcs, vol. 83, 37.'
  mla: Avni, Guy, et al. <i>Timed Network Games with Clocks</i>. Vol. 83, 37, Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPIcs.MFCS.2017.37">10.4230/LIPIcs.MFCS.2017.37</a>.
  short: G. Avni, S. Guha, O. Kupferman, in:, Schloss Dagstuhl - Leibniz-Zentrum für
    Informatik, 2017.
conference:
  end_date: 2017-08-25
  location: Aalborg, Denmark
  name: 'MFCS: Mathematical Foundations of Computer Science (SG)'
  start_date: 2017-08-21
date_created: 2018-12-11T11:49:26Z
date_published: 2017-06-01T00:00:00Z
date_updated: 2023-02-23T12:35:50Z
day: '01'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.4230/LIPIcs.MFCS.2017.37
file:
- access_level: open_access
  checksum: f55eaf7f3c36ea07801112acfedd17d5
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:14:10Z
  date_updated: 2020-07-14T12:48:18Z
  file_id: '5059'
  file_name: IST-2017-829-v1+1_mfcs-cr.pdf
  file_size: 369730
  relation: main_file
file_date_updated: 2020-07-14T12:48:18Z
has_accepted_license: '1'
intvolume: '        83'
language:
- iso: eng
month: '06'
oa: 1
oa_version: Published Version
project:
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication_identifier:
  issn:
  - '18688969'
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6438'
pubrep_id: '829'
quality_controlled: '1'
related_material:
  record:
  - id: '6005'
    relation: later_version
    status: public
scopus_import: 1
status: public
title: Timed network games with clocks
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 83
year: '2017'
...
---
_id: '1003'
abstract:
- lang: eng
  text: Network games (NGs) are played on directed graphs and are extensively used
    in network design and analysis. Search problems for NGs include finding special
    strategy profiles such as a Nash equilibrium and a globally optimal solution.
    The networks modeled by NGs may be huge. In formal verification, abstraction has
    proven to be an extremely effective technique for reasoning about systems with
    big and even infinite state spaces. We describe an abstraction-refinement methodology
    for reasoning about NGs. Our methodology is based on an abstraction function that
    maps the state space of an NG to a much smaller state space. We search for a global
    optimum and a Nash equilibrium by reasoning on an under- and an overapproximation
    defined on top of this smaller state space. When the approximations are too coarse
    to find such profiles, we refine the abstraction function. Our experimental results
    demonstrate the efficiency of the methodology.
article_processing_charge: No
author:
- first_name: Guy
  full_name: Avni, Guy
  id: 463C8BC2-F248-11E8-B48F-1D18A9856A87
  last_name: Avni
  orcid: 0000-0001-5588-8287
- first_name: Shibashis
  full_name: Guha, Shibashis
  last_name: Guha
- first_name: Orna
  full_name: Kupferman, Orna
  last_name: Kupferman
citation:
  ama: 'Avni G, Guha S, Kupferman O. An abstraction-refinement methodology for reasoning
    about network games. In: AAAI Press; 2017:70-76. doi:<a href="https://doi.org/10.24963/ijcai.2017/11">10.24963/ijcai.2017/11</a>'
  apa: 'Avni, G., Guha, S., &#38; Kupferman, O. (2017). An abstraction-refinement
    methodology for reasoning about network games (pp. 70–76). Presented at the IJCAI:
    International Joint Conference on Artificial Intelligence , Melbourne, Australia:
    AAAI Press. <a href="https://doi.org/10.24963/ijcai.2017/11">https://doi.org/10.24963/ijcai.2017/11</a>'
  chicago: Avni, Guy, Shibashis Guha, and Orna Kupferman. “An Abstraction-Refinement
    Methodology for Reasoning about Network Games,” 70–76. AAAI Press, 2017. <a href="https://doi.org/10.24963/ijcai.2017/11">https://doi.org/10.24963/ijcai.2017/11</a>.
  ieee: 'G. Avni, S. Guha, and O. Kupferman, “An abstraction-refinement methodology
    for reasoning about network games,” presented at the IJCAI: International Joint
    Conference on Artificial Intelligence , Melbourne, Australia, 2017, pp. 70–76.'
  ista: 'Avni G, Guha S, Kupferman O. 2017. An abstraction-refinement methodology
    for reasoning about network games. IJCAI: International Joint Conference on Artificial
    Intelligence , 70–76.'
  mla: Avni, Guy, et al. <i>An Abstraction-Refinement Methodology for Reasoning about
    Network Games</i>. AAAI Press, 2017, pp. 70–76, doi:<a href="https://doi.org/10.24963/ijcai.2017/11">10.24963/ijcai.2017/11</a>.
  short: G. Avni, S. Guha, O. Kupferman, in:, AAAI Press, 2017, pp. 70–76.
conference:
  end_date: 2017-08-25
  location: Melbourne, Australia
  name: 'IJCAI: International Joint Conference on Artificial Intelligence '
  start_date: 2017-08-19
date_created: 2018-12-11T11:49:38Z
date_published: 2017-05-30T00:00:00Z
date_updated: 2023-09-22T09:49:00Z
day: '30'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.24963/ijcai.2017/11
external_id:
  isi:
  - '000764137500011'
file:
- access_level: open_access
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:58Z
  date_updated: 2018-12-12T10:16:58Z
  file_id: '5249'
  file_name: IST-2017-818-v1+1_allIJCAI_CR.pdf
  file_size: 365172
  relation: main_file
file_date_updated: 2018-12-12T10:16:58Z
has_accepted_license: '1'
isi: 1
language:
- iso: eng
month: '05'
oa: 1
oa_version: Submitted Version
page: 70 - 76
project:
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_identifier:
  issn:
  - '10450823'
publication_status: published
publisher: AAAI Press
publist_id: '6395'
pubrep_id: '818'
quality_controlled: '1'
related_material:
  record:
  - id: '6006'
    relation: later_version
    status: public
scopus_import: '1'
status: public
title: An abstraction-refinement methodology for reasoning about network games
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
year: '2017'
...
---
_id: '1011'
abstract:
- lang: eng
  text: Pushdown systems (PDSs) and recursive state machines (RSMs), which are linearly
    equivalent, are standard models for interprocedural analysis. Yet RSMs are more
    convenient as they (a) explicitly model function calls and returns, and (b) specify
    many natural parameters for algorithmic analysis, e.g., the number of entries
    and exits. We consider a general framework where RSM transitions are labeled from
    a semiring and path properties are algebraic with semiring operations, which can
    model, e.g., interprocedural reachability and dataflow analysis problems. Our
    main contributions are new algorithms for several fundamental problems. As compared
    to a direct translation of RSMs to PDSs and the best-known existing bounds of
    PDSs, our analysis algorithm improves the complexity for finite-height semirings
    (that subsumes reachability and standard dataflow properties). We further consider
    the problem of extracting distance values from the representation structures computed
    by our algorithm, and give efficient algorithms that distinguish the complexity
    of a one-time preprocessing from the complexity of each individual query. Another
    advantage of our algorithm is that our improvements carry over to the concurrent
    setting, where we improve the bestknown complexity for the context-bounded analysis
    of concurrent RSMs. Finally, we provide a prototype implementation that gives
    a significant speed-up on several benchmarks from the SLAM/SDV project.
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Bernhard
  full_name: Kragl, Bernhard
  id: 320FC952-F248-11E8-B48F-1D18A9856A87
  last_name: Kragl
  orcid: 0000-0001-7745-9117
- first_name: Samarth
  full_name: Mishra, Samarth
  last_name: Mishra
- first_name: Andreas
  full_name: Pavlogiannis, Andreas
  id: 49704004-F248-11E8-B48F-1D18A9856A87
  last_name: Pavlogiannis
  orcid: 0000-0002-8943-0722
citation:
  ama: 'Chatterjee K, Kragl B, Mishra S, Pavlogiannis A. Faster algorithms for weighted
    recursive state machines. In: Yang H, ed. Vol 10201. Springer; 2017:287-313. doi:<a
    href="https://doi.org/10.1007/978-3-662-54434-1_11">10.1007/978-3-662-54434-1_11</a>'
  apa: 'Chatterjee, K., Kragl, B., Mishra, S., &#38; Pavlogiannis, A. (2017). Faster
    algorithms for weighted recursive state machines. In H. Yang (Ed.) (Vol. 10201,
    pp. 287–313). Presented at the ESOP: European Symposium on Programming, Uppsala,
    Sweden: Springer. <a href="https://doi.org/10.1007/978-3-662-54434-1_11">https://doi.org/10.1007/978-3-662-54434-1_11</a>'
  chicago: Chatterjee, Krishnendu, Bernhard Kragl, Samarth Mishra, and Andreas Pavlogiannis.
