[{"intvolume":"        74","abstract":[{"text":"Anopheles darlingi is the primary malaria vector in Latin America, and is especially important in Amazonian Brazil. Historically, control efforts have been focused on indoor house spraying using a variety of insecticides, but since the mid-1990s there has been a shift to patient treatment and focal insecticide fogging. Anopheles darlingi was believed to have been significantly reduced in a gold-mining community, Peixoto de Azevedo (in Mato Grosso State), in the early 1990s by insecticide use during a severe malaria epidemic. In contrast, although An. darlingi was eradicated from some districts of the city of Belem (the capital of Para State) in 1968 to reduce malaria, populations around the water protection area in the eastern district were treated only briefly. To investigate the population structure of An. darlingi including evidence for a population bottleneck in Peixoto, we analyzed eight microsatellite loci of 256 individuals from seven locations in Brazil: three in Amapa State, three in Para State, and one in Mato Grosso State. Allelic diversity and mean expected heterozygosity were high for all populations (mean number alleles/locus and H(E) were 13.5 and 0.834, respectively) and did not differ significantly between locations. Significant heterozygote deficits were associated with linkage disequilibrium, most likely due to either the Wahlund effect or selection. We found no evidence for a population bottleneck in Peixoto, possibly because the reduction was not extreme enough to be detected. Overall estimates of long-term N(e) varied from 92.4 individuals under the linkage disequilibrium model to infinity under the heterozygote excess model. Fixation indices and analysis of molecular variance demonstrated significant differentiation between locations north and south of the Amazon River, suggesting a degree of genetic isolation between them, attributed to isolation by distance.","lang":"eng"}],"citation":{"ista":"Conn J, Vineis J, Bollback JP, Onyabe D, Wilkerson R, Povoa M. 2006. Population structure of the malaria vector Anopheles darlingi in a malaria-endemic region of eastern Amazonian Brazil. The American Journal of Tropical Medicine and Hygiene. 74(5), 798–806.","ieee":"J. Conn, J. Vineis, J. P. Bollback, D. Onyabe, R. Wilkerson, and M. Povoa, “Population structure of the malaria vector Anopheles darlingi in a malaria-endemic region of eastern Amazonian Brazil,” <i>The American Journal of Tropical Medicine and Hygiene</i>, vol. 74, no. 5. American Society of Tropical Medicine and Hygiene, pp. 798–806, 2006.","mla":"Conn, Jan, et al. “Population Structure of the Malaria Vector Anopheles Darlingi in a Malaria-Endemic Region of Eastern Amazonian Brazil.” <i>The American Journal of Tropical Medicine and Hygiene</i>, vol. 74, no. 5, American Society of Tropical Medicine and Hygiene, 2006, pp. 798–806.","apa":"Conn, J., Vineis, J., Bollback, J. P., Onyabe, D., Wilkerson, R., &#38; Povoa, M. (2006). Population structure of the malaria vector Anopheles darlingi in a malaria-endemic region of eastern Amazonian Brazil. <i>The American Journal of Tropical Medicine and Hygiene</i>. American Society of Tropical Medicine and Hygiene.","short":"J. Conn, J. Vineis, J.P. Bollback, D. Onyabe, R. Wilkerson, M. Povoa, The American Journal of Tropical Medicine and Hygiene 74 (2006) 798–806.","ama":"Conn J, Vineis J, Bollback JP, Onyabe D, Wilkerson R, Povoa M. Population structure of the malaria vector Anopheles darlingi in a malaria-endemic region of eastern Amazonian Brazil. <i>The American Journal of Tropical Medicine and Hygiene</i>. 2006;74(5):798-806.","chicago":"Conn, Jan, Joseph Vineis, Jonathan P Bollback, David Onyabe, Richard Wilkerson, and Marinete Povoa. “Population Structure of the Malaria Vector Anopheles Darlingi in a Malaria-Endemic Region of Eastern Amazonian Brazil.” <i>The American Journal of Tropical Medicine and Hygiene</i>. American Society of Tropical Medicine and Hygiene, 2006."},"page":"798 - 806","main_file_link":[{"open_access":"0","url":"http://www.ajtmh.org/content/74/5/798.full"}],"publisher":"American Society of Tropical Medicine and Hygiene","title":"Population structure of the malaria vector Anopheles darlingi in a malaria-endemic region of eastern Amazonian Brazil","quality_controlled":0,"_id":"4352","date_published":"2006-05-01T00:00:00Z","publication":"The American Journal of Tropical Medicine and Hygiene","publist_id":"1108","status":"public","month":"05","date_updated":"2021-01-12T07:56:20Z","extern":1,"volume":74,"date_created":"2018-12-11T12:08:25Z","publication_status":"published","author":[{"last_name":"Conn","first_name":"Jan","full_name":"Conn, Jan E"},{"last_name":"Vineis","first_name":"Joseph","full_name":"Vineis, Joseph H"},{"orcid":"0000-0002-4624-4612","last_name":"Bollback","first_name":"Jonathan P","id":"2C6FA9CC-F248-11E8-B48F-1D18A9856A87","full_name":"Jonathan Bollback"},{"first_name":"David","last_name":"Onyabe","full_name":"Onyabe, David Y"},{"first_name":"Richard","last_name":"Wilkerson","full_name":"Wilkerson, Richard C"},{"full_name":"Povoa, Marinete M","first_name":"Marinete","last_name":"Povoa"}],"day":"01","type":"journal_article","issue":"5","year":"2006"},{"date_created":"2018-12-11T12:08:27Z","publication_status":"published","extern":1,"type":"conference","day":"01","conference":{"name":"VMCAI: Verification, Model Checking and Abstract Interpretation"},"author":[{"id":"447BFB88-F248-11E8-B48F-1D18A9856A87","last_name":"Wies","first_name":"Thomas","full_name":"Thomas Wies"},{"first_name":"Viktor","last_name":"Kuncak","full_name":"Kuncak, Viktor"},{"full_name":"Lam,Patrick","last_name":"Lam","first_name":"Patrick"},{"last_name":"Podelski","first_name":"Andreas","full_name":"Podelski,Andreas"},{"full_name":"Rinard,Martin","last_name":"Rinard","first_name":"Martin"}],"year":"2006","publisher":"Springer","page":"157 - 173","quality_controlled":0,"title":"Field Constraint Analysis","doi":"1551","citation":{"apa":"Wies, T., Kuncak, V., Lam, P., Podelski, A., &#38; Rinard, M. (2006). Field Constraint Analysis (pp. 157–173). Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Springer. <a href=\"https://doi.org/1551\">https://doi.org/1551</a>","mla":"Wies, Thomas, et al. <i>Field Constraint Analysis</i>. Springer, 2006, pp. 157–73, doi:<a href=\"https://doi.org/1551\">1551</a>.","chicago":"Wies, Thomas, Viktor Kuncak, Patrick Lam, Andreas Podelski, and Martin Rinard. “Field Constraint Analysis,” 157–73. Springer, 2006. <a href=\"https://doi.org/1551\">https://doi.org/1551</a>.","short":"T. Wies, V. Kuncak, P. Lam, A. Podelski, M. Rinard, in:, Springer, 2006, pp. 157–173.","ama":"Wies T, Kuncak V, Lam P, Podelski A, Rinard M. Field Constraint Analysis. In: Springer; 2006:157-173. doi:<a href=\"https://doi.org/1551\">1551</a>","ista":"Wies T, Kuncak V, Lam P, Podelski A, Rinard M. 2006. Field Constraint Analysis. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS 3855, , 157–173.","ieee":"T. Wies, V. Kuncak, P. Lam, A. Podelski, and M. Rinard, “Field Constraint Analysis,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, 2006, pp. 157–173."