---
OA_place: repository
OA_type: green
_id: '20648'
abstract:
- lang: eng
  text: Polynomial quantified entailments with existentially and universally quantified
    variables arise in many problems of verification and program analysis. We present
    PolyQEnt which is a tool for solving polynomial quantified entailments in which
    variables on both sides of the implication are real valued or unbounded integers.
    Our tool provides a unified framework for polynomial quantified entailment problems
    that arise in several papers in the literature. Our experimental evaluation over
    a wide range of benchmarks shows the applicability of the tool as well as its
    benefits as opposed to simply using existing SMT solvers to solve such constraints.
acknowledgement: 'This work was supported by the following grants: ERC CoG 863818
  (ForM-SMArt), Austrian Science Fund (FWF) 10.55776/COE12, ERC StG 101222524 (SPES),
  the Ethereum Foundation Research Grant FY24-1793, and the Singapore Ministry of
  Education (MOE) Academic Research Fund (AcRF) Tier 1 grant (Project ID:22-SISSMU-100).'
alternative_title:
- LNCS
article_processing_charge: No
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Ehsan
  full_name: Kafshdar Goharshadi, Ehsan
  id: 103b4fa0-896a-11ed-bdf8-87b697bef40d
  last_name: Kafshdar Goharshadi
  orcid: 0000-0002-8595-0587
- first_name: Mehrdad
  full_name: Karrabi, Mehrdad
  id: 67638922-f394-11eb-9cf6-f20423e08757
  last_name: Karrabi
  orcid: 0009-0007-5253-9170
- first_name: Milad
  full_name: Saadat, Milad
  last_name: Saadat
- first_name: Maximilian
  full_name: Seeliger, Maximilian
  last_name: Seeliger
- first_name: Dorde
  full_name: Zikelic, Dorde
  id: 294AA7A6-F248-11E8-B48F-1D18A9856A87
  last_name: Zikelic
  orcid: 0000-0002-4681-1699
citation:
  ama: 'Chatterjee K, Goharshady AK, Goharshady E, et al. PolyQEnt: A polynomial quantified
    entailment solver. In: <i>23rd International Symposium on Automated Technology
    for Verification and Analysis</i>. Vol 16145. Springer Nature; 2025:411-424. doi:<a
    href="https://doi.org/10.1007/978-3-032-08707-2_19">10.1007/978-3-032-08707-2_19</a>'
  apa: 'Chatterjee, K., Goharshady, A. K., Goharshady, E., Karrabi, M., Saadat, M.,
    Seeliger, M., &#38; Zikelic, D. (2025). PolyQEnt: A polynomial quantified entailment
    solver. In <i>23rd International Symposium on Automated Technology for Verification
    and Analysis</i> (Vol. 16145, pp. 411–424). Bengaluru, India: Springer Nature.
    <a href="https://doi.org/10.1007/978-3-032-08707-2_19">https://doi.org/10.1007/978-3-032-08707-2_19</a>'
  chicago: 'Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Ehsan Goharshady, Mehrdad
    Karrabi, Milad Saadat, Maximilian Seeliger, and Dorde Zikelic. “PolyQEnt: A Polynomial
    Quantified Entailment Solver.” In <i>23rd International Symposium on Automated
    Technology for Verification and Analysis</i>, 16145:411–24. Springer Nature, 2025.
    <a href="https://doi.org/10.1007/978-3-032-08707-2_19">https://doi.org/10.1007/978-3-032-08707-2_19</a>.'
  ieee: 'K. Chatterjee <i>et al.</i>, “PolyQEnt: A polynomial quantified entailment
    solver,” in <i>23rd International Symposium on Automated Technology for Verification
    and Analysis</i>, Bengaluru, India, 2025, vol. 16145, pp. 411–424.'
  ista: 'Chatterjee K, Goharshady AK, Goharshady E, Karrabi M, Saadat M, Seeliger
    M, Zikelic D. 2025. PolyQEnt: A polynomial quantified entailment solver. 23rd
    International Symposium on Automated Technology for Verification and Analysis.
    ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 16145, 411–424.'
  mla: 'Chatterjee, Krishnendu, et al. “PolyQEnt: A Polynomial Quantified Entailment
    Solver.” <i>23rd International Symposium on Automated Technology for Verification
    and Analysis</i>, vol. 16145, Springer Nature, 2025, pp. 411–24, doi:<a href="https://doi.org/10.1007/978-3-032-08707-2_19">10.1007/978-3-032-08707-2_19</a>.'
  short: K. Chatterjee, A.K. Goharshady, E. Goharshady, M. Karrabi, M. Saadat, M.
    Seeliger, D. Zikelic, in:, 23rd International Symposium on Automated Technology
    for Verification and Analysis, Springer Nature, 2025, pp. 411–424.
conference:
  end_date: 2025-10-31
  location: Bengaluru, India
  name: 'ATVA: Automated Technology for Verification and Analysis'
  start_date: 2025-10-27
corr_author: '1'
date_created: 2025-11-16T23:01:24Z
date_published: 2025-10-26T00:00:00Z
date_updated: 2025-11-24T13:11:10Z
day: '26'
department:
- _id: KrCh
doi: 10.1007/978-3-032-08707-2_19
ec_funded: 1
external_id:
  arxiv:
  - '2408.03796'
intvolume: '     16145'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.48550/arXiv.2408.03796
month: '10'
oa: 1
oa_version: Preprint
page: 411-424
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
publication: 23rd International Symposium on Automated Technology for Verification
  and Analysis
publication_identifier:
  eissn:
  - 1611-3349
  isbn:
  - '9783032087065'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
scopus_import: '1'
status: public
title: 'PolyQEnt: A polynomial quantified entailment solver'
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 16145
year: '2025'
...
---
_id: '18155'
abstract:
- lang: eng
  text: We study the classical problem of verifying programs with respect to formal
    specifications given in the linear temporal logic (LTL). We first present novel
    sound and complete witnesses for LTL verification over imperative programs. Our
    witnesses are applicable to both verification (proving) and refutation (finding
    bugs) settings. We then consider LTL formulas in which atomic propositions can
    be polynomial constraints and turn our focus to polynomial arithmetic programs,
    i.e. programs in which every assignment and guard consists only of polynomial
    expressions. For this setting, we provide an efficient algorithm to automatically
    synthesize such LTL witnesses. Our synthesis procedure is both sound and semi-complete.
    Finally, we present experimental results demonstrating the effectiveness of our
    approach and that it can handle programs which were beyond the reach of previous
    state-of-the-art tools.
acknowledgement: This work was supported in part by the ERC-2020-CoG 863818 (FoRM-SMArt)
  and the Hong Kong Research Grants Council ECS Project Number 26208122.
alternative_title:
- LNCS
article_processing_charge: Yes (in subscription journal)
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Ehsan
  full_name: Goharshady, Ehsan
  last_name: Goharshady
- first_name: Mehrdad
  full_name: Karrabi, Mehrdad
  id: 67638922-f394-11eb-9cf6-f20423e08757
  last_name: Karrabi
- first_name: Dorde
  full_name: Zikelic, Dorde
  id: 294AA7A6-F248-11E8-B48F-1D18A9856A87
  last_name: Zikelic
  orcid: 0000-0002-4681-1699
citation:
  ama: 'Chatterjee K, Goharshady AK, Goharshady E, Karrabi M, Zikelic D. Sound and complete
    witnesses for template-based verification of LTL properties on polynomial programs.