    “Faster Algorithms for Weighted Recursive State Machines.” edited by Hongseok
    Yang, 10201:287–313. Springer, 2017. <a href="https://doi.org/10.1007/978-3-662-54434-1_11">https://doi.org/10.1007/978-3-662-54434-1_11</a>.
  ieee: 'K. Chatterjee, B. Kragl, S. Mishra, and A. Pavlogiannis, “Faster algorithms
    for weighted recursive state machines,” presented at the ESOP: European Symposium
    on Programming, Uppsala, Sweden, 2017, vol. 10201, pp. 287–313.'
  ista: 'Chatterjee K, Kragl B, Mishra S, Pavlogiannis A. 2017. Faster algorithms
    for weighted recursive state machines. ESOP: European Symposium on Programming,
    LNCS, vol. 10201, 287–313.'
  mla: Chatterjee, Krishnendu, et al. <i>Faster Algorithms for Weighted Recursive
    State Machines</i>. Edited by Hongseok Yang, vol. 10201, Springer, 2017, pp. 287–313,
    doi:<a href="https://doi.org/10.1007/978-3-662-54434-1_11">10.1007/978-3-662-54434-1_11</a>.
  short: K. Chatterjee, B. Kragl, S. Mishra, A. Pavlogiannis, in:, H. Yang (Ed.),
    Springer, 2017, pp. 287–313.
conference:
  end_date: 2017-04-29
  location: Uppsala, Sweden
  name: 'ESOP: European Symposium on Programming'
  start_date: 2017-04-22
date_created: 2018-12-11T11:49:41Z
date_published: 2017-03-19T00:00:00Z
date_updated: 2023-09-22T09:44:50Z
day: '19'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1007/978-3-662-54434-1_11
ec_funded: 1
editor:
- first_name: Hongseok
  full_name: Yang, Hongseok
  last_name: Yang
external_id:
  isi:
  - '000681702400011'
intvolume: '     10201'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1701.04914
month: '03'
oa: 1
oa_version: Submitted Version
page: 287 - 313
project:
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
publication_identifier:
  issn:
  - '03029743'
publication_status: published
publisher: Springer
publist_id: '6384'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Faster algorithms for weighted recursive state machines
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 10201
year: '2017'
...
---
_id: '10418'
abstract:
- lang: eng
  text: We present a new proof rule for proving almost-sure termination of probabilistic
    programs, including those that contain demonic non-determinism. An important question
    for a probabilistic program is whether the probability mass of all its diverging
    runs is zero, that is that it terminates "almost surely". Proving that can be
    hard, and this paper presents a new method for doing so. It applies directly to
    the program's source code, even if the program contains demonic choice. Like others,
    we use variant functions (a.k.a. "super-martingales") that are real-valued and
    decrease randomly on each loop iteration; but our key innovation is that the amount
    as well as the probability of the decrease are parametric. We prove the soundness
    of the new rule, indicate where its applicability goes beyond existing rules,
    and explain its connection to classical results on denumerable (non-demonic) Markov
    chains.
acknowledgement: "McIver and Morgan are grateful to David Basin and the Information
  Security Group at ETH Zürich for hosting a six-month stay in Switzerland, during
  part of which this work began. And thanks particularly to Andreas Lochbihler, who
  shared with us the probabilistic termination problem that led to it. They acknowledge
  the support of ARC grant DP140101119. Part of this work was carried out during the
  Workshop on Probabilistic Programming Semantics\r\nat McGill University’s Bellairs
  Research Institute on Barbados organised by Alexandra Silva and\r\nPrakash Panangaden.
  Kaminski and Katoen are grateful to Sebastian Junges for spotting a flaw in §5.4."
article_number: '33'
article_processing_charge: No
article_type: original
arxiv: 1
author:
- first_name: Annabelle
  full_name: Mciver, Annabelle
  last_name: Mciver
- first_name: Carroll
  full_name: Morgan, Carroll
  last_name: Morgan
- first_name: Benjamin Lucien
  full_name: Kaminski, Benjamin Lucien
  last_name: Kaminski
- first_name: Joost P
  full_name: Katoen, Joost P
  id: 4524F760-F248-11E8-B48F-1D18A9856A87
  last_name: Katoen
citation:
  ama: Mciver A, Morgan C, Kaminski BL, Katoen JP. A new proof rule for almost-sure
    termination. <i>Proceedings of the ACM on Programming Languages</i>. 2017;2(POPL).
    doi:<a href="https://doi.org/10.1145/3158121">10.1145/3158121</a>
  apa: 'Mciver, A., Morgan, C., Kaminski, B. L., &#38; Katoen, J. P. (2017). A new
    proof rule for almost-sure termination. <i>Proceedings of the ACM on Programming
    Languages</i>. Los Angeles, CA, United States: Association for Computing Machinery.
    <a href="https://doi.org/10.1145/3158121">https://doi.org/10.1145/3158121</a>'
  chicago: Mciver, Annabelle, Carroll Morgan, Benjamin Lucien Kaminski, and Joost
    P Katoen. “A New Proof Rule for Almost-Sure Termination.” <i>Proceedings of the
    ACM on Programming Languages</i>. Association for Computing Machinery, 2017. <a
    href="https://doi.org/10.1145/3158121">https://doi.org/10.1145/3158121</a>.
  ieee: A. Mciver, C. Morgan, B. L. Kaminski, and J. P. Katoen, “A new proof rule
    for almost-sure termination,” <i>Proceedings of the ACM on Programming Languages</i>,
    vol. 2, no. POPL. Association for Computing Machinery, 2017.
  ista: Mciver A, Morgan C, Kaminski BL, Katoen JP. 2017. A new proof rule for almost-sure
    termination. Proceedings of the ACM on Programming Languages. 2(POPL), 33.
  mla: Mciver, Annabelle, et al. “A New Proof Rule for Almost-Sure Termination.” <i>Proceedings
    of the ACM on Programming Languages</i>, vol. 2, no. POPL, 33, Association for
    Computing Machinery, 2017, doi:<a href="https://doi.org/10.1145/3158121">10.1145/3158121</a>.
  short: A. Mciver, C. Morgan, B.L. Kaminski, J.P. Katoen, Proceedings of the ACM
    on Programming Languages 2 (2017).
conference:
  end_date: 2018-01-13
  location: Los Angeles, CA, United States
  name: 'POPL: Programming Languages'
  start_date: 2018-01-07
date_created: 2021-12-05T23:01:49Z
date_published: 2017-12-07T00:00:00Z
date_updated: 2021-12-07T08:04:14Z
day: '07'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1145/3158121
external_id:
  arxiv:
  - '1711.03588'
intvolume: '         2'
issue: POPL
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://dl.acm.org/doi/10.1145/3158121
month: '12'
oa: 1
oa_version: Published Version
publication: Proceedings of the ACM on Programming Languages
publication_identifier:
  eissn:
  - 2475-1421
publication_status: published
publisher: Association for Computing Machinery
quality_controlled: '1'
scopus_import: '1'
status: public
title: A new proof rule for almost-sure termination
type: journal_article
user_id: 8b945eb4-e2f2-11eb-945a-df72226e66a9
volume: 2
year: '2017'
...
---
_id: '1196'
abstract:
- lang: eng
  text: 'We define the . model-measuring problem: given a model . M and specification
    . ϕ, what is the maximal distance . ρ such that all models . M'' within distance
    . ρ from . M satisfy (or violate) . ϕ. The model-measuring problem presupposes
    a distance function on models. We concentrate on . automatic distance functions,
    which are defined by weighted automata. The model-measuring problem subsumes several
    generalizations of the classical model-checking problem, in particular, quantitative
    model-checking problems that measure the degree of satisfaction of a specification;
    robustness problems that measure how much a model can be perturbed without violating
    the specification; and parameter synthesis for hybrid systems. We show that for
    automatic distance functions, and (a) . ω-regular linear-time, (b) . ω-regular
    branching-time, and (c) hybrid specifications, the model-measuring problem can
    be solved.We use automata-theoretic model-checking methods for model measuring,
    replacing the emptiness question for word, tree, and hybrid automata by the .
    optimal-value question for the weighted versions of these automata. For automata
    over words and trees, we consider weighted automata that accumulate weights by
    maximizing, summing, discounting, and limit averaging. For hybrid automata, we
    consider monotonic (parametric) hybrid automata, a hybrid counterpart of (discrete)
    weighted automata.We give several examples of using the model-measuring problem
    to compute various notions of robustness and quantitative satisfaction for temporal
    specifications. Further, we propose the modeling framework for model measuring
    to ease the specification and reduce the likelihood of errors in modeling.Finally,
    we present a variant of the model-measuring problem, called the . model-repair
    problem. The model-repair problem applies to models that do not satisfy the specification;
    it can be used to derive restrictions, under which the model satisfies the specification,
    i.e., to repair the model.'
acknowledgement: "This research was supported in part by the European Research Council
  (ERC) under grant 267989 (QUAREM), by the Austrian Science Fund1 (FWF) under grants
  S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award), and by the National Science
  Centre (NCN), Poland under grant 2014/15/D/ST6/04543.\r\nA Technical Report of this
  article is available via: https://repository.ist.ac.at/171/"
article_processing_charge: No
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Jan
  full_name: Otop, Jan
  id: 2FC5DA74-F248-11E8-B48F-1D18A9856A87
  last_name: Otop
citation:
  ama: 'Henzinger TA, Otop J. Model measuring for discrete and hybrid systems. <i>Nonlinear
    Analysis: Hybrid Systems</i>. 2017;23:166-190. doi:<a href="https://doi.org/10.1016/j.nahs.2016.09.001">10.1016/j.nahs.2016.09.001</a>'
  apa: 'Henzinger, T. A., &#38; Otop, J. (2017). Model measuring for discrete and
    hybrid systems. <i>Nonlinear Analysis: Hybrid Systems</i>. Elsevier. <a href="https://doi.org/10.1016/j.nahs.2016.09.001">https://doi.org/10.1016/j.nahs.2016.09.001</a>'
  chicago: 'Henzinger, Thomas A, and Jan Otop. “Model Measuring for Discrete and Hybrid
    Systems.” <i>Nonlinear Analysis: Hybrid Systems</i>. Elsevier, 2017. <a href="https://doi.org/10.1016/j.nahs.2016.09.001">https://doi.org/10.1016/j.nahs.2016.09.001</a>.'
  ieee: 'T. A. Henzinger and J. Otop, “Model measuring for discrete and hybrid systems,”
    <i>Nonlinear Analysis: Hybrid Systems</i>, vol. 23. Elsevier, pp. 166–190, 2017.'
  ista: 'Henzinger TA, Otop J. 2017. Model measuring for discrete and hybrid systems.