},"alternative_title":["LNCS 3855"],"status":"public","date_updated":"2021-01-12T07:56:23Z","month":"01","_id":"4359","publist_id":"1097","date_published":"2006-01-01T00:00:00Z"},{"title":"Real Time Temporal Logic: Past, Present, Future","quality_controlled":0,"page":"2 - 16","publisher":"Springer","citation":{"ieee":"O. Maler, D. Nickovic, and A. Pnueli, “Real Time Temporal Logic: Past, Present, Future,” presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, 2006, pp. 2–16.","ista":"Maler O, Nickovic D, Pnueli A. 2006. Real Time Temporal Logic: Past, Present, Future. FORMATS: Formal Modeling and Analysis of Timed Systems, LNCS, , 2–16.","ama":"Maler O, Nickovic D, Pnueli A. Real Time Temporal Logic: Past, Present, Future. In: Springer; 2006:2-16. doi:<a href=\"https://doi.org/1571\">1571</a>","short":"O. Maler, D. Nickovic, A. Pnueli, in:, Springer, 2006, pp. 2–16.","chicago":"Maler, Oded, Dejan Nickovic, and Amir Pnueli. “Real Time Temporal Logic: Past, Present, Future,” 2–16. Springer, 2006. <a href=\"https://doi.org/1571\">https://doi.org/1571</a>.","mla":"Maler, Oded, et al. <i>Real Time Temporal Logic: Past, Present, Future</i>. Springer, 2006, pp. 2–16, doi:<a href=\"https://doi.org/1571\">1571</a>.","apa":"Maler, O., Nickovic, D., &#38; Pnueli, A. (2006). Real Time Temporal Logic: Past, Present, Future (pp. 2–16). Presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Springer. <a href=\"https://doi.org/1571\">https://doi.org/1571</a>"},"alternative_title":["LNCS"],"doi":"1571","month":"01","date_updated":"2021-01-12T07:56:29Z","status":"public","publist_id":"1084","date_published":"2006-01-23T00:00:00Z","_id":"4373","date_created":"2018-12-11T12:08:31Z","publication_status":"published","extern":1,"year":"2006","author":[{"full_name":"Maler, Oded","first_name":"Oded","last_name":"Maler"},{"last_name":"Nickovic","first_name":"Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87","full_name":"Dejan Nickovic"},{"first_name":"Amir","last_name":"Pnueli","full_name":"Pnueli,Amir"}],"conference":{"name":"FORMATS: Formal Modeling and Analysis of Timed Systems"},"type":"conference","day":"23"},{"date_created":"2018-12-11T12:08:31Z","publication_status":"published","extern":1,"author":[{"full_name":"Maler, Oded","last_name":"Maler","first_name":"Oded"},{"first_name":"Dejan","last_name":"Nickovic","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87","full_name":"Dejan Nickovic"},{"full_name":"Pnueli,Amir","first_name":"Amir","last_name":"Pnueli"}],"conference":{"name":"FORMATS: Formal Modeling and Analysis of Timed Systems"},"day":"19","type":"conference","year":"2006","page":"274 - 289","publisher":"Springer","title":"From MITL to Timed Automata","quality_controlled":0,"alternative_title":["LNCS"],"citation":{"ieee":"O. Maler, D. Nickovic, and A. Pnueli, “From MITL to Timed Automata,” presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, 2006, pp. 274–289.","ista":"Maler O, Nickovic D, Pnueli A. 2006. From MITL to Timed Automata. FORMATS: Formal Modeling and Analysis of Timed Systems, LNCS, , 274–289.","ama":"Maler O, Nickovic D, Pnueli A. From MITL to Timed Automata. In: Springer; 2006:274-289. doi:<a href=\"https://doi.org/1570\">1570</a>","short":"O. Maler, D. Nickovic, A. Pnueli, in:, Springer, 2006, pp. 274–289.","chicago":"Maler, Oded, Dejan Nickovic, and Amir Pnueli. “From MITL to Timed Automata,” 274–89. Springer, 2006. <a href=\"https://doi.org/1570\">https://doi.org/1570</a>.","mla":"Maler, Oded, et al. <i>From MITL to Timed Automata</i>. Springer, 2006, pp. 274–89, doi:<a href=\"https://doi.org/1570\">1570</a>.","apa":"Maler, O., Nickovic, D., &#38; Pnueli, A. (2006). From MITL to Timed Automata (pp. 274–289). Presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Springer. <a href=\"https://doi.org/1570\">https://doi.org/1570</a>"},"doi":"1570","status":"public","month":"10","date_updated":"2021-01-12T07:56:30Z","_id":"4374","date_published":"2006-10-19T00:00:00Z","publist_id":"1085"},{"year":"2006","day":"01","type":"conference","conference":{"name":"ICALP: Automata, Languages and Programming"},"author":[{"first_name":"Rajeev","last_name":"Alur","full_name":"Alur, Rajeev"},{"id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","first_name":"Pavol","last_name":"Cerny","full_name":"Pavol Cerny"},{"first_name":"Steve","last_name":"Zdancewic","full_name":"Zdancewic,Steve"}],"publication_status":"published","date_created":"2018-12-11T12:08:40Z","extern":1,"date_updated":"2021-01-12T07:56:42Z","month":"01","status":"public","date_published":"2006-01-01T00:00:00Z","publist_id":"1054","_id":"4401","quality_controlled":0,"title":"Preserving Secrecy Under Refinement","publisher":"Springer","page":"107 - 118","doi":"1543","citation":{"ieee":"R. Alur, P. Cerny, and S. Zdancewic, “Preserving Secrecy Under Refinement,” presented at the ICALP: Automata, Languages and Programming, 2006, pp. 107–118.","ista":"Alur R, Cerny P, Zdancewic S. 2006. Preserving Secrecy Under Refinement. ICALP: Automata, Languages and Programming, LNCS, , 107–118.","chicago":"Alur, Rajeev, Pavol Cerny, and Steve Zdancewic. “Preserving Secrecy Under Refinement,” 107–18. Springer, 2006. <a href=\"https://doi.org/1543\">https://doi.org/1543</a>.","short":"R. Alur, P. Cerny, S. Zdancewic, in:, Springer, 2006, pp. 107–118.","ama":"Alur R, Cerny P, Zdancewic S. Preserving Secrecy Under Refinement. In: Springer; 2006:107-118. doi:<a href=\"https://doi.org/1543\">1543</a>","apa":"Alur, R., Cerny, P., &#38; Zdancewic, S. (2006). Preserving Secrecy Under Refinement (pp. 107–118). Presented at the ICALP: Automata, Languages and Programming, Springer. <a href=\"https://doi.org/1543\">https://doi.org/1543</a>","mla":"Alur, Rajeev, et al. <i>Preserving Secrecy Under Refinement</i>. Springer, 2006, pp. 107–18, doi:<a href=\"https://doi.org/1543\">1543</a>."},"alternative_title":["LNCS"]},{"publisher":"Springer","page":"17 - 30","quality_controlled":0,"title":"Antichains: A new algorithm for checking universality of finite automata","intvolume":"      4144","acknowledgement":"This research was supported in part by the NSF grants CCR-0234690 and CCR-0225610, and the Belgian FNRS grant 2.4530.02 of the FRFC project “Centre Fédéré en Vérification.”","doi":"10.1007/11817963_5","alternative_title":["LNCS"],"citation":{"ieee":"M. De Wulf, L. Doyen, T. A. Henzinger, and J. Raskin, “Antichains: A new algorithm for checking universality of finite automata,” presented at the CAV: Computer Aided Verification, 2006, vol. 4144, pp. 17–30.","ista":"De Wulf M, Doyen L, Henzinger TA, Raskin J. 2006. Antichains: A new algorithm for checking universality of finite automata. CAV: Computer Aided Verification, LNCS, vol. 4144, 17–30.","chicago":"De Wulf, Martin, Laurent Doyen, Thomas A Henzinger, and Jean Raskin. “Antichains: A New Algorithm for Checking Universality of Finite Automata,” 4144:17–30. Springer, 2006. <a href=\"https://doi.org/10.1007/11817963_5\">https://doi.org/10.1007/11817963_5</a>.","ama":"De Wulf M, Doyen L, Henzinger TA, Raskin J. Antichains: A new algorithm for checking universality of finite automata. In: Vol 4144. Springer; 2006:17-30. doi:<a href=\"https://doi.org/10.1007/11817963_5\">10.1007/11817963_5</a>","short":"M. De Wulf, L. Doyen, T.A. Henzinger, J. Raskin, in:, Springer, 2006, pp. 17–30.","apa":"De Wulf, M., Doyen, L., Henzinger, T. A., &#38; Raskin, J. (2006). Antichains: A new algorithm for checking universality of finite automata (Vol. 4144, pp. 17–30). Presented at the CAV: Computer Aided Verification, Springer. <a href=\"https://doi.org/10.1007/11817963_5\">https://doi.org/10.1007/11817963_5</a>","mla":"De Wulf, Martin, et al. <i>Antichains: A New Algorithm for Checking Universality of Finite Automata</i>. Vol. 4144, Springer, 2006, pp. 17–30, doi:<a href=\"https://doi.org/10.1007/11817963_5\">10.1007/11817963_5</a>."