---
_id: '1439'
abstract:
- lang: eng
  text: Fault-tolerant distributed algorithms play an important role in many critical/high-availability
    applications. These algorithms are notoriously difficult to implement correctly,
    due to asynchronous communication and the occurrence of faults, such as the network
    dropping messages or computers crashing. We introduce PSYNC, a domain specific
    language based on the Heard-Of model, which views asynchronous faulty systems
    as synchronous ones with an adversarial environment that simulates asynchrony
    and faults by dropping messages. We define a runtime system for PSYNC that efficiently
    executes on asynchronous networks. We formalize the relation between the runtime
    system and PSYNC in terms of observational refinement. The high-level lockstep
    abstraction introduced by PSYNC simplifies the design and implementation of fault-tolerant
    distributed algorithms and enables automated formal verification. We have implemented
    an embedding of PSYNC in the SCALA programming language with a runtime system
    for asynchronous networks. We show the applicability of PSYNC by implementing
    several important fault-tolerant distributed algorithms and we compare the implementation
    of consensus algorithms in PSYNC against implementations in other languages in
    terms of code size, runtime efficiency, and verification.
acknowledgement: 'Damien Zufferey was supported by DARPA (Grants FA8650-11-C-7192
  and FA8650-15-C-7564) and NSF (Grant CCF-1138967). '
alternative_title:
- ACM SIGPLAN Notices
author:
- first_name: Cezara
  full_name: Dragoi, Cezara
  id: 2B2B5ED0-F248-11E8-B48F-1D18A9856A87
  last_name: Dragoi
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Dragoi C, Henzinger TA, Zufferey D. PSYNC: A partially synchronous language
    for fault-tolerant distributed algorithms. In: Vol 20-22. ACM; 2016:400-415. doi:<a
    href="https://doi.org/10.1145/2837614.2837650">10.1145/2837614.2837650</a>'
  apa: 'Dragoi, C., Henzinger, T. A., &#38; Zufferey, D. (2016). PSYNC: A partially
    synchronous language for fault-tolerant distributed algorithms (Vol. 20–22, pp.
    400–415). Presented at the POPL: Principles of Programming Languages, St. Petersburg,
    FL, USA: ACM. <a href="https://doi.org/10.1145/2837614.2837650">https://doi.org/10.1145/2837614.2837650</a>'
  chicago: 'Dragoi, Cezara, Thomas A Henzinger, and Damien Zufferey. “PSYNC: A Partially
    Synchronous Language for Fault-Tolerant Distributed Algorithms,” 20–22:400–415.
    ACM, 2016. <a href="https://doi.org/10.1145/2837614.2837650">https://doi.org/10.1145/2837614.2837650</a>.'
  ieee: 'C. Dragoi, T. A. Henzinger, and D. Zufferey, “PSYNC: A partially synchronous
    language for fault-tolerant distributed algorithms,” presented at the POPL: Principles
    of Programming Languages, St. Petersburg, FL, USA, 2016, vol. 20–22, pp. 400–415.'
  ista: 'Dragoi C, Henzinger TA, Zufferey D. 2016. PSYNC: A partially synchronous
    language for fault-tolerant distributed algorithms. POPL: Principles of Programming
    Languages, ACM SIGPLAN Notices, vol. 20–22, 400–415.'
  mla: 'Dragoi, Cezara, et al. <i>PSYNC: A Partially Synchronous Language for Fault-Tolerant
    Distributed Algorithms</i>. Vol. 20–22, ACM, 2016, pp. 400–15, doi:<a href="https://doi.org/10.1145/2837614.2837650">10.1145/2837614.2837650</a>.'
  short: C. Dragoi, T.A. Henzinger, D. Zufferey, in:, ACM, 2016, pp. 400–415.
conference:
  end_date: 2016-01-22
  location: St. Petersburg, FL, USA
  name: 'POPL: Principles of Programming Languages'
  start_date: 2016-01-20
date_created: 2018-12-11T11:52:01Z
date_published: 2016-01-11T00:00:00Z
date_updated: 2021-01-12T06:50:45Z
day: '11'
department:
- _id: ToHe
doi: 10.1145/2837614.2837650
ec_funded: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://hal.inria.fr/hal-01251199/
month: '01'
oa: 1
oa_version: Preprint
page: 400 - 415
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication_status: published
publisher: ACM
publist_id: '5759'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'PSYNC: A partially synchronous language for fault-tolerant distributed algorithms'
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 20-22
year: '2016'
...
---
_id: '1498'
abstract:
- lang: eng
  text: Fault-tolerant distributed algorithms play an important role in many critical/high-availability
    applications. These algorithms are notoriously difficult to implement correctly,
    due to asynchronous communication and the occurrence of faults, such as the network
    dropping messages or computers crashing. Nonetheless there is surprisingly little
    language and verification support to build distributed systems based on fault-tolerant
    algorithms. In this paper, we present some of the challenges that a designer has
    to overcome to implement a fault-tolerant distributed system. Then we review different
    models that have been proposed to reason about distributed algorithms and sketch
    how such a model can form the basis for a domain-specific programming language.
    Adopting a high-level programming model can simplify the programmer's life and
    make the code amenable to automated verification, while still compiling to efficiently
    executable code. We conclude by summarizing the current status of an ongoing language
    design and implementation project that is based on this idea.
alternative_title:
- LIPIcs
author:
- first_name: Cezara
  full_name: Dragoi, Cezara
  id: 2B2B5ED0-F248-11E8-B48F-1D18A9856A87
  last_name: Dragoi
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: Dragoi C, Henzinger TA, Zufferey D. The need for language support for fault-tolerant
    distributed systems. 2015;32:90-102. doi:<a href="https://doi.org/10.4230/LIPIcs.SNAPL.2015.90">10.4230/LIPIcs.SNAPL.2015.90</a>
  apa: 'Dragoi, C., Henzinger, T. A., &#38; Zufferey, D. (2015). The need for language
    support for fault-tolerant distributed systems. Presented at the SNAPL: Summit
    oN Advances in Programming Languages, Asilomar, CA, United States: Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.SNAPL.2015.90">https://doi.org/10.4230/LIPIcs.SNAPL.2015.90</a>'
  chicago: Dragoi, Cezara, Thomas A Henzinger, and Damien Zufferey. “The Need for
    Language Support for Fault-Tolerant Distributed Systems.” Leibniz International
    Proceedings in Informatics. Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2015. <a href="https://doi.org/10.4230/LIPIcs.SNAPL.2015.90">https://doi.org/10.4230/LIPIcs.SNAPL.2015.90</a>.
  ieee: C. Dragoi, T. A. Henzinger, and D. Zufferey, “The need for language support
    for fault-tolerant distributed systems,” vol. 32. Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, pp. 90–102, 2015.
  ista: Dragoi C, Henzinger TA, Zufferey D. 2015. The need for language support for
    fault-tolerant distributed systems. 32, 90–102.
  mla: Dragoi, Cezara, et al. <i>The Need for Language Support for Fault-Tolerant
    Distributed Systems</i>. Vol. 32, Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2015, pp. 90–102, doi:<a href="https://doi.org/10.4230/LIPIcs.SNAPL.2015.90">10.4230/LIPIcs.SNAPL.2015.90</a>.
  short: C. Dragoi, T.A. Henzinger, D. Zufferey, 32 (2015) 90–102.
conference:
  end_date: 2015-05-06
  location: Asilomar, CA, United States
  name: 'SNAPL: Summit oN Advances in Programming Languages'
  start_date: 2015-05-03
date_created: 2018-12-11T11:52:22Z
date_published: 2015-01-01T00:00:00Z
date_updated: 2020-08-11T10:09:14Z
day: '01'
ddc:
- '005'
department:
- _id: ToHe
doi: 10.4230/LIPIcs.SNAPL.2015.90
ec_funded: 1
file:
- access_level: open_access
  checksum: cf5e94baa89a2dc4c5de01abc676eda8
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:14:02Z
  date_updated: 2020-07-14T12:44:58Z
  file_id: '5050'
  file_name: IST-2016-499-v1+1_9.pdf
  file_size: 489362
  relation: main_file
file_date_updated: 2020-07-14T12:44:58Z
has_accepted_license: '1'
intvolume: '        32'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Published Version
page: 90 - 102
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: The Wittgenstein Prize
publication_identifier:
  isbn:
  - '978-3-939897-80-4 '
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '5681'
pubrep_id: '499'
quality_controlled: '1'
scopus_import: 1
series_title: Leibniz International Proceedings in Informatics
status: public
title: The need for language support for fault-tolerant distributed systems
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 32
year: '2015'
...
---
_id: '1392'
abstract:
- lang: eng
  text: Fault-tolerant distributed algorithms play an important role in ensuring the
    reliability of many software applications. In this paper we consider distributed
    algorithms whose computations are organized in rounds. To verify the correctness
    of such algorithms, we reason about (i) properties (such as invariants) of the
    state, (ii) the transitions controlled by the algorithm, and (iii) the communication
    graph. We introduce a logic that addresses these points, and contains set comprehensions
    with cardinality constraints, function symbols to describe the local states of
    each process, and a limited form of quantifier alternation to express the verification
    conditions. We show its use in automating the verification of consensus algorithms.