    Nonlinear Analysis: Hybrid Systems. 23, 166–190.'
  mla: 'Henzinger, Thomas A., and Jan Otop. “Model Measuring for Discrete and Hybrid
    Systems.” <i>Nonlinear Analysis: Hybrid Systems</i>, vol. 23, Elsevier, 2017,
    pp. 166–90, doi:<a href="https://doi.org/10.1016/j.nahs.2016.09.001">10.1016/j.nahs.2016.09.001</a>.'
  short: 'T.A. Henzinger, J. Otop, Nonlinear Analysis: Hybrid Systems 23 (2017) 166–190.'
date_created: 2018-12-11T11:50:39Z
date_published: 2017-02-01T00:00:00Z
date_updated: 2023-09-20T11:18:50Z
day: '01'
department:
- _id: ToHe
doi: 10.1016/j.nahs.2016.09.001
ec_funded: 1
external_id:
  isi:
  - '000390637000011'
intvolume: '        23'
isi: 1
language:
- iso: eng
month: '02'
oa_version: None
page: 166 - 190
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication: 'Nonlinear Analysis: Hybrid Systems'
publication_status: published
publisher: Elsevier
publist_id: '6154'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Model measuring for discrete and hybrid systems
type: journal_article
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 23
year: '2017'
...
---
_id: '1090'
abstract:
- lang: eng
  text: ' While weighted automata provide a natural framework to express quantitative
    properties, many basic properties like average response time cannot be expressed
    with weighted automata. Nested weighted automata extend weighted automata and
    consist of a master automaton and a set of slave automata that are invoked by
    the master automaton. Nested weighted automata are strictly more expressive than
    weighted automata (e.g., average response time can be expressed with nested weighted
    automata), but the basic decision questions have higher complexity (e.g., for
    deterministic automata, the emptiness question for nested weighted automata is
    PSPACE-hard, whereas the corresponding complexity for weighted automata is PTIME).
    We consider a natural subclass of nested weighted automata where at any point
    at most a bounded number k of slave automata can be active. We focus on automata
    whose master value function is the limit average. We show that these nested weighted
    automata with bounded width are strictly more expressive than weighted automata
    (e.g., average response time with no overlapping requests can be expressed with
    bound k=1, but not with non-nested weighted automata). We show that the complexity
    of the basic decision problems (i.e., emptiness and universality) for the subclass
    with k constant matches the complexity for weighted automata. Moreover, when k
    is part of the input given in unary we establish PSPACE-completeness.'
acknowledgement: "This research was supported in part by the Austrian Science Fund
  (FWF) under grants S11402-N23\r\n(RiSE/SHiNE) and Z211-N23 (Wittgenstein Award),
  ERC Start grant (279307: Graph Games), Vienna\r\nScience and Technology Fund (WWTF)
  through project ICT15-003 and by the National Science Centre\r\n(NCN), Poland under
  grant 2014/15/D/ST6/04543."
alternative_title:
- LIPIcs
article_number: '24'
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Jan
  full_name: Otop, Jan
  id: 2FC5DA74-F248-11E8-B48F-1D18A9856A87
  last_name: Otop
citation:
  ama: 'Chatterjee K, Henzinger TA, Otop J. Nested weighted limit-average automata
    of bounded width. In: Vol 58. Schloss Dagstuhl - Leibniz-Zentrum für Informatik;
    2016. doi:<a href="https://doi.org/10.4230/LIPIcs.MFCS.2016.24">10.4230/LIPIcs.MFCS.2016.24</a>'
  apa: 'Chatterjee, K., Henzinger, T. A., &#38; Otop, J. (2016). Nested weighted limit-average
    automata of bounded width (Vol. 58). Presented at the MFCS: Mathematical Foundations
    of Computer Science (SG), Krakow; Poland: Schloss Dagstuhl - Leibniz-Zentrum für
    Informatik. <a href="https://doi.org/10.4230/LIPIcs.MFCS.2016.24">https://doi.org/10.4230/LIPIcs.MFCS.2016.24</a>'
  chicago: Chatterjee, Krishnendu, Thomas A Henzinger, and Jan Otop. “Nested Weighted
    Limit-Average Automata of Bounded Width,” Vol. 58. Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2016. <a href="https://doi.org/10.4230/LIPIcs.MFCS.2016.24">https://doi.org/10.4230/LIPIcs.MFCS.2016.24</a>.
  ieee: 'K. Chatterjee, T. A. Henzinger, and J. Otop, “Nested weighted limit-average
    automata of bounded width,” presented at the MFCS: Mathematical Foundations of
    Computer Science (SG), Krakow; Poland, 2016, vol. 58.'
  ista: 'Chatterjee K, Henzinger TA, Otop J. 2016. Nested weighted limit-average automata
    of bounded width. MFCS: Mathematical Foundations of Computer Science (SG), LIPIcs,
    vol. 58, 24.'
  mla: Chatterjee, Krishnendu, et al. <i>Nested Weighted Limit-Average Automata of
    Bounded Width</i>. Vol. 58, 24, Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2016, doi:<a href="https://doi.org/10.4230/LIPIcs.MFCS.2016.24">10.4230/LIPIcs.MFCS.2016.24</a>.
  short: K. Chatterjee, T.A. Henzinger, J. Otop, in:, Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2016.
conference:
  end_date: 2016-08-26
  location: Krakow; Poland
  name: 'MFCS: Mathematical Foundations of Computer Science (SG)'
  start_date: 2016-08-22
date_created: 2018-12-11T11:50:05Z
date_published: 2016-08-01T00:00:00Z
date_updated: 2021-01-12T06:48:12Z
day: '01'
ddc:
- '004'
department:
- _id: KrCh
- _id: ToHe
doi: 10.4230/LIPIcs.MFCS.2016.24
ec_funded: 1
file:
- access_level: open_access
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:17:31Z
  date_updated: 2018-12-12T10:17:31Z
  file_id: '5286'
  file_name: IST-2017-795-v1+1_LIPIcs-MFCS-2016-24.pdf
  file_size: 564560
  relation: main_file
file_date_updated: 2018-12-12T10:17:31Z
has_accepted_license: '1'
intvolume: '        58'
language:
- iso: eng
month: '08'
oa: 1
oa_version: Published Version
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6286'
pubrep_id: '795'
quality_controlled: '1'
scopus_import: 1
status: public
title: Nested weighted limit-average automata of bounded width
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 58
year: '2016'
...
---
_id: '1093'
abstract:
- lang: eng
  text: 'We introduce a general class of distances (metrics) between Markov chains,
    which are based on linear behaviour. This class encompasses distances given topologically
    (such as the total variation distance or trace distance) as well as by temporal
    logics or automata. We investigate which of the distances can be approximated
    by observing the systems, i.e. by black-box testing or simulation, and we provide
    both negative and positive results. '
acknowledgement: "This research was funded in part by the European Research Council
  (ERC) under grant agreement 267989\r\n(QUAREM), the Austrian Science Fund (FWF)
  under grants project S11402-N23 (RiSE and SHiNE)\r\nand Z211-N23 (Wittgenstein Award),
  by the Czech Science Foundation Grant No. P202/12/G061, and\r\nby the SNSF Advanced
  Postdoc. Mobility Fellowship – grant number P300P2_161067."
alternative_title:
- LIPIcs
article_number: '20'
author:
- first_name: Przemyslaw
  full_name: Daca, Przemyslaw
  id: 49351290-F248-11E8-B48F-1D18A9856A87
  last_name: Daca
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Jan
  full_name: Kretinsky, Jan
  id: 44CEF464-F248-11E8-B48F-1D18A9856A87
  last_name: Kretinsky
  orcid: 0000-0002-8122-2881
- first_name: Tatjana
  full_name: Petrov, Tatjana
  id: 3D5811FC-F248-11E8-B48F-1D18A9856A87
  last_name: Petrov
  orcid: 0000-0002-9041-0905
citation:
  ama: 'Daca P, Henzinger TA, Kretinsky J, Petrov T. Linear distances between Markov
    chains. In: Vol 59. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2016. doi:<a
    href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.20">10.4230/LIPIcs.CONCUR.2016.20</a>'
  apa: 'Daca, P., Henzinger, T. A., Kretinsky, J., &#38; Petrov, T. (2016). Linear
    distances between Markov chains (Vol. 59). Presented at the CONCUR: Concurrency
    Theory, Quebec City; Canada: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.20">https://doi.org/10.4230/LIPIcs.CONCUR.2016.20</a>'
  chicago: Daca, Przemyslaw, Thomas A Henzinger, Jan Kretinsky, and Tatjana Petrov.