},"abstract":[{"lang":"eng","text":"We propose and evaluate a new algorithm for checking the universality of nondeterministic finite automata. In contrast to the standard algorithm, which uses the subset construction to explicitly determinize the automaton, we keep the determinization step implicit. Our algorithm computes the least fixed point of a monotone function on the lattice of antichains of state sets. We evaluate the performance of our algorithm experimentally using the random automaton model recently proposed by Tabakov and Vardi. We show that on the difficult instances of this probabilistic model, the antichain algorithm outperforms the standard one by several orders of magnitude. We also show how variations of the antichain method can be used for solving the language-inclusion problem for nondeterministic finite automata, and the emptiness problem for alternating finite automata."}],"status":"public","date_updated":"2021-01-12T07:56:45Z","month":"08","_id":"4406","date_published":"2006-08-08T00:00:00Z","publist_id":"326","publication_status":"published","date_created":"2018-12-11T12:08:41Z","volume":4144,"extern":1,"conference":{"name":"CAV: Computer Aided Verification"},"day":"08","type":"conference","author":[{"full_name":"De Wulf, Martin","first_name":"Martin","last_name":"De Wulf"},{"full_name":"Doyen, Laurent","last_name":"Doyen","first_name":"Laurent"},{"full_name":"Thomas Henzinger","last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Jean","last_name":"Raskin","full_name":"Raskin, Jean-François"}],"year":"2006"},{"volume":4085,"publication_status":"published","date_created":"2018-12-11T12:08:49Z","extern":1,"author":[{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"},{"last_name":"Sifakis","first_name":"Joseph","full_name":"Sifakis, Joseph"}],"type":"conference","conference":{"name":"FM: Formal Methods"},"day":"10","year":"2006","page":"1 - 15","publisher":"Springer","title":"The embedded systems design challenge","quality_controlled":0,"intvolume":"      4085","citation":{"ista":"Henzinger TA, Sifakis J. 2006. The embedded systems design challenge. FM: Formal Methods, LNCS, vol. 4085, 1–15.","ieee":"T. A. Henzinger and J. Sifakis, “The embedded systems design challenge,” presented at the FM: Formal Methods, 2006, vol. 4085, pp. 1–15.","apa":"Henzinger, T. A., &#38; Sifakis, J. (2006). The embedded systems design challenge (Vol. 4085, pp. 1–15). Presented at the FM: Formal Methods, Springer. <a href=\"https://doi.org/10.1007/11813040_1\">https://doi.org/10.1007/11813040_1</a>","mla":"Henzinger, Thomas A., and Joseph Sifakis. <i>The Embedded Systems Design Challenge</i>. Vol. 4085, Springer, 2006, pp. 1–15, doi:<a href=\"https://doi.org/10.1007/11813040_1\">10.1007/11813040_1</a>.","chicago":"Henzinger, Thomas A, and Joseph Sifakis. “The Embedded Systems Design Challenge,” 4085:1–15. Springer, 2006. <a href=\"https://doi.org/10.1007/11813040_1\">https://doi.org/10.1007/11813040_1</a>.","short":"T.A. Henzinger, J. Sifakis, in:, Springer, 2006, pp. 1–15.","ama":"Henzinger TA, Sifakis J. The embedded systems design challenge. In: Vol 4085. Springer; 2006:1-15. doi:<a href=\"https://doi.org/10.1007/11813040_1\">10.1007/11813040_1</a>"},"alternative_title":["LNCS"],"abstract":[{"text":"We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap between safety-critical and best-effort engineering practices. We call for a coherent scientific foundation for embedded systems design, and we discuss a few key demands on such a foundation: the need for encompassing several manifestations of heterogeneity, and the need for constructivity in design. We believe that the development of a satisfactory Embedded Systems Design Science provides a timely challenge and opportunity for reinvigorating computer science.","lang":"eng"}],"acknowledgement":"Supported in part by the ARTIST2 European Network of Excellence on Embedded Systems Design, by the NSF ITR Center on Hybrid and Embedded Software Systems (CHESS), and by the SNSF NCCR on Mobile Information and Communication Systems (MICS).","doi":"10.1007/11813040_1","status":"public","month":"08","date_updated":"2021-01-12T07:56:55Z","_id":"4431","date_published":"2006-08-10T00:00:00Z","publist_id":"301"},{"date_created":"2018-12-11T12:08:49Z","publication_status":"published","volume":4202,"extern":1,"year":"2006","day":"19","conference":{"name":"FORMATS: Formal Modeling and Analysis of Timed Systems"},"type":"conference","author":[{"full_name":"Thomas Henzinger","first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Prabhu, Vinayak S","last_name":"Prabhu","first_name":"Vinayak"}],"quality_controlled":0,"title":"Timed alternating-time temporal logic","publisher":"Springer","page":"1 - 17","acknowledgement":"This research was supported in part by the NSF grants CCR-0208875, CCR-0225610, and CCR-0234690.","doi":"10.1007/11867340_1","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"We add freeze quantifiers to the game logic ATL in order to specify real-time objectives for games played on timed structures. We define the semantics of the resulting logic TATL by restricting the players to physically meaningful strategies, which do not prevent time from diverging. We show that TATL can be model checked over timed automaton games. We also specify timed optimization problems for physically meaningful strategies, and we show that for timed automaton games, the optimal answers can be approximated to within any degree of precision."}],"citation":{"ama":"Henzinger TA, Prabhu V. Timed alternating-time temporal logic. In: Vol 4202. Springer; 2006:1-17. doi:<a href=\"https://doi.org/10.1007/11867340_1\">10.1007/11867340_1</a>","short":"T.A. Henzinger, V. Prabhu, in:, Springer, 2006, pp. 1–17.","chicago":"Henzinger, Thomas A, and Vinayak Prabhu. “Timed Alternating-Time Temporal Logic,” 4202:1–17. Springer, 2006. <a href=\"https://doi.org/10.1007/11867340_1\">https://doi.org/10.1007/11867340_1</a>.","mla":"Henzinger, Thomas A., and Vinayak Prabhu. <i>Timed Alternating-Time Temporal Logic</i>. Vol. 4202, Springer, 2006, pp. 1–17, doi:<a href=\"https://doi.org/10.1007/11867340_1\">10.1007/11867340_1</a>.","apa":"Henzinger, T. A., &#38; Prabhu, V. (2006). Timed alternating-time temporal logic (Vol. 4202, pp. 1–17). Presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Springer. <a href=\"https://doi.org/10.1007/11867340_1\">https://doi.org/10.1007/11867340_1</a>","ieee":"T. A. Henzinger and V. Prabhu, “Timed alternating-time temporal logic,” presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, 2006, vol. 4202, pp. 1–17.","ista":"Henzinger TA, Prabhu V. 2006. Timed alternating-time temporal logic. FORMATS: Formal Modeling and Analysis of Timed Systems, LNCS, vol. 4202, 1–17."},"intvolume":"      4202","date_updated":"2021-01-12T07:56:56Z","month":"09","status":"public","publist_id":"296","date_published":"2006-09-19T00:00:00Z","_id":"4432"},{"year":"2006","type":"conference","day":"24","conference":{"name":"RTAS: Real-time and Embedded Technology and Applications Symposium"},"author":[{"last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"},{"first_name":"Slobodan","last_name":"Matic","full_name":"Matic, Slobodan"}],"publication_status":"published","date_created":"2018-12-11T12:08:50Z","extern":1,"date_updated":"2021-01-12T07:56:57Z","month":"04","status":"public","date_published":"2006-04-24T00:00:00Z","publist_id":"294","_id":"4436","quality_controlled":0,"title":"An interface algebra for real-time components","publisher":"IEEE","page":"253 - 266","doi":"10.1109/RTAS.2006.11","citation":{"apa":"Henzinger, T. A., &#38; Matic, S. (2006). An interface algebra for real-time components (pp. 253–266). Presented at the RTAS: Real-time and Embedded Technology and Applications Symposium, IEEE. <a href=\"https://doi.org/10.1109/RTAS.2006.11\">https://doi.org/10.1109/RTAS.2006.11</a>","mla":"Henzinger, Thomas A., and Slobodan Matic. <i>An Interface Algebra for Real-Time Components</i>. IEEE, 2006, pp. 253–66, doi:<a href=\"https://doi.org/10.1109/RTAS.2006.11\">10.1109/RTAS.2006.11</a>.","chicago":"Henzinger, Thomas A, and Slobodan Matic. “An Interface Algebra for Real-Time Components,” 253–66. IEEE, 2006. <a href=\"https://doi.org/10.1109/RTAS.2006.11\">https://doi.org/10.1109/RTAS.2006.11</a>.","ama":"Henzinger TA, Matic S. An interface algebra for real-time components. In: IEEE; 2006:253-266. doi:<a href=\"https://doi.org/10.1109/RTAS.2006.11\">10.1109/RTAS.2006.11</a>","short":"T.A. Henzinger, S. Matic, in:, IEEE, 2006, pp. 253–266.","ista":"Henzinger TA, Matic S. 2006. An interface algebra for real-time components. RTAS: Real-time and Embedded Technology and Applications Symposium, 253–266.","ieee":"T. A. Henzinger and S. Matic, “An interface algebra for real-time components,” presented at the RTAS: Real-time and Embedded Technology and Applications Symposium, 2006, pp. 253–266."