    In particular, we give a semi-decision procedure for the unsatisfiability problem
    of the logic and identify a decidable fragment. We successfully applied our framework
    to verify the correctness of a variety of consensus algorithms tolerant to both
    benign faults (message loss, process crashes) and value faults (message corruption).
acknowledgement: Supported by the Vienna Science and Technology Fund (WWTF) through
  grant PROSEED.
alternative_title:
- LNCS
author:
- first_name: Cezara
  full_name: Dragoi, Cezara
  id: 2B2B5ED0-F248-11E8-B48F-1D18A9856A87
  last_name: Dragoi
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Helmut
  full_name: Veith, Helmut
  last_name: Veith
- first_name: Josef
  full_name: Widder, Josef
  last_name: Widder
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Dragoi C, Henzinger TA, Veith H, Widder J, Zufferey D. A logic-based framework
    for verifying consensus algorithms. In: Vol 8318. Springer; 2014:161-181. doi:<a
    href="https://doi.org/10.1007/978-3-642-54013-4_10">10.1007/978-3-642-54013-4_10</a>'
  apa: 'Dragoi, C., Henzinger, T. A., Veith, H., Widder, J., &#38; Zufferey, D. (2014).
    A logic-based framework for verifying consensus algorithms (Vol. 8318, pp. 161–181).
    Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation,
    San Diego, USA: Springer. <a href="https://doi.org/10.1007/978-3-642-54013-4_10">https://doi.org/10.1007/978-3-642-54013-4_10</a>'
  chicago: Dragoi, Cezara, Thomas A Henzinger, Helmut Veith, Josef Widder, and Damien
    Zufferey. “A Logic-Based Framework for Verifying Consensus Algorithms,” 8318:161–81.
    Springer, 2014. <a href="https://doi.org/10.1007/978-3-642-54013-4_10">https://doi.org/10.1007/978-3-642-54013-4_10</a>.
  ieee: 'C. Dragoi, T. A. Henzinger, H. Veith, J. Widder, and D. Zufferey, “A logic-based
    framework for verifying consensus algorithms,” presented at the VMCAI: Verification,
    Model Checking and Abstract Interpretation, San Diego, USA, 2014, vol. 8318, pp.
    161–181.'
  ista: 'Dragoi C, Henzinger TA, Veith H, Widder J, Zufferey D. 2014. A logic-based
    framework for verifying consensus algorithms. VMCAI: Verification, Model Checking
    and Abstract Interpretation, LNCS, vol. 8318, 161–181.'
  mla: Dragoi, Cezara, et al. <i>A Logic-Based Framework for Verifying Consensus Algorithms</i>.
    Vol. 8318, Springer, 2014, pp. 161–81, doi:<a href="https://doi.org/10.1007/978-3-642-54013-4_10">10.1007/978-3-642-54013-4_10</a>.
  short: C. Dragoi, T.A. Henzinger, H. Veith, J. Widder, D. Zufferey, in:, Springer,
    2014, pp. 161–181.
conference:
  end_date: 2014-01-21
  location: San Diego, USA
  name: 'VMCAI: Verification, Model Checking and Abstract Interpretation'
  start_date: 2014-01-19
date_created: 2018-12-11T11:51:45Z
date_published: 2014-01-01T00:00:00Z
date_updated: 2021-01-12T06:50:22Z
day: '01'
ddc:
- '000'
- '005'
department:
- _id: ToHe
doi: 10.1007/978-3-642-54013-4_10
ec_funded: 1
file:
- access_level: open_access
  checksum: bffa33d39be77df0da39defe97eabf84
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:11:06Z
  date_updated: 2020-07-14T12:44:48Z
  file_id: '4859'
  file_name: IST-2014-179-v1+1_vmcai14.pdf
  file_size: 444138
  relation: main_file
file_date_updated: 2020-07-14T12:44:48Z
has_accepted_license: '1'
intvolume: '      8318'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 161 - 181
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication_status: published
publisher: Springer
publist_id: '5817'
pubrep_id: '179'
quality_controlled: '1'
scopus_import: 1
status: public
title: A logic-based framework for verifying consensus algorithms
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8318
year: '2014'
...
---
_id: '2447'
abstract:
- lang: eng
  text: "Separation logic (SL) has gained widespread popularity because of its ability
    to succinctly express complex invariants of a program’s heap configurations. Several
    specialized provers have been developed for decidable SL fragments. However, these
    provers cannot be easily extended or combined with solvers for other theories
    that are important in program verification, e.g., linear arithmetic. In this paper,
    we present a reduction of decidable SL fragments to a decidable first-order theory
    that fits well into the satisfiability modulo theories (SMT) framework. We show
    how to use this reduction to automate satisfiability, entailment, frame inference,
    and abduction problems for separation logic using SMT solvers. Our approach provides
    a simple method of integrating separation logic into existing verification tools
    that provide SMT backends, and an elegant way of combining SL fragments with other
    decidable first-order theories. We implemented this approach in a verification
    tool and applied it to heap-manipulating programs whose verification involves
    reasoning in theory combinations.\r\n"
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Ruzica
  full_name: Piskac, Ruzica
  last_name: Piskac
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: Piskac R, Wies T, Zufferey D. Automating separation logic using SMT. 2013;8044:773-789.
    doi:<a href="https://doi.org/10.1007/978-3-642-39799-8_54">10.1007/978-3-642-39799-8_54</a>
  apa: 'Piskac, R., Wies, T., &#38; Zufferey, D. (2013). Automating separation logic
    using SMT. Presented at the CAV: Computer Aided Verification, St. Petersburg,
    Russia: Springer. <a href="https://doi.org/10.1007/978-3-642-39799-8_54">https://doi.org/10.1007/978-3-642-39799-8_54</a>'
  chicago: Piskac, Ruzica, Thomas Wies, and Damien Zufferey. “Automating Separation
    Logic Using SMT.” Lecture Notes in Computer Science. Springer, 2013. <a href="https://doi.org/10.1007/978-3-642-39799-8_54">https://doi.org/10.1007/978-3-642-39799-8_54</a>.
  ieee: R. Piskac, T. Wies, and D. Zufferey, “Automating separation logic using SMT,”
    vol. 8044. Springer, pp. 773–789, 2013.
  ista: Piskac R, Wies T, Zufferey D. 2013. Automating separation logic using SMT.
    8044, 773–789.
  mla: Piskac, Ruzica, et al. <i>Automating Separation Logic Using SMT</i>. Vol. 8044,
    Springer, 2013, pp. 773–89, doi:<a href="https://doi.org/10.1007/978-3-642-39799-8_54">10.1007/978-3-642-39799-8_54</a>.
  short: R. Piskac, T. Wies, D. Zufferey, 8044 (2013) 773–789.
conference:
  end_date: 2013-07-19
  location: St. Petersburg, Russia
  name: 'CAV: Computer Aided Verification'
  start_date: 2013-07-13
date_created: 2018-12-11T11:57:43Z
date_published: 2013-07-01T00:00:00Z
date_updated: 2020-08-11T10:09:47Z
day: '01'
ddc:
- '000'
department:
- _id: ToHe
doi: 10.1007/978-3-642-39799-8_54
file:
- access_level: open_access
  checksum: 2e866932ab688f47ecd504acb4d5c7d4
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-15T11:13:01Z
  date_updated: 2020-07-14T12:45:41Z
  file_id: '7859'
  file_name: 2013_CAV_Piskac.pdf
  file_size: 309182
  relation: main_file
file_date_updated: 2020-07-14T12:45:41Z
has_accepted_license: '1'
intvolume: '      8044'
language:
- iso: eng
month: '07'
oa: 1
oa_version: Submitted Version
page: 773 - 789
publication_status: published
publisher: Springer
publist_id: '4456'
quality_controlled: '1'
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: Automating separation logic using SMT
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8044
year: '2013'
...
---
_id: '2847'
abstract:
- lang: eng
  text: Depth-Bounded Systems form an expressive class of well-structured transition
    systems. They can model a wide range of concurrent infinite-state systems including
    those with dynamic thread creation, dynamically changing communication topology,
    and complex shared heap structures. We present the first method to automatically
    prove fair termination of depth-bounded systems. Our method uses a numerical abstraction
    of the system, which we obtain by systematically augmenting an over-approximation
    of the system’s reachable states with a finite set of counters. This numerical
    abstraction can be analyzed with existing termination provers. What makes our
    approach unique is the way in which it exploits the well-structuredness of the
    analyzed system. We have implemented our work in a prototype tool and used it
    to automatically prove liveness properties of complex concurrent systems, including
    nonblocking algorithms such as Treiber’s stack and several distributed processes.