    “Linear Distances between Markov Chains,” Vol. 59. Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2016. <a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.20">https://doi.org/10.4230/LIPIcs.CONCUR.2016.20</a>.
  ieee: 'P. Daca, T. A. Henzinger, J. Kretinsky, and T. Petrov, “Linear distances
    between Markov chains,” presented at the CONCUR: Concurrency Theory, Quebec City;
    Canada, 2016, vol. 59.'
  ista: 'Daca P, Henzinger TA, Kretinsky J, Petrov T. 2016. Linear distances between
    Markov chains. CONCUR: Concurrency Theory, LIPIcs, vol. 59, 20.'
  mla: Daca, Przemyslaw, et al. <i>Linear Distances between Markov Chains</i>. Vol.
    59, 20, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016, doi:<a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.20">10.4230/LIPIcs.CONCUR.2016.20</a>.
  short: P. Daca, T.A. Henzinger, J. Kretinsky, T. Petrov, in:, Schloss Dagstuhl -
    Leibniz-Zentrum für Informatik, 2016.
conference:
  end_date: 2016-08-26
  location: Quebec City; Canada
  name: 'CONCUR: Concurrency Theory'
  start_date: 2016-08-23
date_created: 2018-12-11T11:50:06Z
date_published: 2016-08-01T00:00:00Z
date_updated: 2023-09-07T11:58:33Z
day: '01'
ddc:
- '004'
department:
- _id: ToHe
- _id: KrCh
- _id: CaGu
doi: 10.4230/LIPIcs.CONCUR.2016.20
ec_funded: 1
file:
- access_level: open_access
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:11:39Z
  date_updated: 2018-12-12T10:11:39Z
  file_id: '4895'
  file_name: IST-2017-794-v1+1_LIPIcs-CONCUR-2016-20.pdf
  file_size: 501827
  relation: main_file
file_date_updated: 2018-12-12T10:11:39Z
has_accepted_license: '1'
intvolume: '        59'
language:
- iso: eng
month: '08'
oa: 1
oa_version: Published Version
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6283'
pubrep_id: '794'
quality_controlled: '1'
related_material:
  record:
  - id: '1155'
    relation: dissertation_contains
    status: public
scopus_import: 1
status: public
title: Linear distances between Markov chains
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 59
year: '2016'
...
---
_id: '1095'
abstract:
- lang: eng
  text: ' The semantics of concurrent data structures is usually given by a sequential
    specification and a consistency condition. Linearizability is the most popular
    consistency condition due to its simplicity and general applicability. Nevertheless,
    for applications that do not require all guarantees offered by linearizability,
    recent research has focused on improving performance and scalability of concurrent
    data structures by relaxing their semantics. In this paper, we present local linearizability,
    a relaxed consistency condition that is applicable to container-type concurrent
    data structures like pools, queues, and stacks. While linearizability requires
    that the effect of each operation is observed by all threads at the same time,
    local linearizability only requires that for each thread T, the effects of its
    local insertion operations and the effects of those removal operations that remove
    values inserted by T are observed by all threads at the same time. We investigate
    theoretical and practical properties of local linearizability and its relationship
    to many existing consistency conditions. We present a generic implementation method
    for locally linearizable data structures that uses existing linearizable data
    structures as building blocks. Our implementations show performance and scalability
    improvements over the original building blocks and outperform the fastest existing
    container-type implementations. '
acknowledgement: "This work has been supported by the National Research Network RiSE
  on Rigorous Systems Engineering\r\n(Austrian Science Fund (FWF): S11402-N23, S11403-N23,
  S11404-N23, S11411-N23), a Google\r\nPhD Fellowship, an Erwin Schrödinger Fellowship
  (Austrian Science Fund (FWF): J3696-N26), EPSRC\r\ngrants EP/H005633/1 and EP/K008528/1,
  the Vienna Science and Technology Fund (WWTF) trough\r\ngrant PROSEED, the European
  Research Council (ERC) under grant 267989 (QUAREM) and by the\r\nAustrian Science
  Fund (FWF) under grant Z211-N23 (Wittgenstein Award)."
alternative_title:
- LIPIcs
article_number: '6'
author:
- first_name: Andreas
  full_name: Haas, Andreas
  last_name: Haas
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Andreas
  full_name: Holzer, Andreas
  last_name: Holzer
- first_name: Christoph
  full_name: Kirsch, Christoph
  last_name: Kirsch
- first_name: Michael
  full_name: Lippautz, Michael
  last_name: Lippautz
- first_name: Hannes
  full_name: Payer, Hannes
  last_name: Payer
- first_name: Ali
  full_name: Sezgin, Ali
  id: 4C7638DA-F248-11E8-B48F-1D18A9856A87
  last_name: Sezgin
- first_name: Ana
  full_name: Sokolova, Ana
  last_name: Sokolova
- first_name: Helmut
  full_name: Veith, Helmut
  last_name: Veith
citation:
  ama: 'Haas A, Henzinger TA, Holzer A, et al. Local linearizability for concurrent
    container-type data structures. In: <i>Leibniz International Proceedings in Informatics</i>.
    Vol 59. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2016. doi:<a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.6">10.4230/LIPIcs.CONCUR.2016.6</a>'
  apa: 'Haas, A., Henzinger, T. A., Holzer, A., Kirsch, C., Lippautz, M., Payer, H.,
    … Veith, H. (2016). Local linearizability for concurrent container-type data structures.
    In <i>Leibniz International Proceedings in Informatics</i> (Vol. 59). Quebec City;
    Canada: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.6">https://doi.org/10.4230/LIPIcs.CONCUR.2016.6</a>'
  chicago: Haas, Andreas, Thomas A Henzinger, Andreas Holzer, Christoph Kirsch, Michael
    Lippautz, Hannes Payer, Ali Sezgin, Ana Sokolova, and Helmut Veith. “Local Linearizability
    for Concurrent Container-Type Data Structures.” In <i>Leibniz International Proceedings
    in Informatics</i>, Vol. 59. Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2016. <a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.6">https://doi.org/10.4230/LIPIcs.CONCUR.2016.6</a>.
  ieee: A. Haas <i>et al.</i>, “Local linearizability for concurrent container-type
    data structures,” in <i>Leibniz International Proceedings in Informatics</i>,
    Quebec City; Canada, 2016, vol. 59.
  ista: 'Haas A, Henzinger TA, Holzer A, Kirsch C, Lippautz M, Payer H, Sezgin A,
    Sokolova A, Veith H. 2016. Local linearizability for concurrent container-type
    data structures. Leibniz International Proceedings in Informatics. CONCUR: Concurrency
    Theory, LIPIcs, vol. 59, 6.'
  mla: Haas, Andreas, et al. “Local Linearizability for Concurrent Container-Type
    Data Structures.” <i>Leibniz International Proceedings in Informatics</i>, vol.
    59, 6, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016, doi:<a href="https://doi.org/10.4230/LIPIcs.CONCUR.2016.6">10.4230/LIPIcs.CONCUR.2016.6</a>.
  short: A. Haas, T.A. Henzinger, A. Holzer, C. Kirsch, M. Lippautz, H. Payer, A.
    Sezgin, A. Sokolova, H. Veith, in:, Leibniz International Proceedings in Informatics,
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016.
conference:
  end_date: 2016-08-26
  location: Quebec City; Canada
  name: 'CONCUR: Concurrency Theory'
  start_date: 2016-08-23
date_created: 2018-12-11T11:50:07Z
date_published: 2016-08-01T00:00:00Z
date_updated: 2021-01-12T06:48:14Z
day: '01'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.4230/LIPIcs.CONCUR.2016.6
ec_funded: 1
file:
- access_level: open_access
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:10:10Z
  date_updated: 2018-12-12T10:10:10Z
  file_id: '4795'
  file_name: IST-2017-793-v1+1_LIPIcs-CONCUR-2016-6.pdf
  file_size: 589747
  relation: main_file
file_date_updated: 2018-12-12T10:10:10Z
has_accepted_license: '1'
intvolume: '        59'
language:
- iso: eng
month: '08'
oa: 1
oa_version: Published Version
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication: Leibniz International Proceedings in Informatics
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6280'
pubrep_id: '793'
quality_controlled: '1'
scopus_import: 1
status: public
title: Local linearizability for concurrent container-type data structures
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 59
year: '2016'
...
---
_id: '1103'
abstract:
- lang: eng
  text: We propose two parallel state-space-exploration algorithms for hybrid automaton
    (HA), with the goal of enhancing performance on multi-core shared-memory systems.