},"abstract":[{"lang":"eng","text":"We present an assume-guarantee interface algebra for real-time components. In our formalism a component implements a set of task sequences that share a resource. A component interface consists of an arrival rate function and a latency for each task sequence, and a capacity function for the shared resource. The interface specifies that the component guarantees certain task latencies depending on assumptions about task arrival rates and allocated resource capacities. Our algebra defines compatibility and refinement relations on interfaces. Interface compatibility can be checked on partial designs, even when some component interfaces are yet unknown. In this case interface composition computes as new assumptions the weakest constraints on the unknown components that are necessary to satisfy the specified guarantees. Interface refinement is defined in a way that ensures that compatible interfaces can be refined and implemented independently. Our algebra thus formalizes an interface-based design methodology that supports both the incremental addition of new components and the independent stepwise refinement of existing components. We demonstrate the flexibility and efficiency of the framework through simulation experiments."}]},{"type":"conference","conference":{"name":"CSL: Computer Science Logic"},"day":"20","author":[{"first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"},{"full_name":"Piterman, Nir","first_name":"Nir","last_name":"Piterman"}],"year":"2006","extern":1,"publication_status":"published","date_created":"2018-12-11T12:08:51Z","volume":4207,"_id":"4437","date_published":"2006-09-20T00:00:00Z","publist_id":"295","status":"public","date_updated":"2021-01-12T07:56:58Z","month":"09","intvolume":"      4207","acknowledgement":"This research was supported in part by the Swiss National Science Foundation.","doi":"10.1007/11874683_26","alternative_title":["LNCS"],"citation":{"ista":"Henzinger TA, Piterman N. 2006. Solving games without determinization. CSL: Computer Science Logic, LNCS, vol. 4207, 395–410.","ieee":"T. A. Henzinger and N. Piterman, “Solving games without determinization,” presented at the CSL: Computer Science Logic, 2006, vol. 4207, pp. 395–410.","apa":"Henzinger, T. A., &#38; Piterman, N. (2006). Solving games without determinization (Vol. 4207, pp. 395–410). Presented at the CSL: Computer Science Logic, Springer. <a href=\"https://doi.org/10.1007/11874683_26\">https://doi.org/10.1007/11874683_26</a>","mla":"Henzinger, Thomas A., and Nir Piterman. <i>Solving Games without Determinization</i>. Vol. 4207, Springer, 2006, pp. 395–410, doi:<a href=\"https://doi.org/10.1007/11874683_26\">10.1007/11874683_26</a>.","chicago":"Henzinger, Thomas A, and Nir Piterman. “Solving Games without Determinization,” 4207:395–410. Springer, 2006. <a href=\"https://doi.org/10.1007/11874683_26\">https://doi.org/10.1007/11874683_26</a>.","short":"T.A. Henzinger, N. Piterman, in:, Springer, 2006, pp. 395–410.","ama":"Henzinger TA, Piterman N. Solving games without determinization. In: Vol 4207. Springer; 2006:395-410. doi:<a href=\"https://doi.org/10.1007/11874683_26\">10.1007/11874683_26</a>"},"abstract":[{"text":"The synthesis of reactive systems requires the solution of two-player games on graphs with ω-regular objectives. When the objective is specified by a linear temporal logic formula or nondeterministic Büchi automaton, then previous algorithms for solving the game require the construction of an equivalent deterministic automaton. However, determinization for automata on infinite words is extremely complicated, and current implementations fail to produce deterministic automata even for relatively small inputs. We show how to construct, from a given nondeterministic Büchi automaton, an equivalent nondeterministic parity automaton that is good for solving games with objective . The main insight is that a nondeterministic automaton is good for solving games if it fairly simulates the equivalent deterministic automaton. In this way, we omit the determinization step in game solving and reactive synthesis. The fact that our automata are nondeterministic makes them surprisingly simple, amenable to symbolic implementation, and allows an incremental search for winning strategies.","lang":"eng"}],"publisher":"Springer","page":"395 - 410","quality_controlled":0,"title":"Solving games without determinization"},{"status":"public","date_updated":"2021-01-12T07:57:04Z","month":"03","_id":"4451","publication":"Theoretical Computer Science","date_published":"2006-03-28T00:00:00Z","publist_id":"276","publisher":"Elsevier","page":"173 - 186","quality_controlled":0,"title":"On the universal and existential fragments of the mu-calculus","intvolume":"       354","doi":"10.1016/j.tcs.2005.11.015","citation":{"ieee":"T. A. Henzinger, O. Kupferman, and R. Majumdar, “On the universal and existential fragments of the mu-calculus,” <i>Theoretical Computer Science</i>, vol. 354, no. 2. Elsevier, pp. 173–186, 2006.","ista":"Henzinger TA, Kupferman O, Majumdar R. 2006. On the universal and existential fragments of the mu-calculus. Theoretical Computer Science. 354(2), 173–186.","ama":"Henzinger TA, Kupferman O, Majumdar R. On the universal and existential fragments of the mu-calculus. <i>Theoretical Computer Science</i>. 2006;354(2):173-186. doi:<a href=\"https://doi.org/10.1016/j.tcs.2005.11.015\">10.1016/j.tcs.2005.11.015</a>","short":"T.A. Henzinger, O. Kupferman, R. Majumdar, Theoretical Computer Science 354 (2006) 173–186.","chicago":"Henzinger, Thomas A, Orna Kupferman, and Ritankar Majumdar. “On the Universal and Existential Fragments of the Mu-Calculus.” <i>Theoretical Computer Science</i>. Elsevier, 2006. <a href=\"https://doi.org/10.1016/j.tcs.2005.11.015\">https://doi.org/10.1016/j.tcs.2005.11.015</a>.","mla":"Henzinger, Thomas A., et al. “On the Universal and Existential Fragments of the Mu-Calculus.” <i>Theoretical Computer Science</i>, vol. 354, no. 2, Elsevier, 2006, pp. 173–86, doi:<a href=\"https://doi.org/10.1016/j.tcs.2005.11.015\">10.1016/j.tcs.2005.11.015</a>.","apa":"Henzinger, T. A., Kupferman, O., &#38; Majumdar, R. (2006). On the universal and existential fragments of the mu-calculus. <i>Theoretical Computer Science</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.tcs.2005.11.015\">https://doi.org/10.1016/j.tcs.2005.11.015</a>"},"abstract":[{"lang":"eng","text":"One source of complexity in the μ-calculus is its ability to specify an unbounded number of switches between universal (AX) and existential (EX) branching modes. We therefore study the problems of satisfiability, validity, model checking, and implication for the universal and existential fragments of the μ-calculus, in which only one branching mode is allowed. The universal fragment is rich enough to express most specifications of interest, and therefore improved algorithms are of practical importance. We show that while the satisfiability and validity problems become indeed simpler for the existential and universal fragments, this is, unfortunately, not the case for model checking and implication. We also show the corresponding results for the alternation-free fragment of the μ-calculus, where no alternations between least and greatest fixed points are allowed. Our results imply that efforts to find a polynomial-time model-checking algorithm for the μ-calculus can be replaced by efforts to find such an algorithm for the universal or existential fragment."