    Many of these examples are beyond the scope of termination analyses that are based
    on traditional counter abstractions.
alternative_title:
- LNCS
author:
- first_name: Kshitij
  full_name: Bansal, Kshitij
  last_name: Bansal
- first_name: Eric
  full_name: Koskinen, Eric
  last_name: Koskinen
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: Bansal K, Koskinen E, Wies T, Zufferey D. Structural Counter Abstraction. Piterman
    N, Smolka S, eds. 2013;7795:62-77. doi:<a href="https://doi.org/10.1007/978-3-642-36742-7_5">10.1007/978-3-642-36742-7_5</a>
  apa: 'Bansal, K., Koskinen, E., Wies, T., &#38; Zufferey, D. (2013). Structural
    Counter Abstraction. (N. Piterman &#38; S. Smolka, Eds.). Presented at the TACAS:
    Tools and Algorithms for the Construction and Analysis of Systems, Rome, Italy:
    Springer. <a href="https://doi.org/10.1007/978-3-642-36742-7_5">https://doi.org/10.1007/978-3-642-36742-7_5</a>'
  chicago: Bansal, Kshitij, Eric Koskinen, Thomas Wies, and Damien Zufferey. “Structural
    Counter Abstraction.” Edited by Nir Piterman and Scott Smolka. Lecture Notes in
    Computer Science. Springer, 2013. <a href="https://doi.org/10.1007/978-3-642-36742-7_5">https://doi.org/10.1007/978-3-642-36742-7_5</a>.
  ieee: K. Bansal, E. Koskinen, T. Wies, and D. Zufferey, “Structural Counter Abstraction,”
    vol. 7795. Springer, pp. 62–77, 2013.
  ista: Bansal K, Koskinen E, Wies T, Zufferey D. 2013. Structural Counter Abstraction
    (eds. N. Piterman &#38; S. Smolka). 7795, 62–77.
  mla: Bansal, Kshitij, et al. <i>Structural Counter Abstraction</i>. Edited by Nir
    Piterman and Scott Smolka, vol. 7795, Springer, 2013, pp. 62–77, doi:<a href="https://doi.org/10.1007/978-3-642-36742-7_5">10.1007/978-3-642-36742-7_5</a>.
  short: K. Bansal, E. Koskinen, T. Wies, D. Zufferey, 7795 (2013) 62–77.
conference:
  end_date: 2013-03-24
  location: Rome, Italy
  name: 'TACAS: Tools and Algorithms for the Construction and Analysis of Systems'
  start_date: 2013-03-16
date_created: 2018-12-11T11:59:54Z
date_published: 2013-03-01T00:00:00Z
date_updated: 2023-09-07T11:36:36Z
day: '01'
department:
- _id: ToHe
doi: 10.1007/978-3-642-36742-7_5
ec_funded: 1
editor:
- first_name: Nir
  full_name: Piterman, Nir
  last_name: Piterman
- first_name: Scott
  full_name: Smolka, Scott
  last_name: Smolka
intvolume: '      7795'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arise.or.at/pubpdf/Structural_Counter_Abstraction.pdf
month: '03'
oa: 1
oa_version: Submitted Version
page: 62 - 77
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication_status: published
publisher: Springer
publist_id: '3947'
quality_controlled: '1'
related_material:
  record:
  - id: '1405'
    relation: dissertation_contains
    status: public
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: Structural Counter Abstraction
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 7795
year: '2013'
...
---
_id: '2301'
abstract:
- lang: eng
  text: We describe the design and implementation of P, a domain-specific language
    to write asynchronous event driven code. P allows the programmer to specify the
    system as a collection of interacting state machines, which communicate with each
    other using events. P unifies modeling and programming into one activity for the
    programmer. Not only can a P program be compiled into executable code, but it
    can also be tested using model checking techniques. P allows the programmer to
    specify the environment, used to &quot;close&quot; the system during testing,
    as nondeterministic ghost machines. Ghost machines are erased during compilation
    to executable code; a type system ensures that the erasure is semantics preserving.
    The P language is designed so that a P program can be checked for responsiveness-the
    ability to handle every event in a timely manner. By default, a machine needs
    to handle every event that arrives in every state. But handling every event in
    every state is impractical. The language provides a notion of deferred events
    where the programmer can annotate when she wants to delay processing an event.
    The default safety checker looks for presence of unhan-dled events. The language
    also provides default liveness checks that an event cannot be potentially deferred
    forever. P was used to implement and verify the core of the USB device driver
    stack that ships with Microsoft Windows 8. The resulting driver is more reliable
    and performs better than its prior incarnation (which did not use P); we have
    more confidence in the robustness of its design due to the language abstractions
    and verification provided by P.
author:
- first_name: Ankush
  full_name: Desai, Ankush
  last_name: Desai
- first_name: Vivek
  full_name: Gupta, Vivek
  last_name: Gupta
- first_name: Ethan
  full_name: Jackson, Ethan
  last_name: Jackson
- first_name: Shaz
  full_name: Qadeer, Shaz
  last_name: Qadeer
- first_name: Sriram
  full_name: Rajamani, Sriram
  last_name: Rajamani
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Desai A, Gupta V, Jackson E, Qadeer S, Rajamani S, Zufferey D. P: Safe asynchronous
    event-driven programming. In: <i>Proceedings of the 34th ACM SIGPLAN Conference
    on Programming Language Design and Implementation</i>. ACM; 2013:321-331. doi:<a
    href="https://doi.org/10.1145/2491956.2462184">10.1145/2491956.2462184</a>'
  apa: 'Desai, A., Gupta, V., Jackson, E., Qadeer, S., Rajamani, S., &#38; Zufferey,
    D. (2013). P: Safe asynchronous event-driven programming. In <i>Proceedings of
    the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation</i>
    (pp. 321–331). Seattle, WA, United States: ACM. <a href="https://doi.org/10.1145/2491956.2462184">https://doi.org/10.1145/2491956.2462184</a>'
  chicago: 'Desai, Ankush, Vivek Gupta, Ethan Jackson, Shaz Qadeer, Sriram Rajamani,
    and Damien Zufferey. “P: Safe Asynchronous Event-Driven Programming.” In <i>Proceedings
    of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation</i>,
    321–31. ACM, 2013. <a href="https://doi.org/10.1145/2491956.2462184">https://doi.org/10.1145/2491956.2462184</a>.'
  ieee: 'A. Desai, V. Gupta, E. Jackson, S. Qadeer, S. Rajamani, and D. Zufferey,
    “P: Safe asynchronous event-driven programming,” in <i>Proceedings of the 34th
    ACM SIGPLAN Conference on Programming Language Design and Implementation</i>,
    Seattle, WA, United States, 2013, pp. 321–331.'
  ista: 'Desai A, Gupta V, Jackson E, Qadeer S, Rajamani S, Zufferey D. 2013. P: Safe
    asynchronous event-driven programming. Proceedings of the 34th ACM SIGPLAN Conference
    on Programming Language Design and Implementation. PLDI: Programming Languages
    Design and Implementation, 321–331.'
  mla: 'Desai, Ankush, et al. “P: Safe Asynchronous Event-Driven Programming.” <i>Proceedings
    of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation</i>,
    ACM, 2013, pp. 321–31, doi:<a href="https://doi.org/10.1145/2491956.2462184">10.1145/2491956.2462184</a>.'
  short: A. Desai, V. Gupta, E. Jackson, S. Qadeer, S. Rajamani, D. Zufferey, in:,
    Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design
    and Implementation, ACM, 2013, pp. 321–331.
conference:
  end_date: 2013-06-19
  location: Seattle, WA, United States
  name: 'PLDI: Programming Languages Design and Implementation'
  start_date: 2013-06-16
date_created: 2018-12-11T11:56:52Z
date_published: 2013-06-01T00:00:00Z
date_updated: 2021-01-12T06:56:38Z
day: '01'
department:
- _id: ToHe
doi: 10.1145/2491956.2462184
ec_funded: 1
language:
- iso: eng
main_file_link:
- url: http://research.microsoft.com/pubs/191069/pldi212_desai.pdf
month: '06'
oa_version: None
page: 321 - 331
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication: Proceedings of the 34th ACM SIGPLAN Conference on Programming Language
  Design and Implementation
publication_status: published
publisher: ACM
publist_id: '4626'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'P: Safe asynchronous event-driven programming'
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '1405'
abstract:
- lang: eng
  text: "Motivated by the analysis of highly dynamic message-passing systems, i.e.
    unbounded thread creation, mobility, etc. we present a framework for the analysis
    of depth-bounded systems. Depth-bounded systems are one of the most expressive
    known fragment of the π-calculus for which interesting verification problems are
    still decidable. Even though they are infinite state systems depth-bounded systems
    are well-structured, thus can be analyzed algorithmically. We give an interpretation
    of depth-bounded systems as graph-rewriting systems. This gives more flexibility
    and ease of use to apply depth-bounded systems to other type of systems like shared
    memory concurrency.\r\n\r\nFirst, we develop an adequate domain of limits for
    depth-bounded systems, a prerequisite for the effective representation of downward-closed
    sets. Downward-closed sets are needed by forward saturation-based algorithms to
    represent potentially infinite sets of states. Then, we present an abstract interpretation
    framework to compute the covering set of well-structured transition systems. Because,
    in general, the covering set is not computable, our abstraction over-approximates
    the actual covering set. Our abstraction captures the essence of acceleration
    based-algorithms while giving up enough precision to ensure convergence. We have
    implemented the analysis in the PICASSO tool and show that it is accurate in practice.