    The first uses the parallel, breadth-first-search algorithm (PBFS) of the SPIN
    model checker, when traversing the discrete modes of the HA, and enhances it with
    a parallel exploration of the continuous states within each mode. We show that
    this simple-minded extension of PBFS does not provide the desired load balancing
    in many HA benchmarks. The second algorithm is a task-parallel BFS algorithm (TP-BFS),
    which uses a cheap precomputation of the cost associated with the post operations
    (both continuous and discrete) in order to improve load balancing. We illustrate
    the TP-BFS and the cost precomputation of the post operators on a support-function-based
    algorithm for state-space exploration. The performance comparison of the two algorithms
    shows that, in general, TP-BFS provides a better utilization/load-balancing of
    the CPU. Both algorithms are implemented in the model checker XSpeed. Our experiments
    show a maximum speed-up of more than 2000 χ on a navigation benchmark, with respect
    to SpaceEx LGG scenario. In order to make the comparison fair, we employed an
    equal number of post operations in both tools. To the best of our knowledge, this
    paper represents the first attempt to provide parallel, reachability-analysis
    algorithms for HA.
acknowledgement: This work was supported in part by DST-SERB, GoI under Project No.
  YSS/2014/000623 and by the European Research Council (ERC) under grant 267989 (QUAREM)
  and by the Austrian Science Fund (FWF) under grants S11402-N23, S11405-N23 and S11412-N23
  (RiSE/SHiNE) and Z211-N23 (Wittgenstein Award).
article_number: '7797741'
author:
- first_name: Amit
  full_name: Gurung, Amit
  last_name: Gurung
- first_name: Arup
  full_name: Deka, Arup
  last_name: Deka
- first_name: Ezio
  full_name: Bartocci, Ezio
  last_name: Bartocci
- first_name: Sergiy
  full_name: Bogomolov, Sergiy
  id: 369D9A44-F248-11E8-B48F-1D18A9856A87
  last_name: Bogomolov
  orcid: 0000-0002-0686-0365
- first_name: Radu
  full_name: Grosu, Radu
  last_name: Grosu
- first_name: Rajarshi
  full_name: Ray, Rajarshi
  last_name: Ray
citation:
  ama: 'Gurung A, Deka A, Bartocci E, Bogomolov S, Grosu R, Ray R. Parallel reachability
    analysis for hybrid systems. In: IEEE; 2016. doi:<a href="https://doi.org/10.1109/MEMCOD.2016.7797741">10.1109/MEMCOD.2016.7797741</a>'
  apa: 'Gurung, A., Deka, A., Bartocci, E., Bogomolov, S., Grosu, R., &#38; Ray, R.
    (2016). Parallel reachability analysis for hybrid systems. Presented at the MEMOCODE:
    International Conference on Formal Methods and Models for System Design, Kanpur,
    India : IEEE. <a href="https://doi.org/10.1109/MEMCOD.2016.7797741">https://doi.org/10.1109/MEMCOD.2016.7797741</a>'
  chicago: Gurung, Amit, Arup Deka, Ezio Bartocci, Sergiy Bogomolov, Radu Grosu, and
    Rajarshi Ray. “Parallel Reachability Analysis for Hybrid Systems.” IEEE, 2016.
    <a href="https://doi.org/10.1109/MEMCOD.2016.7797741">https://doi.org/10.1109/MEMCOD.2016.7797741</a>.
  ieee: 'A. Gurung, A. Deka, E. Bartocci, S. Bogomolov, R. Grosu, and R. Ray, “Parallel
    reachability analysis for hybrid systems,” presented at the MEMOCODE: International
    Conference on Formal Methods and Models for System Design, Kanpur, India , 2016.'
  ista: 'Gurung A, Deka A, Bartocci E, Bogomolov S, Grosu R, Ray R. 2016. Parallel
    reachability analysis for hybrid systems. MEMOCODE: International Conference on
    Formal Methods and Models for System Design, 7797741.'
  mla: Gurung, Amit, et al. <i>Parallel Reachability Analysis for Hybrid Systems</i>.
    7797741, IEEE, 2016, doi:<a href="https://doi.org/10.1109/MEMCOD.2016.7797741">10.1109/MEMCOD.2016.7797741</a>.
  short: A. Gurung, A. Deka, E. Bartocci, S. Bogomolov, R. Grosu, R. Ray, in:, IEEE,
    2016.
conference:
  end_date: 2016-11-20
  location: 'Kanpur, India '
  name: 'MEMOCODE: International Conference on Formal Methods and Models for System
    Design'
  start_date: 2016-11-18
date_created: 2018-12-11T11:50:09Z
date_published: 2016-12-27T00:00:00Z
date_updated: 2021-01-12T06:48:18Z
day: '27'
department:
- _id: ToHe
doi: 10.1109/MEMCOD.2016.7797741
ec_funded: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1606.05473
month: '12'
oa: 1
oa_version: Preprint
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication_status: published
publisher: IEEE
publist_id: '6272'
quality_controlled: '1'
scopus_import: 1
status: public
title: Parallel reachability analysis for hybrid systems
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2016'
...
---
_id: '1130'
abstract:
- lang: eng
  text: "In this thesis we present a computer-aided programming approach to concurrency.
    Our approach helps the programmer by automatically fixing concurrency-related
    bugs, i.e. bugs that occur when the program is executed using an aggressive preemptive
    scheduler, but not when using a non-preemptive (cooperative) scheduler. Bugs are
    program behaviours that are incorrect w.r.t. a specification. We consider both
    user-provided explicit specifications in the form of assertion\r\nstatements in
    the code as well as an implicit specification. The implicit specification is inferred
    from the non-preemptive behaviour. Let us consider sequences of calls that the
    program makes to an external interface. The implicit specification requires that
    any such sequence produced under a preemptive scheduler should be included in
    the set of sequences produced under a non-preemptive scheduler. We consider several
    semantics-preserving fixes that go beyond atomic sections typically explored in
    the synchronisation synthesis literature. Our synthesis is able to place locks,
    barriers and wait-signal statements and last, but not least reorder independent
    statements. The latter may be useful if a thread is released to early, e.g., before
    some initialisation is completed. We guarantee that our synthesis does not introduce
    deadlocks and that the synchronisation inserted is optimal w.r.t. a given objective
    function. We dub our solution trace-based synchronisation synthesis and it is
    loosely based on counterexample-guided inductive synthesis (CEGIS). The synthesis
    works by discovering a trace that is incorrect w.r.t. the specification and identifying
    ordering constraints crucial to trigger the specification violation. Synchronisation
    may be placed immediately (greedy approach) or delayed until all incorrect traces
    are found (non-greedy approach). For the non-greedy approach we construct a set
    of global constraints over synchronisation placements. Each model of the global
    constraints set corresponds to a correctness-ensuring synchronisation placement.
    The placement that is optimal w.r.t. the given objective function is chosen as
    the synchronisation solution. We evaluate our approach on a number of realistic
    (albeit simplified) Linux device-driver\r\nbenchmarks. The benchmarks are versions
    of the drivers with known concurrency-related bugs. For the experiments with an
    explicit specification we added assertions that would detect the bugs in the experiments.
    Device drivers lend themselves to implicit specification, where the device and
    the operating system are the external interfaces. Our experiments demonstrate
    that our synthesis method is precise and efficient. We implemented objective functions
    for coarse-grained and fine-grained locking and observed that different synchronisation
    placements are produced for our experiments, favouring e.g. a minimal number of
    synchronisation operations or maximum concurrency."
alternative_title:
- ISTA Thesis
article_processing_charge: No
author:
- first_name: Thorsten
  full_name: Tarrach, Thorsten
  id: 3D6E8F2C-F248-11E8-B48F-1D18A9856A87
  last_name: Tarrach
  orcid: 0000-0003-4409-8487
citation:
  ama: Tarrach T. Automatic synthesis of synchronisation primitives for concurrent
    programs. 2016. doi:<a href="https://doi.org/10.15479/at:ista:1130">10.15479/at:ista:1130</a>
  apa: Tarrach, T. (2016). <i>Automatic synthesis of synchronisation primitives for
    concurrent programs</i>. Institute of Science and Technology Austria. <a href="https://doi.org/10.15479/at:ista:1130">https://doi.org/10.15479/at:ista:1130</a>
  chicago: Tarrach, Thorsten. “Automatic Synthesis of Synchronisation Primitives for
    Concurrent Programs.” Institute of Science and Technology Austria, 2016. <a href="https://doi.org/10.15479/at:ista:1130">https://doi.org/10.15479/at:ista:1130</a>.
  ieee: T. Tarrach, “Automatic synthesis of synchronisation primitives for concurrent
    programs,” Institute of Science and Technology Austria, 2016.
  ista: Tarrach T. 2016. Automatic synthesis of synchronisation primitives for concurrent
    programs. Institute of Science and Technology Austria.
  mla: Tarrach, Thorsten. <i>Automatic Synthesis of Synchronisation Primitives for
    Concurrent Programs</i>. Institute of Science and Technology Austria, 2016, doi:<a
    href="https://doi.org/10.15479/at:ista:1130">10.15479/at:ista:1130</a>.