}],"type":"journal_article","day":"28","author":[{"full_name":"Thomas Henzinger","last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Kupferman, Orna","last_name":"Kupferman","first_name":"Orna"},{"full_name":"Majumdar, Ritankar S","first_name":"Ritankar","last_name":"Majumdar"}],"year":"2006","issue":"2","publication_status":"published","date_created":"2018-12-11T12:08:55Z","volume":354,"extern":1},{"publisher":"ACM","page":"117 - 127","quality_controlled":0,"title":"Synergy: A new algorithm for property checking","doi":"10.1145/1181775.1181790","abstract":[{"lang":"eng","text":"We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and for these programs the property checking problem is undecidable. Two broad approaches to property checking are testing and verification. Testing tries to find inputs and executions which demonstrate violations of the property. Verification tries to construct a formal proof which shows that all executions of the program satisfy the property. Testing works best when errors are easy to find, but it is often difficult to achieve sufficient coverage for correct programs. On the other hand, verification methods are most successful when proofs are easy to find, but they are often inefficient at discovering errors. We propose a new algorithm, Synergy, which combines testing and verification. Synergy unifies several ideas from the literature, including counterexample-guided model checking, directed testing, and partition refinement.This paper presents a description of the Synergy algorithm, its theoretical properties, a comparison with related algorithms, and a prototype implementation called Yogi."}],"citation":{"apa":"Gulavani, B., Henzinger, T. A., Kannan, Y., Nori, A., &#38; Rajamani, S. (2006). Synergy: A new algorithm for property checking (pp. 117–127). Presented at the FSE: Foundations of Software Engineering, ACM. <a href=\"https://doi.org/10.1145/1181775.1181790\">https://doi.org/10.1145/1181775.1181790</a>","mla":"Gulavani, Bhargav, et al. <i>Synergy: A New Algorithm for Property Checking</i>. ACM, 2006, pp. 117–27, doi:<a href=\"https://doi.org/10.1145/1181775.1181790\">10.1145/1181775.1181790</a>.","chicago":"Gulavani, Bhargav, Thomas A Henzinger, Yamini Kannan, Aditya Nori, and Sriram Rajamani. “Synergy: A New Algorithm for Property Checking,” 117–27. ACM, 2006. <a href=\"https://doi.org/10.1145/1181775.1181790\">https://doi.org/10.1145/1181775.1181790</a>.","ama":"Gulavani B, Henzinger TA, Kannan Y, Nori A, Rajamani S. Synergy: A new algorithm for property checking. In: ACM; 2006:117-127. doi:<a href=\"https://doi.org/10.1145/1181775.1181790\">10.1145/1181775.1181790</a>","short":"B. Gulavani, T.A. Henzinger, Y. Kannan, A. Nori, S. Rajamani, in:, ACM, 2006, pp. 117–127.","ista":"Gulavani B, Henzinger TA, Kannan Y, Nori A, Rajamani S. 2006. Synergy: A new algorithm for property checking. FSE: Foundations of Software Engineering, 117–127.","ieee":"B. Gulavani, T. A. Henzinger, Y. Kannan, A. Nori, and S. Rajamani, “Synergy: A new algorithm for property checking,” presented at the FSE: Foundations of Software Engineering, 2006, pp. 117–127."},"status":"public","date_updated":"2021-01-12T07:59:26Z","month":"01","_id":"4523","publist_id":"206","date_published":"2006-01-01T00:00:00Z","publication_status":"published","date_created":"2018-12-11T12:09:18Z","extern":1,"type":"conference","day":"01","conference":{"name":"FSE: Foundations of Software Engineering"},"author":[{"full_name":"Gulavani, Bhargav S","first_name":"Bhargav","last_name":"Gulavani"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"},{"last_name":"Kannan","first_name":"Yamini","full_name":"Kannan, Yamini"},{"first_name":"Aditya","last_name":"Nori","full_name":"Nori, Aditya V"},{"first_name":"Sriram","last_name":"Rajamani","full_name":"Rajamani, Sriram K"}],"year":"2006"},{"abstract":[{"text":"We designed and implemented a new programming language called Hierarchical Timing Language (HTL) for hard realtime systems. Critical timing constraints are specified within the language,and ensured by the compiler. Programs in HTL are extensible in two dimensions without changing their timing behavior: new program modules can be added, and individual program tasks can be refined. The mechanism supporting time invariance under parallel composition is that different program modules communicate at specified instances of time. Time invariance under refinement is achieved by conservative scheduling of the top level. HTL is a coordination language, in that individual tasks can be implemented in &quot;foreign&quot; languages. As a case study, we present a distributed HTL implementation of an automotive steer-by-wire controller.","lang":"eng"}],"citation":{"ama":"Ghosal A, Henzinger TA, Iercan D, Kirsch C, Sangiovanni Vincentelli A. A hierarchical coordination language for interacting real-time tasks. In: ACM; 2006:132-141. doi:<a href=\"https://doi.org/10.1145/1176887.1176907\">10.1145/1176887.1176907</a>","short":"A. Ghosal, T.A. Henzinger, D. Iercan, C. Kirsch, A. Sangiovanni Vincentelli, in:, ACM, 2006, pp. 132–141.","chicago":"Ghosal, Arkadeb, Thomas A Henzinger, Daniel Iercan, Christoph Kirsch, and Alberto Sangiovanni Vincentelli. “A Hierarchical Coordination Language for Interacting Real-Time Tasks,” 132–41. ACM, 2006. <a href=\"https://doi.org/10.1145/1176887.1176907\">https://doi.org/10.1145/1176887.1176907</a>.","mla":"Ghosal, Arkadeb, et al. <i>A Hierarchical Coordination Language for Interacting Real-Time Tasks</i>. ACM, 2006, pp. 132–41, doi:<a href=\"https://doi.org/10.1145/1176887.1176907\">10.1145/1176887.1176907</a>.","apa":"Ghosal, A., Henzinger, T. A., Iercan, D., Kirsch, C., &#38; Sangiovanni Vincentelli, A. (2006). A hierarchical coordination language for interacting real-time tasks (pp. 132–141). Presented at the EMSOFT: Embedded Software , ACM. <a href=\"https://doi.org/10.1145/1176887.1176907\">https://doi.org/10.1145/1176887.1176907</a>","ieee":"A. Ghosal, T. A. Henzinger, D. Iercan, C. Kirsch, and A. Sangiovanni Vincentelli, “A hierarchical coordination language for interacting real-time tasks,” presented at the EMSOFT: Embedded Software , 2006, pp. 132–141.","ista":"Ghosal A, Henzinger TA, Iercan D, Kirsch C, Sangiovanni Vincentelli A. 2006. A hierarchical coordination language for interacting real-time tasks. EMSOFT: Embedded Software , 132–141."