PSync: a partially synchronous language for fault-tolerant distributed algorithms

C Drăgoi, TA Henzinger, D Zufferey - ACM SIGPLAN Notices, 2016 - dl.acm.org
Fault-tolerant distributed algorithms play an important role in many critical/high-availability
applications. These algorithms are notoriously difficult to implement correctly, due to …

Demystifying reachability in vector addition systems

J Leroux, S Schmitz - 2015 30th Annual ACM/IEEE Symposium …, 2015 - ieeexplore.ieee.org
More than 30 years after their inception, the decidability proofs for reach ability in vector
addition systems (VAS) still retain much of their mystery. These proofs rely crucially on a …

HybridTreeMiner: An efficient algorithm for mining frequent rooted trees and free trees using canonical forms

Y Chi, Y Yang, RR Muntz - Proceedings. 16th International …, 2004 - ieeexplore.ieee.org
Tree structures are used extensively in domains such as computational biology, pattern
recognition, XML databases, computer networks, and so on. In this paper, we present …

Verification of programs with half-duplex communication

G Cécé, A Finkel - Information and Computation, 2005 - Elsevier
We consider the analysis of infinite half-duplex systems made of finite state machines that
communicate over unbounded channels. The half-duplex property for two machines and two …

Decidability, complexity, and expressiveness of first-order logic over the subword ordering

S Halfon, P Schnoebelen… - 2017 32nd Annual ACM …, 2017 - ieeexplore.ieee.org
We consider first-order logic over the subword ordering on finite words where each word is
available as a constant. Our first result is that the Σ 1 theory is undecidable (already over two …

Flat acceleration in symbolic model checking

S Bardin, A Finkel, J Leroux, P Schnoebelen - Automated Technology for …, 2005 - Springer
Symbolic model checking provides partially effective verification procedures that can handle
systems with an infinite state space. So-called “acceleration techniques” enhance the …

Forward analysis for WSTS, part II: Complete WSTS

A Finkel, J Goubault-Larrecq - Logical Methods in Computer …, 2012 - lmcs.episciences.org
We describe a simple, conceptual forward analysis procedure for infinity-complete WSTS S.
This computes the so-called clover of a state. When S is the completion of a WSTS X, the …

Efficient satisfiability modulo theories via delayed theory combination

M Bozzano, R Bruttomesso, A Cimatti, T Junttila… - … Aided Verification: 17th …, 2005 - Springer
The problem of deciding the satisfiability of a quantifier-free formula with respect to a
background theory, also known as Satisfiability Modulo Theories (SMT), is gaining …

An approach to computing downward closures

G Zetzsche - … : 42nd International Colloquium, ICALP 2015, Kyoto …, 2015 - Springer
The downward closure of a word language is the set of all (not necessarily contiguous)
subwords of its members. It is well-known that the downward closure of any language is …

Complexity of decision problems for XML schemas and chain regular expressions

W Martens, F Neven, T Schwentick - SIAM Journal on Computing, 2010 - SIAM
We study the complexity of the inclusion, equivalence, and intersection problem of extended
chain regular expressions (eCHAREs). These are regular expressions with a very simple …