    Finally, we build some further analyses like termination using the covering set
    as starting point."
acknowledgement: "This work was supported in part by the Austrian Science Fund NFN
  RiSE (Rigorous Systems Engineering) and by the ERC Advanced Grant QUAREM (Quantitative
  Reactve Modeling).\r\nChapter 2, 3, and 4 are joint work with Thomas A. Henzinger
  and Thomas Wies. Chapter 2 was published in FoSSaCS 2010 as “Forward Analysis of
  Depth-Bounded Processes” [112]. Chapter 3 was published in VMCAI 2012 as “Ideal
  Abstractions for Well-Structured Transition Systems” [114]. Chap- ter 5.1 is joint
  work with Kshitij Bansal, Eric Koskinen, and Thomas Wies. It was published in TACAS
  2013 as “Structural Counter Abstraction” [13]. The author’s contribution in this
  part is mostly related to the implementation. The theory required to understand
  the method and its implementation is quickly recalled to make the thesis self-contained,
  but should not be considered as a contribution. For the details of the methods,
  we refer the reader to the orig- inal publication [13] and the corresponding technical
  report [14]. Chapter 5.2 is ongoing work with Shahram Esmaeilsabzali, Rupak Majumdar,
  and Thomas Wies. I also would like to thank the people who supported over the past
  4 years. My advisor Thomas A. Henzinger who gave me a lot of freedom to work on
  projects I was interested in. My collaborators, especially Thomas Wies with whom
  I worked since the beginning. The members of my thesis committee, Viktor Kun- cak
  and Rupak Majumdar, who also agreed to advise me. Simon Aeschbacher, Pavol Cerny,
  Cezara Dragoi, Arjun Radhakrishna, my family, friends and col- leagues who created
  an enjoyable environment. "
alternative_title:
- ISTA Thesis
article_processing_charge: No
author:
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: Zufferey D. Analysis of dynamic message passing programs. 2013. doi:<a href="https://doi.org/10.15479/at:ista:1405">10.15479/at:ista:1405</a>
  apa: Zufferey, D. (2013). <i>Analysis of dynamic message passing programs</i>. Institute
    of Science and Technology Austria. <a href="https://doi.org/10.15479/at:ista:1405">https://doi.org/10.15479/at:ista:1405</a>
  chicago: Zufferey, Damien. “Analysis of Dynamic Message Passing Programs.” Institute
    of Science and Technology Austria, 2013. <a href="https://doi.org/10.15479/at:ista:1405">https://doi.org/10.15479/at:ista:1405</a>.
  ieee: D. Zufferey, “Analysis of dynamic message passing programs,” Institute of
    Science and Technology Austria, 2013.
  ista: Zufferey D. 2013. Analysis of dynamic message passing programs. Institute
    of Science and Technology Austria.
  mla: Zufferey, Damien. <i>Analysis of Dynamic Message Passing Programs</i>. Institute
    of Science and Technology Austria, 2013, doi:<a href="https://doi.org/10.15479/at:ista:1405">10.15479/at:ista:1405</a>.
  short: D. Zufferey, Analysis of Dynamic Message Passing Programs, Institute of Science
    and Technology Austria, 2013.
date_created: 2018-12-11T11:51:50Z
date_published: 2013-09-05T00:00:00Z
date_updated: 2023-09-07T11:36:37Z
day: '05'
ddc:
- '000'
degree_awarded: PhD
department:
- _id: ToHe
- _id: GradSch
doi: 10.15479/at:ista:1405
ec_funded: 1
file:
- access_level: open_access
  checksum: ed2d7b52933d134e8dc69d569baa284e
  content_type: application/pdf
  creator: dernst
  date_created: 2021-02-22T11:28:36Z
  date_updated: 2021-02-22T11:28:36Z
  file_id: '9176'
  file_name: 2013_Zufferey_thesis_final.pdf
  file_size: 1514906
  relation: main_file
  success: 1
- access_level: closed
  checksum: cecc4c4b14225bee973d32e3dba91a55
  content_type: application/pdf
  creator: cchlebak
  date_created: 2021-11-16T14:42:52Z
  date_updated: 2021-11-17T13:47:58Z
  file_id: '10298'
  file_name: 2013_Zufferey_thesis_final_pdfa.pdf
  file_size: 1378313
  relation: main_file
file_date_updated: 2021-11-17T13:47:58Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: http://dzufferey.github.io/files/2013_thesis.pdf
month: '09'
oa: 1
oa_version: Published Version
page: '134'
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication_identifier:
  issn:
  - 2663-337X
publication_status: published
publisher: Institute of Science and Technology Austria
publist_id: '5802'
related_material:
  record:
  - id: '2847'
    relation: part_of_dissertation
    status: public
  - id: '3251'
    relation: part_of_dissertation
    status: public
  - id: '4361'
    relation: part_of_dissertation
    status: public
status: public
supervisor:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
title: Analysis of dynamic message passing programs
type: dissertation
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
year: '2013'
...
---
_id: '2848'
abstract:
- lang: eng
  text: We study evolutionary game theory in a setting where individuals learn from
    each other. We extend the traditional approach by assuming that a population contains
    individuals with different learning abilities. In particular, we explore the situation
    where individuals have different search spaces, when attempting to learn the strategies
    of others. The search space of an individual specifies the set of strategies learnable
    by that individual. The search space is genetically given and does not change
    under social evolutionary dynamics. We introduce a general framework and study
    a specific example in the context of direct reciprocity. For this example, we
    obtain the counter intuitive result that cooperation can only evolve for intermediate
    benefit-to-cost ratios, while small and large benefit-to-cost ratios favor defection.
    Our paper is a step toward making a connection between computational learning
    theory and evolutionary game dynamics.
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Martin
  full_name: Nowak, Martin
  last_name: Nowak
citation:
  ama: Chatterjee K, Zufferey D, Nowak M. Evolutionary game dynamics in populations
    with different learners. <i>Journal of Theoretical Biology</i>. 2012;301:161-173.
    doi:<a href="https://doi.org/10.1016/j.jtbi.2012.02.021">10.1016/j.jtbi.2012.02.021</a>
  apa: Chatterjee, K., Zufferey, D., &#38; Nowak, M. (2012). Evolutionary game dynamics
    in populations with different learners. <i>Journal of Theoretical Biology</i>.
    Elsevier. <a href="https://doi.org/10.1016/j.jtbi.2012.02.021">https://doi.org/10.1016/j.jtbi.2012.02.021</a>
  chicago: Chatterjee, Krishnendu, Damien Zufferey, and Martin Nowak. “Evolutionary
    Game Dynamics in Populations with Different Learners.” <i>Journal of Theoretical
    Biology</i>. Elsevier, 2012. <a href="https://doi.org/10.1016/j.jtbi.2012.02.021">https://doi.org/10.1016/j.jtbi.2012.02.021</a>.
  ieee: K. Chatterjee, D. Zufferey, and M. Nowak, “Evolutionary game dynamics in populations
    with different learners,” <i>Journal of Theoretical Biology</i>, vol. 301. Elsevier,
    pp. 161–173, 2012.
  ista: Chatterjee K, Zufferey D, Nowak M. 2012. Evolutionary game dynamics in populations
    with different learners. Journal of Theoretical Biology. 301, 161–173.
  mla: Chatterjee, Krishnendu, et al. “Evolutionary Game Dynamics in Populations with
    Different Learners.” <i>Journal of Theoretical Biology</i>, vol. 301, Elsevier,
    2012, pp. 161–73, doi:<a href="https://doi.org/10.1016/j.jtbi.2012.02.021">10.1016/j.jtbi.2012.02.021</a>.
  short: K. Chatterjee, D. Zufferey, M. Nowak, Journal of Theoretical Biology 301
    (2012) 161–173.
date_created: 2018-12-11T11:59:55Z
date_published: 2012-05-21T00:00:00Z
date_updated: 2021-01-12T07:00:12Z
day: '21'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1016/j.jtbi.2012.02.021
ec_funded: 1
external_id:
  pmid:
  - '22394652'
intvolume: '       301'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3322297/
month: '05'
oa: 1
oa_version: Submitted Version
page: 161 - 173
pmid: 1
project:
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: Journal of Theoretical Biology
publication_status: published
publisher: Elsevier
publist_id: '3946'
quality_controlled: '1'
scopus_import: 1
status: public
title: Evolutionary game dynamics in populations with different learners
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 301
year: '2012'
...
---
_id: '3251'
abstract:
- lang: eng
  text: Many infinite state systems can be seen as well-structured transition systems
    (WSTS), i.e., systems equipped with a well-quasi-ordering on states that is also
    a simulation relation. WSTS are an attractive target for formal analysis because
    there exist generic algorithms that decide interesting verification problems for
    this class. Among the most popular algorithms are acceleration-based forward analyses
    for computing the covering set. Termination of these algorithms can only be guaranteed
    for flattable WSTS. Yet, many WSTS of practical interest are not flattable and
    the question whether any given WSTS is flattable is itself undecidable. We therefore
    propose an analysis that computes the covering set and captures the essence of
    acceleration-based algorithms, but sacrifices precision for guaranteed termination.