},"doi":"10.1145/1176887.1176907","page":"132 - 141","publisher":"ACM","title":"A hierarchical coordination language for interacting real-time tasks","quality_controlled":0,"_id":"4526","publist_id":"201","date_published":"2006-01-01T00:00:00Z","status":"public","month":"01","date_updated":"2021-01-12T07:59:27Z","extern":1,"date_created":"2018-12-11T12:09:18Z","publication_status":"published","author":[{"full_name":"Ghosal, Arkadeb","last_name":"Ghosal","first_name":"Arkadeb"},{"full_name":"Thomas Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A"},{"first_name":"Daniel","last_name":"Iercan","full_name":"Iercan, Daniel"},{"first_name":"Christoph","last_name":"Kirsch","full_name":"Kirsch, Christoph M"},{"last_name":"Sangiovanni Vincentelli","first_name":"Alberto","full_name":"Sangiovanni-Vincentelli, Alberto"}],"day":"01","type":"conference","conference":{"name":"EMSOFT: Embedded Software "},"year":"2006"},{"status":"public","date_updated":"2021-01-12T07:59:28Z","month":"12","_id":"4528","date_published":"2006-12-03T00:00:00Z","publist_id":"197","publisher":"IEEE","page":"1675 - 1682","quality_controlled":0,"title":"Executable biology","doi":"10.1109/WSC.2006.322942","abstract":[{"lang":"eng","text":"Computational modeling of biological systems is becoming increasingly common as scientists attempt to understand biological phenomena in their full complexity. Here we distinguish between two types of biological models mathematical and computational - according to their different representations of biological phenomena and their diverse potential. We call the approach of constructing computational models of biological systems executable biology, as it focuses on the design of executable computer algorithms that mimic biological phenomena. We give an overview of the main modeling efforts in this direction, and discuss some of the new challenges that executable biology poses for computer science and biology. We argue that for executable biology to reach its full potential as a mainstream biological technique, formal and algorithmic approaches must be integrated into biological research, driving biology towards a more precise engineering discipline."}],"citation":{"ieee":"J. Fisher and T. A. Henzinger, “Executable biology,” presented at the WSC: Winter Simulation Conference, 2006, pp. 1675–1682.","ista":"Fisher J, Henzinger TA. 2006. Executable biology. WSC: Winter Simulation Conference, 1675–1682.","ama":"Fisher J, Henzinger TA. Executable biology. In: IEEE; 2006:1675-1682. doi:<a href=\"https://doi.org/10.1109/WSC.2006.322942\">10.1109/WSC.2006.322942</a>","short":"J. Fisher, T.A. Henzinger, in:, IEEE, 2006, pp. 1675–1682.","chicago":"Fisher, Jasmin, and Thomas A Henzinger. “Executable Biology,” 1675–82. IEEE, 2006. <a href=\"https://doi.org/10.1109/WSC.2006.322942\">https://doi.org/10.1109/WSC.2006.322942</a>.","mla":"Fisher, Jasmin, and Thomas A. Henzinger. <i>Executable Biology</i>. IEEE, 2006, pp. 1675–82, doi:<a href=\"https://doi.org/10.1109/WSC.2006.322942\">10.1109/WSC.2006.322942</a>.","apa":"Fisher, J., &#38; Henzinger, T. A. (2006). Executable biology (pp. 1675–1682). Presented at the WSC: Winter Simulation Conference, IEEE. <a href=\"https://doi.org/10.1109/WSC.2006.322942\">https://doi.org/10.1109/WSC.2006.322942</a>"},"conference":{"name":"WSC: Winter Simulation Conference"},"type":"conference","day":"03","author":[{"first_name":"Jasmin","last_name":"Fisher","full_name":"Fisher, Jasmin"},{"full_name":"Thomas Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger"}],"year":"2006","publication_status":"published","date_created":"2018-12-11T12:09:19Z","extern":1},{"publication_status":"published","date_created":"2018-12-11T12:09:22Z","volume":3884,"extern":1,"year":"2006","conference":{"name":"STACS: Theoretical Aspects of Computer Science"},"type":"conference","day":"14","author":[{"full_name":"Krishnendu Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee"},{"first_name":"Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"}],"quality_controlled":0,"title":"Strategy improvement and randomized subexponential algorithms for stochastic parity games","publisher":"Springer","page":"512 - 523","doi":"10.1007/11672142_42","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"A stochastic graph game is played by two players on a game graph with probabilistic transitions. We consider stochastic graph games with ω-regular winning conditions specified as parity objectives. These games lie in NP ∩ coNP. We present a strategy improvement algorithm for stochastic parity games; this is the first non-brute-force algorithm for solving these games. From the strategy improvement algorithm we obtain a randomized subexponential-time algorithm to solve such games."}],"citation":{"apa":"Chatterjee, K., &#38; Henzinger, T. A. (2006). Strategy improvement and randomized subexponential algorithms for stochastic parity games (Vol. 3884, pp. 512–523). Presented at the STACS: Theoretical Aspects of Computer Science, Springer. <a href=\"https://doi.org/10.1007/11672142_42\">https://doi.org/10.1007/11672142_42</a>","mla":"Chatterjee, Krishnendu, and Thomas A. Henzinger. <i>Strategy Improvement and Randomized Subexponential Algorithms for Stochastic Parity Games</i>. Vol. 3884, Springer, 2006, pp. 512–23, doi:<a href=\"https://doi.org/10.1007/11672142_42\">10.1007/11672142_42</a>.","chicago":"Chatterjee, Krishnendu, and Thomas A Henzinger. “Strategy Improvement and Randomized Subexponential Algorithms for Stochastic Parity Games,” 3884:512–23. Springer, 2006. <a href=\"https://doi.org/10.1007/11672142_42\">https://doi.org/10.1007/11672142_42</a>.","ama":"Chatterjee K, Henzinger TA. Strategy improvement and randomized subexponential algorithms for stochastic parity games. In: Vol 3884. Springer; 2006:512-523. doi:<a href=\"https://doi.org/10.1007/11672142_42\">10.1007/11672142_42</a>","short":"K. Chatterjee, T.A. Henzinger, in:, Springer, 2006, pp. 512–523.","ista":"Chatterjee K, Henzinger TA. 2006. Strategy improvement and randomized subexponential algorithms for stochastic parity games. STACS: Theoretical Aspects of Computer Science, LNCS, vol. 3884, 512–523.","ieee":"K. Chatterjee and T. A. Henzinger, “Strategy improvement and randomized subexponential algorithms for stochastic parity games,” presented at the STACS: Theoretical Aspects of Computer Science, 2006, vol. 3884, pp. 512–523."},"intvolume":"      3884","date_updated":"2021-01-12T07:59:32Z","month":"02","status":"public","publist_id":"184","date_published":"2006-02-14T00:00:00Z","_id":"4538"},{"status":"public","date_updated":"2021-01-12T07:59:32Z","month":"03","_id":"4539","date_published":"2006-03-15T00:00:00Z","publist_id":"183","publisher":"Springer","page":"257 - 271","quality_controlled":0,"title":"Finitary winning in omega-regular games","intvolume":"      3920","doi":"10.1007/11691372_17","acknowledgement":"This research was supported in part by the AFOSR MURI grant F49620-00-1-0327 and the NSF ITR grant CCR-0225610.","alternative_title":["LNCS"],"citation":{"mla":"Chatterjee, Krishnendu, and Thomas A. Henzinger. <i>Finitary Winning in Omega-Regular Games</i>. Vol. 3920, Springer, 2006, pp. 257–71, doi:<a href=\"https://doi.org/10.1007/11691372_17\">10.1007/11691372_17</a>.","apa":"Chatterjee, K., &#38; Henzinger, T. A. (2006). Finitary winning in omega-regular games (Vol. 3920, pp. 257–271). Presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Springer. <a href=\"https://doi.org/10.1007/11691372_17\">https://doi.org/10.1007/11691372_17</a>","ama":"Chatterjee K, Henzinger TA. Finitary winning in omega-regular games. In: Vol 3920. Springer; 2006:257-271. doi:<a href=\"https://doi.org/10.1007/11691372_17\">10.1007/11691372_17</a>","short":"K. Chatterjee, T.A. Henzinger, in:, Springer, 2006, pp. 257–271.","chicago":"Chatterjee, Krishnendu, and Thomas A Henzinger. “Finitary Winning in Omega-Regular Games,” 3920:257–71. Springer, 2006. <a href=\"https://doi.org/10.1007/11691372_17\">https://doi.org/10.1007/11691372_17</a>.","ista":"Chatterjee K, Henzinger TA. 2006. Finitary winning in omega-regular games. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 3920, 257–271.","ieee":"K. Chatterjee and T. A. Henzinger, “Finitary winning in omega-regular games,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, 2006, vol. 3920, pp. 257–271."