    In: <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in
    Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 14933. Springer
    Nature; 2024:600-619. doi:<a href="https://doi.org/10.1007/978-3-031-71162-6_31">10.1007/978-3-031-71162-6_31</a>'
  apa: 'Chatterjee, K., Goharshady, A. K., Goharshady, E., Karrabi, M., &#38; Zikelic,
    D. (2024). Sound and complete witnesses for template-based verification of LTL
    properties on polynomial programs. In <i>Lecture Notes in Computer Science (including
    subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>
    (Vol. 14933, pp. 600–619). Milan, Italy: Springer Nature. <a href="https://doi.org/10.1007/978-3-031-71162-6_31">https://doi.org/10.1007/978-3-031-71162-6_31</a>'
  chicago: Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Ehsan Goharshady, Mehrdad
    Karrabi, and Dorde Zikelic. “Sound and Complete Witnesses for Template-Based Verification
    of LTL Properties on Polynomial Programs.” In <i>Lecture Notes in Computer Science
    (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes
    in Bioinformatics)</i>, 14933:600–619. Springer Nature, 2024. <a href="https://doi.org/10.1007/978-3-031-71162-6_31">https://doi.org/10.1007/978-3-031-71162-6_31</a>.
  ieee: K. Chatterjee, A. K. Goharshady, E. Goharshady, M. Karrabi, and D. Zikelic,
    “Sound and complete witnesses for template-based verification of LTL properties
    on polynomial programs,” in <i>Lecture Notes in Computer Science (including subseries
    Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>,
    Milan, Italy, 2024, vol. 14933, pp. 600–619.
  ista: 'Chatterjee K, Goharshady AK, Goharshady E, Karrabi M, Zikelic D. 2024. Sound
    and complete witnesses for template-based verification of LTL properties on polynomial
    programs. Lecture Notes in Computer Science (including subseries Lecture Notes
    in Artificial Intelligence and Lecture Notes in Bioinformatics). FM: Formal Methods,
    LNCS, vol. 14933, 600–619.'
  mla: Chatterjee, Krishnendu, et al. “Sound and Complete Witnesses for Template-Based
    Verification of LTL Properties on Polynomial Programs.” <i>Lecture Notes in Computer
    Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture
    Notes in Bioinformatics)</i>, vol. 14933, Springer Nature, 2024, pp. 600–19, doi:<a
    href="https://doi.org/10.1007/978-3-031-71162-6_31">10.1007/978-3-031-71162-6_31</a>.
  short: K. Chatterjee, A.K. Goharshady, E. Goharshady, M. Karrabi, D. Zikelic, in:,
    Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial
    Intelligence and Lecture Notes in Bioinformatics), Springer Nature, 2024, pp.
    600–619.
conference:
  end_date: 2024-09-13
  location: Milan, Italy
  name: 'FM: Formal Methods'
  start_date: 2024-09-09
corr_author: '1'
date_created: 2024-09-29T22:01:37Z
date_published: 2024-09-11T00:00:00Z
date_updated: 2025-09-08T09:51:34Z
day: '11'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1007/978-3-031-71162-6_31
ec_funded: 1
external_id:
  arxiv:
  - '2403.05386'
  isi:
  - '001336893300031'
file:
- access_level: open_access
  checksum: 223845be9e754681ee218866827c95e7
  content_type: application/pdf
  creator: dernst
  date_created: 2024-10-01T09:56:54Z
  date_updated: 2024-10-01T09:56:54Z
  file_id: '18165'
  file_name: 2024_LNCS_Chatterjee.pdf
  file_size: 650495
  relation: main_file
  success: 1
file_date_updated: 2024-10-01T09:56:54Z
has_accepted_license: '1'
intvolume: '     14933'
isi: 1
language:
- iso: eng
month: '09'
oa: 1
oa_version: Published Version
page: 600-619
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
publication: Lecture Notes in Computer Science (including subseries Lecture Notes
  in Artificial Intelligence and Lecture Notes in Bioinformatics)
publication_identifier:
  eissn:
  - 1611-3349
  isbn:
  - '9783031711619'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
scopus_import: '1'
status: public
title: Sound and complete witnesses for template-based verification of LTL properties
  on polynomial programs
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 14933
year: '2024'
...
