PSync: a partially synchronous language for fault-tolerant distributed algorithms
Fault-tolerant distributed algorithms play an important role in many critical/high-availability
applications. These algorithms are notoriously difficult to implement correctly, due to …
applications. These algorithms are notoriously difficult to implement correctly, due to …
Demystifying reachability in vector addition systems
More than 30 years after their inception, the decidability proofs for reach ability in vector
addition systems (VAS) still retain much of their mystery. These proofs rely crucially on a …
addition systems (VAS) still retain much of their mystery. These proofs rely crucially on a …
HybridTreeMiner: An efficient algorithm for mining frequent rooted trees and free trees using canonical forms
Tree structures are used extensively in domains such as computational biology, pattern
recognition, XML databases, computer networks, and so on. In this paper, we present …
recognition, XML databases, computer networks, and so on. In this paper, we present …
Verification of programs with half-duplex communication
G Cécé, A Finkel - Information and Computation, 2005 - Elsevier
We consider the analysis of infinite half-duplex systems made of finite state machines that
communicate over unbounded channels. The half-duplex property for two machines and two …
communicate over unbounded channels. The half-duplex property for two machines and two …
Decidability, complexity, and expressiveness of first-order logic over the subword ordering
S Halfon, P Schnoebelen… - 2017 32nd Annual ACM …, 2017 - ieeexplore.ieee.org
We consider first-order logic over the subword ordering on finite words where each word is
available as a constant. Our first result is that the Σ 1 theory is undecidable (already over two …
available as a constant. Our first result is that the Σ 1 theory is undecidable (already over two …
Flat acceleration in symbolic model checking
Symbolic model checking provides partially effective verification procedures that can handle
systems with an infinite state space. So-called “acceleration techniques” enhance the …
systems with an infinite state space. So-called “acceleration techniques” enhance the …
Forward analysis for WSTS, part II: Complete WSTS
We describe a simple, conceptual forward analysis procedure for infinity-complete WSTS S.
This computes the so-called clover of a state. When S is the completion of a WSTS X, the …
This computes the so-called clover of a state. When S is the completion of a WSTS X, the …
Efficient satisfiability modulo theories via delayed theory combination
The problem of deciding the satisfiability of a quantifier-free formula with respect to a
background theory, also known as Satisfiability Modulo Theories (SMT), is gaining …
background theory, also known as Satisfiability Modulo Theories (SMT), is gaining …
An approach to computing downward closures
G Zetzsche - … : 42nd International Colloquium, ICALP 2015, Kyoto …, 2015 - Springer
The downward closure of a word language is the set of all (not necessarily contiguous)
subwords of its members. It is well-known that the downward closure of any language is …
subwords of its members. It is well-known that the downward closure of any language is …
Complexity of decision problems for XML schemas and chain regular expressions
We study the complexity of the inclusion, equivalence, and intersection problem of extended
chain regular expressions (eCHAREs). These are regular expressions with a very simple …
chain regular expressions (eCHAREs). These are regular expressions with a very simple …