},"abstract":[{"lang":"eng","text":"Games on graphs with ω-regular objectives provide a model for the control and synthesis of reactive systems. Every ω-regular objective can be decomposed into a safety part and a liveness part. The liveness part ensures that something good happens “eventually.” Two main strengths of the classical, infinite-limit formulation of liveness are robustness (independence from the granularity of transitions) and simplicity (abstraction of complicated time bounds). However, the classical liveness formulation suffers from the drawback that the time until something good happens may be unbounded. A stronger formulation of liveness, so-called finitary liveness, overcomes this drawback, while still retaining robustness and simplicity. Finitary liveness requires that there exists an unknown, fixed bound b such that something good happens within b transitions. While for one-shot liveness (reachability) objectives, classical and finitary liveness coincide, for repeated liveness (Büchi) objectives, the finitary formulation is strictly stronger. In this work we study games with finitary parity and Streett (fairness) objectives. We prove the determinacy of these games, present algorithms for solving these games, and characterize the memory requirements of winning strategies. Our algorithms can be used, for example, for synthesizing controllers that do not let the response time of a system increase without bound."}],"type":"conference","conference":{"name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems"},"day":"15","author":[{"full_name":"Krishnendu Chatterjee","first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"}],"year":"2006","date_created":"2018-12-11T12:09:22Z","publication_status":"published","volume":3920,"extern":1},{"extern":1,"date_created":"2018-12-11T12:09:26Z","publication_status":"published","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Krishnendu Chatterjee"},{"first_name":"Luca","last_name":"De Alfaro","full_name":"de Alfaro, Luca"},{"full_name":"Faella, Marco","last_name":"Faella","first_name":"Marco"},{"first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"},{"full_name":"Majumdar, Ritankar S","last_name":"Majumdar","first_name":"Ritankar"},{"full_name":"Stoelinga, Mariëlle","first_name":"Mariëlle","last_name":"Stoelinga"}],"conference":{"name":"QEST: Quantitative Evaluation of Systems"},"type":"conference","day":"01","year":"2006","citation":{"ama":"Chatterjee K, De Alfaro L, Faella M, Henzinger TA, Majumdar R, Stoelinga M. Compositional quantitative reasoning. In: IEEE; 2006:179-188. doi:<a href=\"https://doi.org/10.1109/QEST.2006.11\">10.1109/QEST.2006.11</a>","short":"K. Chatterjee, L. De Alfaro, M. Faella, T.A. Henzinger, R. Majumdar, M. Stoelinga, in:, IEEE, 2006, pp. 179–188.","chicago":"Chatterjee, Krishnendu, Luca De Alfaro, Marco Faella, Thomas A Henzinger, Ritankar Majumdar, and Mariëlle Stoelinga. “Compositional Quantitative Reasoning,” 179–88. IEEE, 2006. <a href=\"https://doi.org/10.1109/QEST.2006.11\">https://doi.org/10.1109/QEST.2006.11</a>.","mla":"Chatterjee, Krishnendu, et al. <i>Compositional Quantitative Reasoning</i>. IEEE, 2006, pp. 179–88, doi:<a href=\"https://doi.org/10.1109/QEST.2006.11\">10.1109/QEST.2006.11</a>.","apa":"Chatterjee, K., De Alfaro, L., Faella, M., Henzinger, T. A., Majumdar, R., &#38; Stoelinga, M. (2006). Compositional quantitative reasoning (pp. 179–188). Presented at the QEST: Quantitative Evaluation of Systems, IEEE. <a href=\"https://doi.org/10.1109/QEST.2006.11\">https://doi.org/10.1109/QEST.2006.11</a>","ieee":"K. Chatterjee, L. De Alfaro, M. Faella, T. A. Henzinger, R. Majumdar, and M. Stoelinga, “Compositional quantitative reasoning,” presented at the QEST: Quantitative Evaluation of Systems, 2006, pp. 179–188.","ista":"Chatterjee K, De Alfaro L, Faella M, Henzinger TA, Majumdar R, Stoelinga M. 2006. Compositional quantitative reasoning. QEST: Quantitative Evaluation of Systems, 179–188."},"abstract":[{"lang":"eng","text":"We present a compositional theory of system verification, where specifications assign real-numbered costs to systems. These costs can express a wide variety of quantitative system properties, such as resource consumption, price, or a measure of how well a system satisfies its specification. The theory supports the composition of systems and specifications, and the hiding of variables. Boolean refinement relations are replaced by real-numbered distances between descriptions of a system at different levels of detail. We show that the classical Boolean rules for compositional reasoning have quantitative counterparts in our setting. While our general theory allows costs to be specified by arbitrary cost functions, we also consider a class of linear cost functions, which give rise to an instance of our framework where all operations are computable in polynomial time."}],"doi":"10.1109/QEST.2006.11","acknowledgement":"Supported in part by the NSF grants CCR-0234690, CCR-0208875, and CCR-0225610; by the NSF grant CCR-0132780 and ARP grant SC20051123.","page":"179 - 188","publisher":"IEEE","title":"Compositional quantitative reasoning","quality_controlled":0,"_id":"4549","date_published":"2006-09-01T00:00:00Z","publist_id":"163","status":"public","month":"09","date_updated":"2021-01-12T07:59:37Z"},{"extern":1,"volume":365,"date_created":"2018-12-11T12:09:26Z","publication_status":"published","issue":"1-2","year":"2006","author":[{"full_name":"Krishnendu Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Thomas Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724"},{"full_name":"Jurdziński, Marcin","last_name":"Jurdziński","first_name":"Marcin"}],"type":"journal_article","day":"07","abstract":[{"lang":"eng","text":"In 2-player non-zero-sum games, Nash equilibria capture the options for rational behavior if each player attempts to maximize her payoff. In contrast to classical game theory, we consider lexicographic objectives: first, each player tries to maximize her own payoff, and then, the player tries to minimize the opponent's payoff. Such objectives arise naturally in the verification of systems with multiple components. There, instead of proving that each component satisfies its specification no matter how the other components behave, it sometimes suffices to prove that each component satisfies its specification provided that the other components satisfy their specifications. We say that a Nash equilibrium is secure if it is an equilibrium with respect to the lexicographic objectives of both players. We prove that in graph games with Borel winning conditions, which include the games that arise in verification, there may be several Nash equilibria, but there is always a unique maximal payoff profile of a secure equilibrium. We show how this equilibrium can be computed in the case of ω-regular winning conditions, and we characterize the memory requirements of strategies that achieve the equilibrium."}],"citation":{"apa":"Chatterjee, K., Henzinger, T. A., &#38; Jurdziński, M. (2006). Games with secure equilibria. <i>Theoretical Computer Science</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.tcs.2006.07.032\">https://doi.org/10.1016/j.tcs.2006.07.032</a>","mla":"Chatterjee, Krishnendu, et al. “Games with Secure Equilibria.” <i>Theoretical Computer Science</i>, vol. 365, no. 1–2, Elsevier, 2006, pp. 67–82, doi:<a href=\"https://doi.org/10.1016/j.tcs.2006.07.032\">10.1016/j.tcs.2006.07.032</a>.","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, and Marcin Jurdziński. “Games with Secure Equilibria.” <i>Theoretical Computer Science</i>. Elsevier, 2006. <a href=\"https://doi.org/10.1016/j.tcs.2006.07.032\">https://doi.org/10.1016/j.tcs.2006.07.032</a>.","ama":"Chatterjee K, Henzinger TA, Jurdziński M. Games with secure equilibria. <i>Theoretical Computer Science</i>. 