  short: T. Tarrach, Automatic Synthesis of Synchronisation Primitives for Concurrent
    Programs, Institute of Science and Technology Austria, 2016.
date_created: 2018-12-11T11:50:19Z
date_published: 2016-07-07T00:00:00Z
date_updated: 2023-09-07T11:57:01Z
day: '07'
ddc:
- '000'
degree_awarded: PhD
department:
- _id: ToHe
- _id: GradSch
doi: 10.15479/at:ista:1130
ec_funded: 1
file:
- access_level: open_access
  checksum: 319a506831650327e85376db41fc1094
  content_type: application/pdf
  creator: dernst
  date_created: 2021-02-22T11:39:32Z
  date_updated: 2021-02-22T11:39:32Z
  file_id: '9179'
  file_name: 2016_Tarrach_Thesis.pdf
  file_size: 1523935
  relation: main_file
  success: 1
- access_level: closed
  checksum: 39efcd789f0ad859ff15652cb7afc412
  content_type: application/pdf
  creator: cchlebak
  date_created: 2021-11-16T14:14:38Z
  date_updated: 2021-11-17T13:46:55Z
  file_id: '10296'
  file_name: 2016_Tarrach_Thesispdfa.pdf
  file_size: 1306068
  relation: main_file
file_date_updated: 2021-11-17T13:46:55Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://thorstent.github.io/theses/phd_thorsten_tarrach.pdf
month: '07'
oa: 1
oa_version: Published Version
page: '151'
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_identifier:
  issn:
  - 2663-337X
publication_status: published
publisher: Institute of Science and Technology Austria
publist_id: '6230'
related_material:
  record:
  - id: '1729'
    relation: part_of_dissertation
    status: public
  - id: '2218'
    relation: part_of_dissertation
    status: public
  - id: '2445'
    relation: part_of_dissertation
    status: public
status: public
supervisor:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
title: Automatic synthesis of synchronisation primitives for concurrent programs
type: dissertation
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
year: '2016'
...
---
_id: '1134'
abstract:
- lang: eng
  text: 'Hybrid systems have both continuous and discrete dynamics and are useful
    for modeling a variety of control systems, from air traffic control protocols
    to robotic maneuvers and beyond. Recently, numerous powerful and scalable tools
    for analyzing hybrid systems have emerged. Several of these tools implement automated
    formal methods for mathematically proving a system meets a specification. This
    tutorial session will present three recent hybrid systems tools: C2E2, HyST, and
    TuLiP. C2E2 is a simulated-based verification tool for hybrid systems, and uses
    validated numerical solvers and bloating of simulation traces to verify systems
    meet specifications. HyST is a hybrid systems model transformation and translation
    tool, and uses a canonical intermediate representation to support most of the
    recent verification tools, as well as automated sound abstractions that simplify
    verification of a given hybrid system. TuLiP is a controller synthesis tool for
    hybrid systems, where given a temporal logic specification to be satisfied for
    a system (plant) model, TuLiP will find a controller that meets a given specification.
    © 2016 IEEE.'
article_number: '7587948'
author:
- first_name: Parasara
  full_name: Duggirala, Parasara
  last_name: Duggirala
- first_name: Chuchu
  full_name: Fan, Chuchu
  last_name: Fan
- first_name: Matthew
  full_name: Potok, Matthew
  last_name: Potok
- first_name: Bolun
  full_name: Qi, Bolun
  last_name: Qi
- first_name: Sayan
  full_name: Mitra, Sayan
  last_name: Mitra
- first_name: Mahesh
  full_name: Viswanathan, Mahesh
  last_name: Viswanathan
- first_name: Stanley
  full_name: Bak, Stanley
  last_name: Bak
- first_name: Sergiy
  full_name: Bogomolov, Sergiy
  id: 369D9A44-F248-11E8-B48F-1D18A9856A87
  last_name: Bogomolov
  orcid: 0000-0002-0686-0365
- first_name: Taylor
  full_name: Johnson, Taylor
  last_name: Johnson
- first_name: Luan
  full_name: Nguyen, Luan
  last_name: Nguyen
- first_name: Christian
  full_name: Schilling, Christian
  id: 3A2F4DCE-F248-11E8-B48F-1D18A9856A87
  last_name: Schilling
  orcid: 0000-0003-3658-1065
- first_name: Andrew
  full_name: Sogokon, Andrew
  last_name: Sogokon
- first_name: Hoang
  full_name: Tran, Hoang
  last_name: Tran
- first_name: Weiming
  full_name: Xiang, Weiming
  last_name: Xiang
citation:
  ama: 'Duggirala P, Fan C, Potok M, et al. Tutorial: Software tools for hybrid systems
    verification transformation and synthesis C2E2 HyST and TuLiP. In: <i>2016 IEEE
    Conference on Control Applications</i>. IEEE; 2016. doi:<a href="https://doi.org/10.1109/CCA.2016.7587948">10.1109/CCA.2016.7587948</a>'
  apa: 'Duggirala, P., Fan, C., Potok, M., Qi, B., Mitra, S., Viswanathan, M., … Xiang,
    W. (2016). Tutorial: Software tools for hybrid systems verification transformation
    and synthesis C2E2 HyST and TuLiP. In <i>2016 IEEE Conference on Control Applications</i>.
    Buenos Aires, Argentina : IEEE. <a href="https://doi.org/10.1109/CCA.2016.7587948">https://doi.org/10.1109/CCA.2016.7587948</a>'
  chicago: 'Duggirala, Parasara, Chuchu Fan, Matthew Potok, Bolun Qi, Sayan Mitra,
    Mahesh Viswanathan, Stanley Bak, et al. “Tutorial: Software Tools for Hybrid Systems
    Verification Transformation and Synthesis C2E2 HyST and TuLiP.” In <i>2016 IEEE
    Conference on Control Applications</i>. IEEE, 2016. <a href="https://doi.org/10.1109/CCA.2016.7587948">https://doi.org/10.1109/CCA.2016.7587948</a>.'
  ieee: 'P. Duggirala <i>et al.</i>, “Tutorial: Software tools for hybrid systems
    verification transformation and synthesis C2E2 HyST and TuLiP,” in <i>2016 IEEE
    Conference on Control Applications</i>, Buenos Aires, Argentina , 2016.'
  ista: 'Duggirala P, Fan C, Potok M, Qi B, Mitra S, Viswanathan M, Bak S, Bogomolov
    S, Johnson T, Nguyen L, Schilling C, Sogokon A, Tran H, Xiang W. 2016. Tutorial:
    Software tools for hybrid systems verification transformation and synthesis C2E2
    HyST and TuLiP. 2016 IEEE Conference on Control Applications. CCA: Control Applications
    , 7587948.'
  mla: 'Duggirala, Parasara, et al. “Tutorial: Software Tools for Hybrid Systems Verification
    Transformation and Synthesis C2E2 HyST and TuLiP.” <i>2016 IEEE Conference on
    Control Applications</i>, 7587948, IEEE, 2016, doi:<a href="https://doi.org/10.1109/CCA.2016.7587948">10.1109/CCA.2016.7587948</a>.'
  short: P. Duggirala, C. Fan, M. Potok, B. Qi, S. Mitra, M. Viswanathan, S. Bak,
    S. Bogomolov, T. Johnson, L. Nguyen, C. Schilling, A. Sogokon, H. Tran, W. Xiang,
    in:, 2016 IEEE Conference on Control Applications, IEEE, 2016.
conference:
  end_date: 2016-09-22
  location: 'Buenos Aires, Argentina '
  name: 'CCA: Control Applications '
  start_date: 2016-09-19
date_created: 2018-12-11T11:50:20Z
date_published: 2016-10-10T00:00:00Z
date_updated: 2021-01-12T06:48:32Z
day: '10'
department:
- _id: ToHe
doi: 10.1109/CCA.2016.7587948
language:
- iso: eng
month: '10'
oa_version: None
publication: 2016 IEEE Conference on Control Applications
publication_status: published
publisher: IEEE
publist_id: '6224'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'Tutorial: Software tools for hybrid systems verification transformation and
  synthesis C2E2 HyST and TuLiP'
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2016'
...
---
_id: '1135'
abstract:
- lang: eng
  text: 'Time-triggered (TT) switched networks are a deterministic communication infrastructure
    used by real-time distributed embedded systems. These networks rely on the notion
    of globally discretized time (i.e. time slots) and a static TT schedule that prescribes
    which message is sent through which link at every time slot, such that all messages
    reach their destination before a global timeout. These schedules are generated
    offline, assuming a static network with fault-free links, and entrusting all error-handling
    functions to the end user. Assuming the network is static is an over-optimistic
    view, and indeed links tend to fail in practice. We study synthesis of TT schedules
    on a network in which links fail over time and we assume the switches run a very
    simple error-recovery protocol once they detect a crashed link. We address the
    problem of finding a pk; qresistant schedule; namely, one that, assuming the switches
    run a fixed error-recovery protocol, guarantees that the number of messages that
    arrive at their destination by the timeout is at least no matter what sequence
    of at most k links fail. Thus, we maintain the simplicity of the switches while
    giving a guarantee on the number of messages that meet the timeout. We show how
    a pk; q-resistant schedule can be obtained using a CEGAR-like approach: find a
    schedule, decide whether it is pk; q-resistant, and if it is not, use the witnessing
    fault sequence to generate a constraint that is added to the program. The newly
    added constraint disallows the schedule to be regenerated in a future iteration
    while also eliminating several other schedules that are not pk; q-resistant. We
    illustrate the applicability of our approach using an SMT-based implementation.