---
_id: '17162'
abstract:
- lang: eng
  text: "Cost analysis, also known as resource usage analysis, is the task of finding
    bounds on the total cost of a program and is a well-studied problem in static
    analysis. In this work, we consider two classical quantitative problems in cost
    analysis for probabilistic programs. The first problem is to find a bound on the
    expected total cost of the program. This is a natural measure for the resource
    usage of the program and can also be directly applied to average-case runtime
    analysis. The second problem asks for a tail bound, i.e. ‍given a threshold t
    the goal is to find a probability bound p such that ℙ[total cost ≥ t] ≤ p. Intuitively,
    given a threshold t on the resource, the problem is to find the likelihood that
    the total cost exceeds this threshold.\r\nFirst, for expectation bounds, a major
    obstacle in previous works on cost analysis is that they can handle only non-negative
    costs or bounded variable updates. In contrast, we provide a new variant of the
    standard notion of cost martingales, that allows us to find expectation bounds
    for a class of programs with general positive or negative costs and no restriction
    on the variable updates. More specifically, our approach is applicable as long
    as there is a lower bound on the total cost incurred along every path.\r\nSecond,
    for tail bounds, all previous methods are limited to programs in which the expected
    total cost is finite. In contrast, we present a novel approach, based on a combination
    of our martingale-based method for expectation bounds with a quantitative safety
    analysis, to obtain a solution to the tail bound problem that is applicable even
    to programs with infinite expected cost. Specifically, this allows us to obtain
    runtime tail bounds for programs that do not terminate almost-surely.\r\nIn summary,
    we provide a novel combination of martingale-based cost analysis and quantitative
    safety analysis that is able to find expectation and tail cost bounds for probabilistic
    programs, without the restrictions of non-negative costs, bounded updates, or
    finiteness of the expected total cost. Finally, we provide experimental results
    showcasing that our approach can solve instances that were beyond the reach of
    previous methods."
acknowledgement: "This work was supported in part by the European Research Council
  (ERC) under Grant No. 863818\r\n(ForM-SMArt) and the Hong Kong Research Grants Council
  under ECS Project No. 26208122."
article_number: '107'
article_processing_charge: Yes (in subscription journal)
article_type: original
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Tobias
  full_name: Meggendorfer, Tobias
  id: b21b0c15-30a2-11eb-80dc-f13ca25802e1
  last_name: Meggendorfer
  orcid: 0000-0002-1712-2165
- first_name: Dorde
  full_name: Zikelic, Dorde
  id: 294AA7A6-F248-11E8-B48F-1D18A9856A87
  last_name: Zikelic
  orcid: 0000-0002-4681-1699
citation:
  ama: Chatterjee K, Goharshady AK, Meggendorfer T, Zikelic D. Quantitative bounds
    on resource usage of probabilistic programs. <i>Proceedings of the ACM on Programming
    Languages</i>. 2024;8(OOPSLA1). doi:<a href="https://doi.org/10.1145/3649824">10.1145/3649824</a>
  apa: Chatterjee, K., Goharshady, A. K., Meggendorfer, T., &#38; Zikelic, D. (2024).
    Quantitative bounds on resource usage of probabilistic programs. <i>Proceedings
    of the ACM on Programming Languages</i>. Association for Computing Machinery.
    <a href="https://doi.org/10.1145/3649824">https://doi.org/10.1145/3649824</a>
  chicago: Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Tobias Meggendorfer,
    and Dorde Zikelic. “Quantitative Bounds on Resource Usage of Probabilistic Programs.”
    <i>Proceedings of the ACM on Programming Languages</i>. Association for Computing
    Machinery, 2024. <a href="https://doi.org/10.1145/3649824">https://doi.org/10.1145/3649824</a>.
  ieee: K. Chatterjee, A. K. Goharshady, T. Meggendorfer, and D. Zikelic, “Quantitative
    bounds on resource usage of probabilistic programs,” <i>Proceedings of the ACM
    on Programming Languages</i>, vol. 8, no. OOPSLA1. Association for Computing Machinery,
    2024.
  ista: Chatterjee K, Goharshady AK, Meggendorfer T, Zikelic D. 2024. Quantitative
    bounds on resource usage of probabilistic programs. Proceedings of the ACM on
    Programming Languages. 8(OOPSLA1), 107.
  mla: Chatterjee, Krishnendu, et al. “Quantitative Bounds on Resource Usage of Probabilistic
    Programs.” <i>Proceedings of the ACM on Programming Languages</i>, vol. 8, no.