2006;365(1-2):67-82. doi:<a href=\"https://doi.org/10.1016/j.tcs.2006.07.032\">10.1016/j.tcs.2006.07.032</a>","short":"K. Chatterjee, T.A. Henzinger, M. Jurdziński, Theoretical Computer Science 365 (2006) 67–82.","ista":"Chatterjee K, Henzinger TA, Jurdziński M. 2006. Games with secure equilibria. Theoretical Computer Science. 365(1–2), 67–82.","ieee":"K. Chatterjee, T. A. Henzinger, and M. Jurdziński, “Games with secure equilibria,” <i>Theoretical Computer Science</i>, vol. 365, no. 1–2. Elsevier, pp. 67–82, 2006."},"doi":"10.1016/j.tcs.2006.07.032","intvolume":"       365","title":"Games with secure equilibria","quality_controlled":0,"page":"67 - 82","publisher":"Elsevier","date_published":"2006-08-07T00:00:00Z","publication":"Theoretical Computer Science","publist_id":"164","_id":"4550","month":"08","date_updated":"2021-01-12T07:59:38Z","status":"public"},{"title":"Markov decision processes with multiple objectives","quality_controlled":0,"page":"325 - 336","publisher":"Springer","abstract":[{"text":"We consider Markov decision processes (MDPs) with multiple discounted reward objectives. Such MDPs occur in design problems where one wishes to simultaneously optimize several criteria, for example, latency and power. The possible trade-offs between the different objectives are characterized by the Pareto curve. We show that every Pareto-optimal point can be achieved by a memoryless strategy; however, unlike in the single-objective case, the memoryless strategy may require randomization. Moreover, we show that the Pareto curve can be approximated in polynomial time in the size of the MDP. Additionally, we study the problem if a given value vector is realizable by any strategy, and show that it can be decided in polynomial time; but the question whether it is realizable by a deterministic memoryless strategy is NP-complete. These results provide efficient algorithms for design exploration in MDP models with multiple objectives.\nThis research was supported in part by the AFOSR MURI grant F49620-00-1-0327, and the NSF grants CCR-0225610, CCR-0234690, and CCR-0427202. ","lang":"eng"}],"alternative_title":["LNCS"],"citation":{"chicago":"Chatterjee, Krishnendu, Ritankar Majumdar, and Thomas A Henzinger. “Markov Decision Processes with Multiple Objectives,” 3884:325–36. Springer, 2006. <a href=\"https://doi.org/10.1007/11672142_26\">https://doi.org/10.1007/11672142_26</a>.","short":"K. Chatterjee, R. Majumdar, T.A. Henzinger, in:, Springer, 2006, pp. 325–336.","ama":"Chatterjee K, Majumdar R, Henzinger TA. Markov decision processes with multiple objectives. In: Vol 3884. Springer; 2006:325-336. doi:<a href=\"https://doi.org/10.1007/11672142_26\">10.1007/11672142_26</a>","apa":"Chatterjee, K., Majumdar, R., &#38; Henzinger, T. A. (2006). Markov decision processes with multiple objectives (Vol. 3884, pp. 325–336). Presented at the STACS: Theoretical Aspects of Computer Science, Springer. <a href=\"https://doi.org/10.1007/11672142_26\">https://doi.org/10.1007/11672142_26</a>","mla":"Chatterjee, Krishnendu, et al. <i>Markov Decision Processes with Multiple Objectives</i>. Vol. 3884, Springer, 2006, pp. 325–36, doi:<a href=\"https://doi.org/10.1007/11672142_26\">10.1007/11672142_26</a>.","ieee":"K. Chatterjee, R. Majumdar, and T. A. Henzinger, “Markov decision processes with multiple objectives,” presented at the STACS: Theoretical Aspects of Computer Science, 2006, vol. 3884, pp. 325–336.","ista":"Chatterjee K, Majumdar R, Henzinger TA. 2006. Markov decision processes with multiple objectives. STACS: Theoretical Aspects of Computer Science, LNCS, vol. 3884, 325–336."},"doi":"10.1007/11672142_26","acknowledgement":"This research was supported in part by the AFOSR MURI grant F49620-00-1-0327, and the NSF grants CCR-0225610, CCR-0234690, and CCR-0427202.","intvolume":"      3884","month":"02","date_updated":"2021-01-12T07:59:38Z","status":"public","publist_id":"161","date_published":"2006-02-14T00:00:00Z","_id":"4551","volume":3884,"date_created":"2018-12-11T12:09:26Z","publication_status":"published","extern":1,"year":"2006","author":[{"full_name":"Krishnendu Chatterjee","last_name":"Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Majumdar, Ritankar S","first_name":"Ritankar","last_name":"Majumdar"},{"full_name":"Thomas Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger"}],"type":"conference","day":"14","conference":{"name":"STACS: Theoretical Aspects of Computer Science"}},{"extern":1,"date_created":"2018-12-11T12:09:26Z","publication_status":"published","author":[{"full_name":"Krishnendu Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee"},{"full_name":"de Alfaro, Luca","first_name":"Luca","last_name":"De Alfaro"},{"first_name":"Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger"}],"type":"conference","conference":{"name":"QEST: Quantitative Evaluation of Systems"},"day":"01","year":"2006","abstract":[{"text":"A concurrent reachability game is a two-player game played on a graph: at each state, the players simultaneously and independently select moves; the two moves determine jointly a probability distribution over the successor states. The objective for player 1 consists in reaching a set of target states; the objective for player 2 is to prevent this, so that the game is zero-sum. Our contributions are two-fold. First, we present a simple proof of the fact that in concurrent reachability games, for all epsilon &gt; 0, memoryless epsilon-optimal strategies exist. A memoryless strategy is independent of the history of plays, and an epsilon-optimal strategy achieves the objective with probability within epsilon of the value of the game. In contrast to previous proofs of this fact, which rely on the limit behavior of discounted games using advanced Puisieux series analysis, our proof is elementary and combinatorial. Second, we present a strategy-improvement (a.k.a. policy-iteration) algorithm for concurrent games with reachability objectives.","lang":"eng"}],"citation":{"mla":"Chatterjee, Krishnendu, et al. <i>Strategy Improvement for Concurrent Reachability Games</i>. IEEE, 2006, pp. 291–300, doi:<a href=\"https://doi.org/10.1109/QEST.2006.48\">10.1109/QEST.2006.48</a>.","apa":"Chatterjee, K., De Alfaro, L., &#38; Henzinger, T. A. (2006). Strategy improvement for concurrent reachability games (pp. 291–300). Presented at the QEST: Quantitative Evaluation of Systems, IEEE. <a href=\"https://doi.org/10.1109/QEST.2006.48\">https://doi.org/10.1109/QEST.2006.48</a>","ama":"Chatterjee K, De Alfaro L, Henzinger TA. Strategy improvement for concurrent reachability games. In: IEEE; 2006:291-300. doi:<a href=\"https://doi.org/10.1109/QEST.2006.48\">10.1109/QEST.2006.48</a>","short":"K. Chatterjee, L. De Alfaro, T.A. Henzinger, in:, IEEE, 2006, pp. 291–300.","chicago":"Chatterjee, Krishnendu, Luca De Alfaro, and Thomas A Henzinger. “Strategy Improvement for Concurrent Reachability Games,” 291–300. IEEE, 2006. <a href=\"https://doi.org/10.1109/QEST.2006.48\">https://doi.org/10.1109/QEST.2006.48</a>.","ista":"Chatterjee K, De Alfaro L, Henzinger TA. 2006. Strategy improvement for concurrent reachability games. QEST: Quantitative Evaluation of Systems, 291–300.","ieee":"K. Chatterjee, L. De Alfaro, and T. A. Henzinger, “Strategy improvement for concurrent reachability games,” presented at the QEST: Quantitative Evaluation of Systems, 2006, pp. 291–300."},"doi":"10.1109/QEST.2006.48","page":"291 - 300","publisher":"IEEE","title":"Strategy improvement for concurrent reachability games","quality_controlled":0,"_id":"4552","date_published":"2006-01-01T00:00:00Z","publist_id":"162","status":"public","month":"01","date_updated":"2021-01-12T07:59:39Z"}]