    © 2016 ACM.'
article_number: '26'
author:
- first_name: Guy
  full_name: Avni, Guy
  id: 463C8BC2-F248-11E8-B48F-1D18A9856A87
  last_name: Avni
  orcid: 0000-0001-5588-8287
- first_name: Shibashis
  full_name: Guha, Shibashis
  last_name: Guha
- first_name: Guillermo
  full_name: Rodríguez Navas, Guillermo
  last_name: Rodríguez Navas
citation:
  ama: 'Avni G, Guha S, Rodríguez Navas G. Synthesizing time triggered schedules for
    switched networks with faulty links. In: <i>Proceedings of the 13th International
    Conference on Embedded Software </i>. ACM; 2016. doi:<a href="https://doi.org/10.1145/2968478.2968499">10.1145/2968478.2968499</a>'
  apa: 'Avni, G., Guha, S., &#38; Rodríguez Navas, G. (2016). Synthesizing time triggered
    schedules for switched networks with faulty links. In <i>Proceedings of the 13th
    International Conference on Embedded Software </i>. Pittsburgh, PA, USA: ACM.
    <a href="https://doi.org/10.1145/2968478.2968499">https://doi.org/10.1145/2968478.2968499</a>'
  chicago: Avni, Guy, Shibashis Guha, and Guillermo Rodríguez Navas. “Synthesizing
    Time Triggered Schedules for Switched Networks with Faulty Links.” In <i>Proceedings
    of the 13th International Conference on Embedded Software </i>. ACM, 2016. <a
    href="https://doi.org/10.1145/2968478.2968499">https://doi.org/10.1145/2968478.2968499</a>.
  ieee: G. Avni, S. Guha, and G. Rodríguez Navas, “Synthesizing time triggered schedules
    for switched networks with faulty links,” in <i>Proceedings of the 13th International
    Conference on Embedded Software </i>, Pittsburgh, PA, USA, 2016.
  ista: 'Avni G, Guha S, Rodríguez Navas G. 2016. Synthesizing time triggered schedules
    for switched networks with faulty links. Proceedings of the 13th International
    Conference on Embedded Software . EMSOFT: Embedded Software , 26.'
  mla: Avni, Guy, et al. “Synthesizing Time Triggered Schedules for Switched Networks
    with Faulty Links.” <i>Proceedings of the 13th International Conference on Embedded
    Software </i>, 26, ACM, 2016, doi:<a href="https://doi.org/10.1145/2968478.2968499">10.1145/2968478.2968499</a>.
  short: G. Avni, S. Guha, G. Rodríguez Navas, in:, Proceedings of the 13th International
    Conference on Embedded Software , ACM, 2016.
conference:
  end_date: 2016-10-07
  location: Pittsburgh, PA, USA
  name: 'EMSOFT: Embedded Software '
  start_date: 2016-10-01
date_created: 2018-12-11T11:50:20Z
date_published: 2016-10-01T00:00:00Z
date_updated: 2021-01-12T06:48:33Z
day: '01'
ddc:
- '000'
department:
- _id: ToHe
doi: 10.1145/2968478.2968499
ec_funded: 1
file:
- access_level: open_access
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:09:31Z
  date_updated: 2018-12-12T10:09:31Z
  file_id: '4755'
  file_name: IST-2016-644-v1+1_emsoft-no-format.pdf
  file_size: 279240
  relation: main_file
file_date_updated: 2018-12-12T10:09:31Z
has_accepted_license: '1'
language:
- iso: eng
month: '10'
oa: 1
oa_version: Submitted Version
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication: 'Proceedings of the 13th International Conference on Embedded Software '
publication_status: published
publisher: ACM
publist_id: '6223'
pubrep_id: '644'
quality_controlled: '1'
scopus_import: 1
status: public
title: Synthesizing time triggered schedules for switched networks with faulty links
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2016'
...
---
_id: '1138'
abstract:
- lang: eng
  text: Automata with monitor counters, where the transitions do not depend on counter
    values, and nested weighted automata are two expressive automata-theoretic frameworks
    for quantitative properties. For a well-studied and wide class of quantitative
    functions, we establish that automata with monitor counters and nested weighted
    automata are equivalent. We study for the first time such quantitative automata
    under probabilistic semantics. We show that several problems that are undecidable
    for the classical questions of emptiness and universality become decidable under
    the probabilistic semantics. We present a complete picture of decidability for
    such automata, and even an almost-complete picture of computational complexity,
    for the probabilistic questions we consider. © 2016 ACM.
acknowledgement: This research was funded in part by the European Research Council
  (ERC) under grant agreement 267989 (QUAREM), by the Austrian Science Fund (FWF)
  projects S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award), FWF Grant No P23499-
  N23, FWF NFN Grant No S114
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Jan
  full_name: Otop, Jan
  id: 2FC5DA74-F248-11E8-B48F-1D18A9856A87
  last_name: Otop
citation:
  ama: 'Chatterjee K, Henzinger TA, Otop J. Quantitative automata under probabilistic
    semantics. In: <i>Proceedings of the 31st Annual ACM/IEEE Symposium</i>. IEEE;
    2016:76-85. doi:<a href="https://doi.org/10.1145/2933575.2933588">10.1145/2933575.2933588</a>'
  apa: 'Chatterjee, K., Henzinger, T. A., &#38; Otop, J. (2016). Quantitative automata
    under probabilistic semantics. In <i>Proceedings of the 31st Annual ACM/IEEE Symposium</i>
    (pp. 76–85). New York, NY, USA: IEEE. <a href="https://doi.org/10.1145/2933575.2933588">https://doi.org/10.1145/2933575.2933588</a>'
  chicago: Chatterjee, Krishnendu, Thomas A Henzinger, and Jan Otop. “Quantitative
    Automata under Probabilistic Semantics.” In <i>Proceedings of the 31st Annual
    ACM/IEEE Symposium</i>, 76–85. IEEE, 2016. <a href="https://doi.org/10.1145/2933575.2933588">https://doi.org/10.1145/2933575.2933588</a>.
  ieee: K. Chatterjee, T. A. Henzinger, and J. Otop, “Quantitative automata under
    probabilistic semantics,” in <i>Proceedings of the 31st Annual ACM/IEEE Symposium</i>,
    New York, NY, USA, 2016, pp. 76–85.
  ista: 'Chatterjee K, Henzinger TA, Otop J. 2016. Quantitative automata under probabilistic
    semantics. Proceedings of the 31st Annual ACM/IEEE Symposium. LICS: Logic in Computer
    Science, 76–85.'
  mla: Chatterjee, Krishnendu, et al. “Quantitative Automata under Probabilistic Semantics.”
    <i>Proceedings of the 31st Annual ACM/IEEE Symposium</i>, IEEE, 2016, pp. 76–85,
    doi:<a href="https://doi.org/10.1145/2933575.2933588">10.1145/2933575.2933588</a>.
  short: K. Chatterjee, T.A. Henzinger, J. Otop, in:, Proceedings of the 31st Annual
    ACM/IEEE Symposium, IEEE, 2016, pp. 76–85.
conference:
  end_date: 2016-07-08
  location: New York, NY, USA
  name: 'LICS: Logic in Computer Science'
  start_date: 2016-07-05
date_created: 2018-12-11T11:50:21Z
date_published: 2016-07-05T00:00:00Z
date_updated: 2021-01-12T06:48:34Z
day: '05'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1145/2933575.2933588
ec_funded: 1
external_id:
  arxiv:
  - '1604.06764'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1604.06764
month: '07'
oa: 1
oa_version: Preprint
page: 76 - 85
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
publication: Proceedings of the 31st Annual ACM/IEEE Symposium
publication_status: published
publisher: IEEE
publist_id: '6220'
quality_controlled: '1'
scopus_import: 1
status: public
title: Quantitative automata under probabilistic semantics
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2016'
...
---
_id: '1148'
abstract:
- lang: eng
  text: Continuous-time Markov chain (CTMC) models have become a central tool for
    understanding the dynamics of complex reaction networks and the importance of
    stochasticity in the underlying biochemical processes. When such models are employed
    to answer questions in applications, in order to ensure that the model provides
    a sufficiently accurate representation of the real system, it is of vital importance
    that the model parameters are inferred from real measured data. This, however,
    is often a formidable task and all of the existing methods fail in one case or
    the other, usually because the underlying CTMC model is high-dimensional and computationally
    difficult to analyze. The parameter inference methods that tend to scale best
    in the dimension of the CTMC are based on so-called moment closure approximations.