    Our analysis is an abstract interpretation whose abstract domain builds on the
    ideal completion of the well-quasi-ordered state space, and a widening operator
    that mimics acceleration and controls the loss of precision of the analysis. We
    present instances of our framework for various classes of WSTS. Our experience
    with a prototype implementation indicates that, despite the inherent precision
    loss, our analysis often computes the precise covering set of the analyzed system.
acknowledgement: This research was supported in part by the European Research Council
  (ERC) Advanced Investigator Grant QUAREM and by the Austrian Science Fund (FWF)
  project S11402-N23.
alternative_title:
- LNCS
author:
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Zufferey D, Wies T, Henzinger TA. Ideal abstractions for well structured transition
    systems. In: Vol 7148. Springer; 2012:445-460. doi:<a href="https://doi.org/10.1007/978-3-642-27940-9_29">10.1007/978-3-642-27940-9_29</a>'
  apa: 'Zufferey, D., Wies, T., &#38; Henzinger, T. A. (2012). Ideal abstractions
    for well structured transition systems (Vol. 7148, pp. 445–460). Presented at
    the VMCAI: Verification, Model Checking and Abstract Interpretation, Philadelphia,
    PA, USA: Springer. <a href="https://doi.org/10.1007/978-3-642-27940-9_29">https://doi.org/10.1007/978-3-642-27940-9_29</a>'
  chicago: Zufferey, Damien, Thomas Wies, and Thomas A Henzinger. “Ideal Abstractions
    for Well Structured Transition Systems,” 7148:445–60. Springer, 2012. <a href="https://doi.org/10.1007/978-3-642-27940-9_29">https://doi.org/10.1007/978-3-642-27940-9_29</a>.
  ieee: 'D. Zufferey, T. Wies, and T. A. Henzinger, “Ideal abstractions for well structured
    transition systems,” presented at the VMCAI: Verification, Model Checking and
    Abstract Interpretation, Philadelphia, PA, USA, 2012, vol. 7148, pp. 445–460.'
  ista: 'Zufferey D, Wies T, Henzinger TA. 2012. Ideal abstractions for well structured
    transition systems. VMCAI: Verification, Model Checking and Abstract Interpretation,
    LNCS, vol. 7148, 445–460.'
  mla: Zufferey, Damien, et al. <i>Ideal Abstractions for Well Structured Transition
    Systems</i>. Vol. 7148, Springer, 2012, pp. 445–60, doi:<a href="https://doi.org/10.1007/978-3-642-27940-9_29">10.1007/978-3-642-27940-9_29</a>.
  short: D. Zufferey, T. Wies, T.A. Henzinger, in:, Springer, 2012, pp. 445–460.
conference:
  end_date: 2012-01-24
  location: Philadelphia, PA, USA
  name: 'VMCAI: Verification, Model Checking and Abstract Interpretation'
  start_date: 2012-01-22
date_created: 2018-12-11T12:02:16Z
date_published: 2012-01-01T00:00:00Z
date_updated: 2023-09-07T11:36:36Z
day: '01'
ddc:
- '000'
- '005'
department:
- _id: ToHe
doi: 10.1007/978-3-642-27940-9_29
ec_funded: 1
file:
- access_level: open_access
  checksum: f2f0d55efa32309ad1fe65a5fcaad90c
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:09:35Z
  date_updated: 2020-07-14T12:46:05Z
  file_id: '4759'
  file_name: IST-2012-100-v1+1_Ideal_abstractions_for_well-structured_transition_systems.pdf
  file_size: 217104
  relation: main_file
file_date_updated: 2020-07-14T12:46:05Z
has_accepted_license: '1'
intvolume: '      7148'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 445 - 460
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication_status: published
publisher: Springer
publist_id: '3406'
pubrep_id: '100'
quality_controlled: '1'
related_material:
  record:
  - id: '1405'
    relation: dissertation_contains
    status: public
status: public
title: Ideal abstractions for well structured transition systems
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 7148
year: '2012'
...
---
_id: '3302'
abstract:
- lang: eng
  text: Cloud computing aims to give users virtually unlimited pay-per-use computing
    resources without the burden of managing the underlying infrastructure. We present
    a new job execution environment Flextic that exploits scal- able static scheduling
    techniques to provide the user with a flexible pricing model, such as a tradeoff
    between dif- ferent degrees of execution speed and execution price, and at the
    same time, reduce scheduling overhead for the cloud provider. We have evaluated
    a prototype of Flextic on Amazon EC2 and compared it against Hadoop. For various
    data parallel jobs from machine learning, im- age processing, and gene sequencing
    that we considered, Flextic has low scheduling overhead and reduces job du- ration
    by up to 15% compared to Hadoop, a dynamic cloud scheduler.
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Anmol
  full_name: Singh, Anmol
  id: 72A86902-E99F-11E9-9F62-915534D1B916
  last_name: Singh
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Henzinger TA, Singh A, Singh V, Wies T, Zufferey D. Static scheduling in clouds.
    In: USENIX; 2011:1-6.'
  apa: 'Henzinger, T. A., Singh, A., Singh, V., Wies, T., &#38; Zufferey, D. (2011).
    Static scheduling in clouds (pp. 1–6). Presented at the HotCloud: Workshop on
    Hot Topics in Cloud Computing, USENIX.'
  chicago: Henzinger, Thomas A, Anmol Singh, Vasu Singh, Thomas Wies, and Damien Zufferey.
    “Static Scheduling in Clouds,” 1–6. USENIX, 2011.
  ieee: 'T. A. Henzinger, A. Singh, V. Singh, T. Wies, and D. Zufferey, “Static scheduling
    in clouds,” presented at the HotCloud: Workshop on Hot Topics in Cloud Computing,
    2011, pp. 1–6.'
  ista: 'Henzinger TA, Singh A, Singh V, Wies T, Zufferey D. 2011. Static scheduling
    in clouds. HotCloud: Workshop on Hot Topics in Cloud Computing, 1–6.'
  mla: Henzinger, Thomas A., et al. <i>Static Scheduling in Clouds</i>. USENIX, 2011,
    pp. 1–6.
  short: T.A. Henzinger, A. Singh, V. Singh, T. Wies, D. Zufferey, in:, USENIX, 2011,
    pp. 1–6.
conference:
  end_date: 2011-06-15
  name: 'HotCloud: Workshop on Hot Topics in Cloud Computing'
  start_date: 2011-06-14
date_created: 2018-12-11T12:02:33Z
date_published: 2011-06-14T00:00:00Z
date_updated: 2021-01-12T07:42:31Z
day: '14'
ddc:
- '000'
- '005'
department:
- _id: ToHe
file:
- access_level: open_access
  checksum: 21a461ac004bb535c83320fe79b30375
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:18:14Z
  date_updated: 2020-07-14T12:46:06Z
  file_id: '5333'
  file_name: IST-2012-90-v1+1_Static_scheduling_in_clouds.pdf
  file_size: 232770
  relation: main_file
file_date_updated: 2020-07-14T12:46:06Z
has_accepted_license: '1'
language:
- iso: eng
month: '06'
oa: 1
oa_version: Submitted Version
page: 1 - 6
publication_status: published
publisher: USENIX
publist_id: '3338'
pubrep_id: '90'
quality_controlled: '1'
status: public
title: Static scheduling in clouds
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '3358'
abstract:
- lang: eng
  text: The static scheduling problem often arises as a fundamental problem in real-time
    systems and grid computing. We consider the problem of statically scheduling a
    large job expressed as a task graph on a large number of computing nodes, such
    as a data center. This paper solves the large-scale static scheduling problem
    using abstraction refinement, a technique commonly used in formal verification
    to efficiently solve computationally hard problems. A scheduler based on abstraction
    refinement first attempts to solve the scheduling problem with abstract representations
    of the job and the computing resources. As abstract representations are generally
    small, the scheduling can be done reasonably fast. If the obtained schedule does
    not meet specified quality conditions (like data center utilization or schedule
    makespan) then the scheduler refines the job and data center abstractions and,
    again solves the scheduling problem. We develop different schedulers based on
    abstraction refinement. We implemented these schedulers and used them to schedule
    task graphs from various computing domains on simulated data centers with realistic
    topologies. We compared the speed of scheduling and the quality of the produced
    schedules with our abstraction refinement schedulers against a baseline scheduler
    that does not use any abstraction. We conclude that abstraction refinement techniques
    give a significant speed-up compared to traditional static scheduling heuristics,
    at a reasonable cost in the quality of the produced schedules. We further used
    our static schedulers in an actual system that we deployed on Amazon EC2 and compared
    it against the Hadoop dynamic scheduler for large MapReduce jobs. Our experiments
    indicate that there is great potential for static scheduling techniques.
article_processing_charge: No
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Henzinger TA, Singh V, Wies T, Zufferey D. Scheduling large jobs by abstraction
    refinement. In: ACM; 2011:329-342. doi:<a href="https://doi.org/10.1145/1966445.1966476">10.1145/1966445.1966476</a>'
  apa: 'Henzinger, T. A., Singh, V., Wies, T., &#38; Zufferey, D. (2011). Scheduling
    large jobs by abstraction refinement (pp. 329–342). Presented at the EuroSys,
    Salzburg, Austria: ACM. <a href="https://doi.org/10.1145/1966445.1966476">https://doi.org/10.1145/1966445.1966476</a>'
  chicago: Henzinger, Thomas A, Vasu Singh, Thomas Wies, and Damien Zufferey. “Scheduling
    Large Jobs by Abstraction Refinement,” 329–42. ACM, 2011. <a href="https://doi.org/10.1145/1966445.1966476">https://doi.org/10.1145/1966445.1966476</a>.
  ieee: T. A. Henzinger, V. Singh, T. Wies, and D. Zufferey, “Scheduling large jobs
    by abstraction refinement,” presented at the EuroSys, Salzburg, Austria, 2011,
    pp. 329–342.
  ista: Henzinger TA, Singh V, Wies T, Zufferey D. 2011. Scheduling large jobs by
    abstraction refinement. EuroSys, 329–342.
  mla: Henzinger, Thomas A., et al. <i>Scheduling Large Jobs by Abstraction Refinement</i>.
    ACM, 2011, pp. 329–42, doi:<a href="https://doi.org/10.1145/1966445.1966476">10.1145/1966445.1966476</a>.
  short: T.A. Henzinger, V. Singh, T. Wies, D. Zufferey, in:, ACM, 2011, pp. 329–342.
conference:
  end_date: 2011-04-13
  location: Salzburg, Austria
  name: EuroSys
  start_date: 2011-04-10
date_created: 2018-12-11T12:02:53Z
date_published: 2011-04-10T00:00:00Z
date_updated: 2021-01-12T07:42:55Z
day: '10'
department:
- _id: ToHe
doi: 10.1145/1966445.1966476
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://cs.nyu.edu/wies/publ/scheduling_large_jobs_by_abstraction_refinement.pdf
month: '04'
oa: 1
oa_version: Published Version
page: 329 - 342
publication_status: published
publisher: ACM
publist_id: '3257'
quality_controlled: '1'
scopus_import: 1
status: public
title: Scheduling large jobs by abstraction refinement
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '5391'
abstract:
- lang: eng
  text: Concurrent data structures with fine-grained synchronization are notoriously
    difficult to implement correctly. The difficulty of reasoning about these implementations
    does not stem from the number of variables or the program size, but rather from
    the large number of possible interleavings. These implementations are therefore
    prime candidates for model checking. We introduce an algorithm for verifying linearizability
    of singly-linked heap-based concurrent data structures. We consider a model consisting
    of an unbounded heap where each node consists an element from an unbounded data
    domain, with a restricted set of operations for testing and updating pointers
    and data elements. Our main result is that linearizability is decidable for programs
    that invoke a fixed number of methods, possibly in parallel. This decidable fragment
    covers many of the common implementation techniques — fine-grained locking, lazy
    synchronization, and lock-free synchronization. We also show how the technique
    can be used to verify optimistic implementations with the help of programmer annotations.
    We developed a verification tool CoLT and evaluated it on a representative sample
    of Java implementations of the concurrent set data structure. The tool verified
    linearizability of a number of implementations, found a known error in a lock-free
    imple- mentation and proved that the corrected version is linearizable.
alternative_title:
- IST Austria Technical Report
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Swarat
  full_name: Chaudhuri, Swarat
  last_name: Chaudhuri
- first_name: Rajeev
  full_name: Alur, Rajeev
  last_name: Alur
citation:
  ama: Cerny P, Radhakrishna A, Zufferey D, Chaudhuri S, Alur R. <i>Model Checking
    of Linearizability of Concurrent List Implementations</i>. IST Austria; 2010.
    doi:<a href="https://doi.org/10.15479/AT:IST-2010-0001">10.15479/AT:IST-2010-0001</a>
  apa: Cerny, P., Radhakrishna, A., Zufferey, D., Chaudhuri, S., &#38; Alur, R. (2010).
    <i>Model checking of linearizability of concurrent list implementations</i>. IST
    Austria. <a href="https://doi.org/10.15479/AT:IST-2010-0001">https://doi.org/10.15479/AT:IST-2010-0001</a>
  chicago: Cerny, Pavol, Arjun Radhakrishna, Damien Zufferey, Swarat Chaudhuri, and
    Rajeev Alur. <i>Model Checking of Linearizability of Concurrent List Implementations</i>.
    IST Austria, 2010. <a href="https://doi.org/10.15479/AT:IST-2010-0001">https://doi.org/10.15479/AT:IST-2010-0001</a>.
  ieee: P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, and R. Alur, <i>Model
    checking of linearizability of concurrent list implementations</i>. IST Austria,
    2010.
  ista: Cerny P, Radhakrishna A, Zufferey D, Chaudhuri S, Alur R. 2010. Model checking
    of linearizability of concurrent list implementations, IST Austria, 27p.
  mla: Cerny, Pavol, et al. <i>Model Checking of Linearizability of Concurrent List
    Implementations</i>. IST Austria, 2010, doi:<a href="https://doi.org/10.15479/AT:IST-2010-0001">10.15479/AT:IST-2010-0001</a>.
  short: P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, R. Alur, Model Checking
    of Linearizability of Concurrent List Implementations, IST Austria, 2010.
date_created: 2018-12-12T11:39:04Z
date_published: 2010-04-19T00:00:00Z
date_updated: 2023-02-23T12:09:09Z
day: '19'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.15479/AT:IST-2010-0001
file:
- access_level: open_access
  checksum: 986645caad7dd85a6a091488f6c646dc
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T11:53:44Z
  date_updated: 2020-07-14T12:46:43Z
  file_id: '5505'
  file_name: IST-2010-0001_IST-2010-0001.pdf
  file_size: 372286
  relation: main_file
file_date_updated: 2020-07-14T12:46:43Z
has_accepted_license: '1'
language:
- iso: eng
month: '04'
oa: 1
oa_version: Published Version
page: '27'
publication_identifier:
  issn:
  - 2664-1690
publication_status: published
publisher: IST Austria
pubrep_id: '27'
related_material:
  record:
  - id: '4390'
    relation: later_version
    status: public
status: public
title: Model checking of linearizability of concurrent list implementations
type: technical_report
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2010'
...
---
_id: '4361'
abstract:
- lang: eng
  text: Depth-bounded processes form the most expressive known fragment of the π-calculus
    for which interesting verification problems are still decidable. In this paper
    we develop an adequate domain of limits for the well-structured transition systems
    that are induced by depth-bounded processes. An immediate consequence of our result
    is that there exists a forward algorithm that decides the covering problem for
    this class. Unlike backward algorithms, the forward algorithm terminates even
    if the depth of the process is not known a priori. More importantly, our result
    suggests a whole spectrum of forward algorithms that enable the effective verification
    of a large class of mobile systems.
alternative_title:
- LNCS
author:
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Wies T, Zufferey D, Henzinger TA. Forward analysis of depth-bounded processes.
    In: Ong L, ed. Vol 6014. Springer; 2010:94-108. doi:<a href="https://doi.org/10.1007/978-3-642-12032-9_8">10.1007/978-3-642-12032-9_8</a>'
  apa: 'Wies, T., Zufferey, D., &#38; Henzinger, T. A. (2010). Forward analysis of
    depth-bounded processes. In L. Ong (Ed.) (Vol. 6014, pp. 94–108). Presented at
    the FoSSaCS: Foundations of Software Science and Computation Structures, Paphos,
    Cyprus: Springer. <a href="https://doi.org/10.1007/978-3-642-12032-9_8">https://doi.org/10.1007/978-3-642-12032-9_8</a>'
  chicago: Wies, Thomas, Damien Zufferey, and Thomas A Henzinger. “Forward Analysis
    of Depth-Bounded Processes.” edited by Luke Ong, 6014:94–108. Springer, 2010.
    <a href="https://doi.org/10.1007/978-3-642-12032-9_8">https://doi.org/10.1007/978-3-642-12032-9_8</a>.
  ieee: 'T. Wies, D. Zufferey, and T. A. Henzinger, “Forward analysis of depth-bounded
    processes,” presented at the FoSSaCS: Foundations of Software Science and Computation
    Structures, Paphos, Cyprus, 2010, vol. 6014, pp. 94–108.'
  ista: 'Wies T, Zufferey D, Henzinger TA. 2010. Forward analysis of depth-bounded
    processes. FoSSaCS: Foundations of Software Science and Computation Structures,
    LNCS, vol. 6014, 94–108.'
  mla: Wies, Thomas, et al. <i>Forward Analysis of Depth-Bounded Processes</i>. Edited
    by Luke Ong, vol. 6014, Springer, 2010, pp. 94–108, doi:<a href="https://doi.org/10.1007/978-3-642-12032-9_8">10.1007/978-3-642-12032-9_8</a>.
  short: T. Wies, D. Zufferey, T.A. Henzinger, in:, L. Ong (Ed.), Springer, 2010,
    pp. 94–108.
conference:
  end_date: 2010-03-28
  location: Paphos, Cyprus
  name: 'FoSSaCS: Foundations of Software Science and Computation Structures'
  start_date: 2010-03-20
date_created: 2018-12-11T12:08:27Z
date_published: 2010-03-01T00:00:00Z
date_updated: 2023-09-07T11:36:36Z
day: '01'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.1007/978-3-642-12032-9_8
editor:
- first_name: Luke
  full_name: Ong, Luke
  last_name: Ong
file:
- access_level: open_access
  checksum: 3e610de84937d821316362658239134a
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:08:17Z
  date_updated: 2020-07-14T12:46:27Z
  file_id: '4677'
  file_name: IST-2012-50-v1+1_Forward_analysis_of_depth-bounded_processes.pdf
  file_size: 240766
  relation: main_file
file_date_updated: 2020-07-14T12:46:27Z
has_accepted_license: '1'
intvolume: '      6014'
language:
- iso: eng
month: '03'
oa: 1
oa_version: Submitted Version
page: 94 - 108
publication_status: published
publisher: Springer
publist_id: '1099'
pubrep_id: '50'
quality_controlled: '1'
related_material:
  record:
  - id: '1405'
    relation: dissertation_contains
    status: public
scopus_import: 1
status: public
title: Forward analysis of depth-bounded processes
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6014
year: '2010'
...
---
_id: '4380'
abstract:
- lang: eng
  text: Cloud computing is an emerging paradigm aimed to offer users pay-per-use computing
    resources, while leaving the burden of managing the computing infrastructure to
    the cloud provider. We present a new programming and pricing model that gives
    the cloud user the flexibility of trading execution speed and price on a per-job
    basis. We discuss the scheduling and resource management challenges for the cloud
    provider that arise in the implementation of this model. We argue that techniques
    from real-time and embedded software can be useful in this context.
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Anmol
  full_name: Tomar, Anmol
  id: 3D8D36B6-F248-11E8-B48F-1D18A9856A87
  last_name: Tomar
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. A marketplace for cloud
    resources. In: ACM; 2010:1-8. doi:<a href="https://doi.org/10.1145/1879021.1879022">10.1145/1879021.1879022</a>'
  apa: 'Henzinger, T. A., Tomar, A., Singh, V., Wies, T., &#38; Zufferey, D. (2010).