    However, there exists a large number of different moment closure approximations
    and it is typically hard to say a priori which of the approximations is the most
    suitable for the inference procedure. Here, we propose a moment-based parameter
    inference method that automatically chooses the most appropriate moment closure
    method. Accordingly, contrary to existing methods, the user is not required to
    be experienced in moment closure techniques. In addition to that, our method adaptively
    changes the approximation during the parameter inference to ensure that always
    the best approximation is used, even in cases where different approximations are
    best in different regions of the parameter space. © 2016 Elsevier Ireland Ltd
acknowledgement: This work is based on the CMSB 2015 paper “Adaptive moment closure
  for parameter inference of biochemical reaction networks” (Bogomolov et al., 2015).
  The work was partly supported by the German Research Foundation (DFG) as part of
  the Transregional Collaborative Research Center “Automatic Verification and Analysis
  of Complex Systems” (SFB/TR 14 AVACS1), by the European Research Council (ERC) under
  grant 267989 (QUAREM) and by the Austrian Science Fund (FWF) under grants S11402-N23
  (RiSE) and Z211-N23 (Wittgenstein Award). J.R. acknowledges support from the People
  Programme (Marie Curie Actions) of the European Union's Seventh Framework Programme
  (FP7/2007-2013) under REA grant agreement no. 291734.
author:
- first_name: Christian
  full_name: Schilling, Christian
  last_name: Schilling
- first_name: Sergiy
  full_name: Bogomolov, Sergiy
  id: 369D9A44-F248-11E8-B48F-1D18A9856A87
  last_name: Bogomolov
  orcid: 0000-0002-0686-0365
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Andreas
  full_name: Podelski, Andreas
  last_name: Podelski
- first_name: Jakob
  full_name: Ruess, Jakob
  id: 4A245D00-F248-11E8-B48F-1D18A9856A87
  last_name: Ruess
  orcid: 0000-0003-1615-3282
citation:
  ama: Schilling C, Bogomolov S, Henzinger TA, Podelski A, Ruess J. Adaptive moment
    closure for parameter inference of biochemical reaction networks. <i>Biosystems</i>.
    2016;149:15-25. doi:<a href="https://doi.org/10.1016/j.biosystems.2016.07.005">10.1016/j.biosystems.2016.07.005</a>
  apa: Schilling, C., Bogomolov, S., Henzinger, T. A., Podelski, A., &#38; Ruess,
    J. (2016). Adaptive moment closure for parameter inference of biochemical reaction
    networks. <i>Biosystems</i>. Elsevier. <a href="https://doi.org/10.1016/j.biosystems.2016.07.005">https://doi.org/10.1016/j.biosystems.2016.07.005</a>
  chicago: Schilling, Christian, Sergiy Bogomolov, Thomas A Henzinger, Andreas Podelski,
    and Jakob Ruess. “Adaptive Moment Closure for Parameter Inference of Biochemical
    Reaction Networks.” <i>Biosystems</i>. Elsevier, 2016. <a href="https://doi.org/10.1016/j.biosystems.2016.07.005">https://doi.org/10.1016/j.biosystems.2016.07.005</a>.
  ieee: C. Schilling, S. Bogomolov, T. A. Henzinger, A. Podelski, and J. Ruess, “Adaptive
    moment closure for parameter inference of biochemical reaction networks,” <i>Biosystems</i>,
    vol. 149. Elsevier, pp. 15–25, 2016.
  ista: Schilling C, Bogomolov S, Henzinger TA, Podelski A, Ruess J. 2016. Adaptive
    moment closure for parameter inference of biochemical reaction networks. Biosystems.
    149, 15–25.
  mla: Schilling, Christian, et al. “Adaptive Moment Closure for Parameter Inference
    of Biochemical Reaction Networks.” <i>Biosystems</i>, vol. 149, Elsevier, 2016,
    pp. 15–25, doi:<a href="https://doi.org/10.1016/j.biosystems.2016.07.005">10.1016/j.biosystems.2016.07.005</a>.
  short: C. Schilling, S. Bogomolov, T.A. Henzinger, A. Podelski, J. Ruess, Biosystems
    149 (2016) 15–25.
date_created: 2018-12-11T11:50:24Z
date_published: 2016-11-01T00:00:00Z
date_updated: 2023-02-23T10:08:46Z
day: '01'
department:
- _id: ToHe
- _id: GaTk
doi: 10.1016/j.biosystems.2016.07.005
ec_funded: 1
intvolume: '       149'
language:
- iso: eng
month: '11'
oa_version: None
page: 15 - 25
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
- _id: 25681D80-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '291734'
  name: International IST Postdoc Fellowship Programme
publication: Biosystems
publication_status: published
publisher: Elsevier
publist_id: '6210'
quality_controlled: '1'
related_material:
  record:
  - id: '1658'
    relation: earlier_version
    status: public
scopus_import: 1
status: public
title: Adaptive moment closure for parameter inference of biochemical reaction networks
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 149
year: '2016'
...
---
_id: '1166'
abstract:
- lang: eng
  text: POMDPs are standard models for probabilistic planning problems, where an agent
    interacts with an uncertain environment. We study the problem of almost-sure reachability,
    where given a set of target states, the question is to decide whether there is
    a policy to ensure that the target set is reached with probability 1 (almost-surely).
    While in general the problem is EXPTIMEcomplete, in many practical cases policies
    with a small amount of memory suffice. Moreover, the existing solution to the
    problem is explicit, which first requires to construct explicitly an exponential
    reduction to a belief-support MDP. In this work, we first study the existence
    of observation-stationary strategies, which is NP-complete, and then small-memory
    strategies. We present a symbolic algorithm by an efficient encoding to SAT and
    using a SAT solver for the problem. We report experimental results demonstrating
    the scalability of our symbolic (SAT-based) approach. © 2016, Association for
    the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Martin
  full_name: Chmelik, Martin
  id: 3624234E-F248-11E8-B48F-1D18A9856A87
  last_name: Chmelik
- first_name: Jessica
  full_name: Davies, Jessica
  id: 378E0060-F248-11E8-B48F-1D18A9856A87
  last_name: Davies
citation:
  ama: 'Chatterjee K, Chmelik M, Davies J. A symbolic SAT based algorithm for almost
    sure reachability with small strategies in pomdps. In: <i>Proceedings of the Thirtieth
    AAAI Conference on Artificial Intelligence</i>. Vol 2016. AAAI Press; 2016:3225-3232.'
  apa: 'Chatterjee, K., Chmelik, M., &#38; Davies, J. (2016). A symbolic SAT based
    algorithm for almost sure reachability with small strategies in pomdps. In <i>Proceedings
    of the Thirtieth AAAI Conference on Artificial Intelligence</i> (Vol. 2016, pp.
    3225–3232). Phoenix, AZ, USA: AAAI Press.'
  chicago: Chatterjee, Krishnendu, Martin Chmelik, and Jessica Davies. “A Symbolic
    SAT Based Algorithm for Almost Sure Reachability with Small Strategies in Pomdps.”
    In <i>Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence</i>,
    2016:3225–32. AAAI Press, 2016.
  ieee: K. Chatterjee, M. Chmelik, and J. Davies, “A symbolic SAT based algorithm
    for almost sure reachability with small strategies in pomdps,” in <i>Proceedings
    of the Thirtieth AAAI Conference on Artificial Intelligence</i>, Phoenix, AZ,
    USA, 2016, vol. 2016, pp. 3225–3232.
  ista: 'Chatterjee K, Chmelik M, Davies J. 2016. A symbolic SAT based algorithm for
    almost sure reachability with small strategies in pomdps. Proceedings of the Thirtieth
    AAAI Conference on Artificial Intelligence. AAAI: Conference on Artificial Intelligence
    vol. 2016, 3225–3232.'
  mla: Chatterjee, Krishnendu, et al. “A Symbolic SAT Based Algorithm for Almost Sure
    Reachability with Small Strategies in Pomdps.” <i>Proceedings of the Thirtieth
    AAAI Conference on Artificial Intelligence</i>, vol. 2016, AAAI Press, 2016, pp.
    3225–32.
  short: K. Chatterjee, M. Chmelik, J. Davies, in:, Proceedings of the Thirtieth AAAI
    Conference on Artificial Intelligence, AAAI Press, 2016, pp. 3225–3232.
conference:
  end_date: 2016-02-17
  location: Phoenix, AZ, USA
  name: 'AAAI: Conference on Artificial Intelligence'
  start_date: 2016-02-12
date_created: 2018-12-11T11:50:30Z
date_published: 2016-12-02T00:00:00Z
date_updated: 2023-02-23T12:26:41Z
day: '02'
department:
- _id: KrCh
- _id: ToHe
ec_funded: 1
intvolume: '      2016'
language:
- iso: eng
month: '12'
oa_version: None
page: 3225 - 3232
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
publication: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence
publication_status: published
publisher: AAAI Press
publist_id: '6191'
quality_controlled: '1'
related_material:
  link:
  - relation: table_of_contents
    url: https://dl.acm.org/citation.cfm?id=3016355
  record:
  - id: '5443'
    relation: earlier_version
    status: public
status: public
title: A symbolic SAT based algorithm for almost sure reachability with small strategies
  in pomdps
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 2016
year: '2016'
...