    A marketplace for cloud resources (pp. 1–8). Presented at the EMSOFT: Embedded
    Software , Arizona, USA: ACM. <a href="https://doi.org/10.1145/1879021.1879022">https://doi.org/10.1145/1879021.1879022</a>'
  chicago: Henzinger, Thomas A, Anmol Tomar, Vasu Singh, Thomas Wies, and Damien Zufferey.
    “A Marketplace for Cloud Resources,” 1–8. ACM, 2010. <a href="https://doi.org/10.1145/1879021.1879022">https://doi.org/10.1145/1879021.1879022</a>.
  ieee: 'T. A. Henzinger, A. Tomar, V. Singh, T. Wies, and D. Zufferey, “A marketplace
    for cloud resources,” presented at the EMSOFT: Embedded Software , Arizona, USA,
    2010, pp. 1–8.'
  ista: 'Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. 2010. A marketplace for
    cloud resources. EMSOFT: Embedded Software , 1–8.'
  mla: Henzinger, Thomas A., et al. <i>A Marketplace for Cloud Resources</i>. ACM,
    2010, pp. 1–8, doi:<a href="https://doi.org/10.1145/1879021.1879022">10.1145/1879021.1879022</a>.
  short: T.A. Henzinger, A. Tomar, V. Singh, T. Wies, D. Zufferey, in:, ACM, 2010,
    pp. 1–8.
conference:
  end_date: 2010-10-29
  location: Arizona, USA
  name: 'EMSOFT: Embedded Software '
  start_date: 2010-10-24
date_created: 2018-12-11T12:08:33Z
date_published: 2010-10-24T00:00:00Z
date_updated: 2021-01-12T07:56:32Z
day: '24'
ddc:
- '005'
department:
- _id: ToHe
doi: 10.1145/1879021.1879022
file:
- access_level: open_access
  checksum: 7680dd24016810710f7c977bc94f85e9
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:09:42Z
  date_updated: 2020-07-14T12:46:28Z
  file_id: '4767'
  file_name: IST-2012-48-v1+1_A_marketplace_for_cloud_resources.pdf
  file_size: 222626
  relation: main_file
file_date_updated: 2020-07-14T12:46:28Z
has_accepted_license: '1'
language:
- iso: eng
month: '10'
oa: 1
oa_version: Submitted Version
page: 1 - 8
publication_status: published
publisher: ACM
publist_id: '1078'
pubrep_id: '48'
quality_controlled: '1'
scopus_import: 1
status: public
title: A marketplace for cloud resources
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2010'
...
---
_id: '4381'
abstract:
- lang: eng
  text: Cloud computing aims to give users virtually unlimited pay-per-use computing
    resources without the burden of managing the underlying infrastructure. We claim
    that, in order to realize the full potential of cloud computing, the user must
    be presented with a pricing model that offers flexibility at the requirements
    level, such as a choice between different degrees of execution speed and the cloud
    provider must be presented with a programming model that offers flexibility at
    the execution level, such as a choice between different scheduling policies. In
    such a flexible framework, with each job, the user purchases a virtual computer
    with the desired speed and cost characteristics, and the cloud provider can optimize
    the utilization of resources across a stream of jobs from different users. We
    designed a flexible framework to test our hypothesis, which is called FlexPRICE
    (Flexible Provisioning of Resources in a Cloud Environment) and works as follows.
    A user presents a job to the cloud. The cloud finds different schedules to execute
    the job and presents a set of quotes to the user in terms of price and duration
    for the execution. The user then chooses a particular quote and the cloud is obliged
    to execute the job according to the chosen quote. FlexPRICE thus hides the complexity
    of the actual scheduling decisions from the user, but still provides enough flexibility
    to meet the users actual demands. We implemented FlexPRICE in a simulator called
    PRICES that allows us to experiment with our framework. We observe that FlexPRICE
    provides a wide range of execution options-from fast and expensive to slow and
    cheap-- for the whole spectrum of data-intensive and computation-intensive jobs.
    We also observe that the set of quotes computed by FlexPRICE do not vary as the
    number of simultaneous jobs increases.
article_processing_charge: No
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Anmol
  full_name: Tomar, Anmol
  id: 3D8D36B6-F248-11E8-B48F-1D18A9856A87
  last_name: Tomar
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. FlexPRICE: Flexible provisioning
    of resources in a cloud environment. In: IEEE; 2010:83-90. doi:<a href="https://doi.org/10.1109/CLOUD.2010.71">10.1109/CLOUD.2010.71</a>'
  apa: 'Henzinger, T. A., Tomar, A., Singh, V., Wies, T., &#38; Zufferey, D. (2010).
    FlexPRICE: Flexible provisioning of resources in a cloud environment (pp. 83–90).
    Presented at the CLOUD: Cloud Computing, Miami, USA: IEEE. <a href="https://doi.org/10.1109/CLOUD.2010.71">https://doi.org/10.1109/CLOUD.2010.71</a>'
  chicago: 'Henzinger, Thomas A, Anmol Tomar, Vasu Singh, Thomas Wies, and Damien
    Zufferey. “FlexPRICE: Flexible Provisioning of Resources in a Cloud Environment,”
    83–90. IEEE, 2010. <a href="https://doi.org/10.1109/CLOUD.2010.71">https://doi.org/10.1109/CLOUD.2010.71</a>.'
  ieee: 'T. A. Henzinger, A. Tomar, V. Singh, T. Wies, and D. Zufferey, “FlexPRICE:
    Flexible provisioning of resources in a cloud environment,” presented at the CLOUD:
    Cloud Computing, Miami, USA, 2010, pp. 83–90.'
  ista: 'Henzinger TA, Tomar A, Singh V, Wies T, Zufferey D. 2010. FlexPRICE: Flexible
    provisioning of resources in a cloud environment. CLOUD: Cloud Computing, 83–90.'
  mla: 'Henzinger, Thomas A., et al. <i>FlexPRICE: Flexible Provisioning of Resources
    in a Cloud Environment</i>. IEEE, 2010, pp. 83–90, doi:<a href="https://doi.org/10.1109/CLOUD.2010.71">10.1109/CLOUD.2010.71</a>.'
  short: T.A. Henzinger, A. Tomar, V. Singh, T. Wies, D. Zufferey, in:, IEEE, 2010,
    pp. 83–90.
conference:
  end_date: 2010-07-10
  location: Miami, USA
  name: 'CLOUD: Cloud Computing'
  start_date: 2010-07-05
date_created: 2018-12-11T12:08:33Z
date_published: 2010-08-26T00:00:00Z
date_updated: 2021-01-12T07:56:33Z
day: '26'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.1109/CLOUD.2010.71
file:
- access_level: open_access
  checksum: 98e534675339a8e2beca08890d048145
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:03Z
  date_updated: 2020-07-14T12:46:28Z
  file_id: '5188'
  file_name: IST-2012-47-v1+1_FlexPRICE-_Flexible_provisioning_of_resources_in_a_cloud_environment.pdf
  file_size: 467436
  relation: main_file
file_date_updated: 2020-07-14T12:46:28Z
has_accepted_license: '1'
language:
- iso: eng
month: '08'
oa: 1
oa_version: Submitted Version
page: 83 - 90
publication_status: published
publisher: IEEE
publist_id: '1077'
pubrep_id: '47'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'FlexPRICE: Flexible provisioning of resources in a cloud environment'
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2010'
...
---
_id: '4390'
abstract:
- lang: eng
  text: Concurrent data structures with fine-grained synchronization are notoriously
    difficult to implement correctly. The difficulty of reasoning about these implementations
    does not stem from the number of variables or the program size, but rather from
    the large number of possible interleavings. These implementations are therefore
    prime candidates for model checking. We introduce an algorithm for verifying linearizability
    of singly-linked heap-based concurrent data structures. We consider a model consisting
    of an unbounded heap where each vertex stores an element from an unbounded data
    domain, with a restricted set of operations for testing and updating pointers
    and data elements. Our main result is that linearizability is decidable for programs
    that invoke a fixed number of methods, possibly in parallel. This decidable fragment
    covers many of the common implementation techniques — fine-grained locking, lazy
    synchronization, and lock-free synchronization. We also show how the technique
    can be used to verify optimistic implementations with the help of programmer annotations.
    We developed a verification tool CoLT and evaluated it on a representative sample
    of Java implementations of the concurrent set data structure. The tool verified
    linearizability of a number of implementations, found a known error in a lock-free
    implementation and proved that the corrected version is linearizable.
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Swarat
  full_name: Chaudhuri, Swarat
  last_name: Chaudhuri
- first_name: Rajeev
  full_name: Alur, Rajeev
  last_name: Alur
citation:
  ama: 'Cerny P, Radhakrishna A, Zufferey D, Chaudhuri S, Alur R. Model checking of
    linearizability of concurrent list implementations. In: Vol 6174. Springer; 2010:465-479.
    doi:<a href="https://doi.org/10.1007/978-3-642-14295-6_41">10.1007/978-3-642-14295-6_41</a>'
  apa: 'Cerny, P., Radhakrishna, A., Zufferey, D., Chaudhuri, S., &#38; Alur, R. (2010).
    Model checking of linearizability of concurrent list implementations (Vol. 6174,
    pp. 465–479). Presented at the CAV: Computer Aided Verification, Edinburgh, UK:
    Springer. <a href="https://doi.org/10.1007/978-3-642-14295-6_41">https://doi.org/10.1007/978-3-642-14295-6_41</a>'
  chicago: Cerny, Pavol, Arjun Radhakrishna, Damien Zufferey, Swarat Chaudhuri, and
    Rajeev Alur. “Model Checking of Linearizability of Concurrent List Implementations,”
    6174:465–79. Springer, 2010. <a href="https://doi.org/10.1007/978-3-642-14295-6_41">https://doi.org/10.1007/978-3-642-14295-6_41</a>.
  ieee: 'P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, and R. Alur, “Model
    checking of linearizability of concurrent list implementations,” presented at
    the CAV: Computer Aided Verification, Edinburgh, UK, 2010, vol. 6174, pp. 465–479.'
  ista: 'Cerny P, Radhakrishna A, Zufferey D, Chaudhuri S, Alur R. 2010. Model checking
    of linearizability of concurrent list implementations. CAV: Computer Aided Verification,
    LNCS, vol. 6174, 465–479.'
  mla: Cerny, Pavol, et al. <i>Model Checking of Linearizability of Concurrent List
    Implementations</i>. Vol. 6174, Springer, 2010, pp. 465–79, doi:<a href="https://doi.org/10.1007/978-3-642-14295-6_41">10.1007/978-3-642-14295-6_41</a>.
  short: P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, R. Alur, in:, Springer,
    2010, pp. 465–479.
conference:
  end_date: 2010-07-17
  location: Edinburgh, UK
  name: 'CAV: Computer Aided Verification'
  start_date: 2010-07-15
date_created: 2018-12-11T12:08:36Z
date_published: 2010-07-01T00:00:00Z
date_updated: 2023-02-23T12:24:12Z
day: '01'
ddc:
- '000'
department:
- _id: ToHe
doi: 10.1007/978-3-642-14295-6_41
file:
- access_level: open_access
  checksum: 2eb211ce40b3c4988bce3a3592980704
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-19T16:31:56Z
  date_updated: 2020-07-14T12:46:28Z
  file_id: '7873'
  file_name: 2010_CAV_Cerny.pdf
  file_size: 3633276
  relation: main_file
file_date_updated: 2020-07-14T12:46:28Z
has_accepted_license: '1'
intvolume: '      6174'
language:
- iso: eng
month: '07'
oa: 1
oa_version: Submitted Version
page: 465 - 479
publication_status: published
publisher: Springer
publist_id: '1066'
pubrep_id: '27'
quality_controlled: '1'
related_material:
  record:
  - id: '5391'
    relation: earlier_version
    status: public
status: public
title: Model checking of linearizability of concurrent list implementations
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 6174
year: '2010'
...
---
_id: '4396'
abstract:
- lang: eng
  text: 'Shape analysis is a promising technique to prove program properties about
    recursive data structures. The challenge is to automatically determine the data-structure
    type, and to supply the shape analysis with the necessary information about the
    data structure. We present a stepwise approach to the selection of instrumentation
    predicates for a TVLA-based shape analysis, which takes us a step closer towards
    the fully automatic verification of data structures. The approach uses two techniques
    to guide the refinement of shape abstractions: (1) during program exploration,
    an explicit heap analysis collects sample instances of the heap structures, which
    are used to identify the data structures that are manipulated by the program;
    and (2) during abstraction refinement along an infeasible error path, we consider
    different possible heap abstractions and choose the coarsest one that eliminates
    the infeasible path. We have implemented this combined approach for automatic
    shape refinement as an extension of the software model checker BLAST. Example
    programs from a data-structure library that manipulate doubly-linked lists and
    trees were successfully verified by our tool.'
alternative_title:
- LNCS
author:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Grégory
  full_name: Théoduloz, Grégory
  last_name: Théoduloz
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Beyer D, Henzinger TA, Théoduloz G, Zufferey D. Shape refinement through explicit
    heap analysis. In: Rosenblum D, Taenzer G, eds. Vol 6013. Springer; 2010:263-277.
    doi:<a href="https://doi.org/10.1007/978-3-642-12029-9_19">10.1007/978-3-642-12029-9_19</a>'
  apa: 'Beyer, D., Henzinger, T. A., Théoduloz, G., &#38; Zufferey, D. (2010). Shape
    refinement through explicit heap analysis. In D. Rosenblum &#38; G. Taenzer (Eds.)
    (Vol. 6013, pp. 263–277). Presented at the FASE: Fundamental Approaches To Software
    Engineering, Paphos, Cyprus: Springer. <a href="https://doi.org/10.1007/978-3-642-12029-9_19">https://doi.org/10.1007/978-3-642-12029-9_19</a>'
  chicago: Beyer, Dirk, Thomas A Henzinger, Grégory Théoduloz, and Damien Zufferey.
    “Shape Refinement through Explicit Heap Analysis.” edited by David Rosenblum and
    Gabriele Taenzer, 6013:263–77. Springer, 2010. <a href="https://doi.org/10.1007/978-3-642-12029-9_19">https://doi.org/10.1007/978-3-642-12029-9_19</a>.
  ieee: 'D. Beyer, T. A. Henzinger, G. Théoduloz, and D. Zufferey, “Shape refinement
    through explicit heap analysis,” presented at the FASE: Fundamental Approaches
    To Software Engineering, Paphos, Cyprus, 2010, vol. 6013, pp. 263–277.'
  ista: 'Beyer D, Henzinger TA, Théoduloz G, Zufferey D. 2010. Shape refinement through
    explicit heap analysis. FASE: Fundamental Approaches To Software Engineering,
    LNCS, vol. 6013, 263–277.'
  mla: Beyer, Dirk, et al. <i>Shape Refinement through Explicit Heap Analysis</i>.
    Edited by David Rosenblum and Gabriele Taenzer, vol. 6013, Springer, 2010, pp.
    263–77, doi:<a href="https://doi.org/10.1007/978-3-642-12029-9_19">10.1007/978-3-642-12029-9_19</a>.
  short: D. Beyer, T.A. Henzinger, G. Théoduloz, D. Zufferey, in:, D. Rosenblum, G.
    Taenzer (Eds.), Springer, 2010, pp. 263–277.
conference:
  end_date: 2010-03-28
  location: Paphos, Cyprus
  name: 'FASE: Fundamental Approaches To Software Engineering'
  start_date: 2010-03-20
date_created: 2018-12-11T12:08:38Z
date_published: 2010-04-21T00:00:00Z
date_updated: 2021-01-12T07:56:40Z
day: '21'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.1007/978-3-642-12029-9_19
editor:
- first_name: David
  full_name: Rosenblum, David
  last_name: Rosenblum
- first_name: Gabriele
  full_name: Taenzer, Gabriele
  last_name: Taenzer
file:
- access_level: open_access
  checksum: 7d26e59a9681487d7283eba337292b2c
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:18:13Z
  date_updated: 2020-07-14T12:46:29Z
  file_id: '5332'
  file_name: IST-2012-41-v1+1_Shape_refinement_through_explicit_heap_analysis.pdf
  file_size: 312147
  relation: main_file
file_date_updated: 2020-07-14T12:46:29Z
has_accepted_license: '1'
intvolume: '      6013'
language:
- iso: eng
month: '04'
oa: 1
oa_version: Submitted Version
page: 263 - 277
project:
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: Springer
publist_id: '1061'
pubrep_id: '41'
quality_controlled: '1'
scopus_import: 1
status: public
title: Shape refinement through explicit heap analysis
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6013
year: '2010'
...
---
_id: '4397'
alternative_title:
- LNCS 5123
author:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Damien
  full_name: Damien Zufferey
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
- first_name: Ritankar
  full_name: Majumdar, Ritankar S
  last_name: Majumdar
citation:
  ama: 'Beyer D, Zufferey D, Majumdar R. CSIsat: Interpolation for LA+EUF. In: Springer;
    2008:304-308.'
  apa: 'Beyer, D., Zufferey, D., &#38; Majumdar, R. (2008). CSIsat: Interpolation
    for LA+EUF (pp. 304–308). Presented at the CAV: Computer Aided Verification, Springer.'
  chicago: 'Beyer, Dirk, Damien Zufferey, and Ritankar Majumdar. “CSIsat: Interpolation
    for LA+EUF,” 304–8. Springer, 2008.'
  ieee: 'D. Beyer, D. Zufferey, and R. Majumdar, “CSIsat: Interpolation for LA+EUF,”
    presented at the CAV: Computer Aided Verification, 2008, pp. 304–308.'
  ista: 'Beyer D, Zufferey D, Majumdar R. 2008. CSIsat: Interpolation for LA+EUF.
    CAV: Computer Aided Verification, LNCS 5123, , 304–308.'
  mla: 'Beyer, Dirk, et al. <i>CSIsat: Interpolation for LA+EUF</i>. Springer, 2008,
    pp. 304–08.'
  short: D. Beyer, D. Zufferey, R. Majumdar, in:, Springer, 2008, pp. 304–308.
conference:
  name: 'CAV: Computer Aided Verification'
date_created: 2018-12-11T12:08:38Z
date_published: 2008-01-01T00:00:00Z
date_updated: 2021-01-12T07:56:40Z
day: '01'
extern: 1
month: '01'
page: 304 - 308
publication_status: published
publisher: Springer
publist_id: '1060'
quality_controlled: 0
status: public
title: 'CSIsat: Interpolation for LA+EUF'
type: conference
year: '2008'
...