    OOPSLA1, 107, Association for Computing Machinery, 2024, doi:<a href="https://doi.org/10.1145/3649824">10.1145/3649824</a>.
  short: K. Chatterjee, A.K. Goharshady, T. Meggendorfer, D. Zikelic, Proceedings
    of the ACM on Programming Languages 8 (2024).
date_created: 2024-06-23T22:01:02Z
date_published: 2024-04-29T00:00:00Z
date_updated: 2025-04-14T07:52:47Z
day: '29'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1145/3649824
ec_funded: 1
file:
- access_level: open_access
  checksum: 9243ded966f71df1572be5466019be5c
  content_type: application/pdf
  creator: dernst
  date_created: 2024-06-27T07:48:16Z
  date_updated: 2024-06-27T07:48:16Z
  file_id: '17182'
  file_name: 2024_ProcACMProgLanguage_Chatterjee.pdf
  file_size: 413096
  relation: main_file
  success: 1
file_date_updated: 2024-06-27T07:48:16Z
has_accepted_license: '1'
intvolume: '         8'
issue: OOPSLA1
language:
- iso: eng
month: '04'
oa: 1
oa_version: Published Version
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
publication: Proceedings of the ACM on Programming Languages
publication_identifier:
  eissn:
  - 2475-1421
publication_status: published
publisher: Association for Computing Machinery
quality_controlled: '1'
scopus_import: '1'
status: public
title: Quantitative bounds on resource usage of probabilistic programs
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8
year: '2024'
...
---
_id: '14318'
abstract:
- lang: eng
  text: "Probabilistic recurrence relations (PRRs) are a standard formalism for describing
    the runtime of a randomized algorithm. Given a PRR and a time limit κ, we consider
    the tail probability Pr[T≥κ], i.e., the probability that the randomized runtime
    T of the PRR exceeds κ. Our focus is the formal analysis of tail bounds that aims
    at finding a tight asymptotic upper bound u≥Pr[T≥κ]. To address this problem,
    the classical and most well-known approach is the cookbook method by Karp (JACM
    1994), while other approaches are mostly limited to deriving tail bounds of specific
    PRRs via involved custom analysis.\r\nIn this work, we propose a novel approach
    for deriving the common exponentially-decreasing tail bounds for PRRs whose preprocessing
    time and random passed sizes observe discrete or (piecewise) uniform distribution
    and whose recursive call is either a single procedure call or a divide-and-conquer.
    We first establish a theoretical approach via Markov’s inequality, and then instantiate
    the theoretical approach with a template-based algorithmic approach via a refined
    treatment of exponentiation. Experimental evaluation shows that our algorithmic
    approach is capable of deriving tail bounds that are (i) asymptotically tighter
    than Karp’s method, (ii) match the best-known manually-derived asymptotic tail
    bound for QuickSelect, and (iii) is only slightly worse (with a loglogn factor)
    than the manually-proven optimal asymptotic tail bound for QuickSort. Moreover,
    our algorithmic approach handles all examples (including realistic PRRs such as
    QuickSort, QuickSelect, DiameterComputation, etc.) in less than 0.1 s, showing
    that our approach is efficient in practice."
acknowledgement: We thank Prof. Bican Xia for valuable information on the exponential
  theory of reals. The work is partially supported by the National Natural Science
  Foundation of China (NSFC) with Grant No. 62172271, ERC CoG 863818 (ForM-SMArt),
  the Hong Kong Research Grants Council ECS Project Number 26208122, the HKUST-Kaisa
  Joint Research Institute Project Grant HKJRI3A-055 and the HKUST Startup Grant R9272.
alternative_title:
- LNCS
article_processing_charge: Yes (in subscription journal)
author:
- first_name: Yican
  full_name: Sun, Yican
  last_name: Sun
- first_name: Hongfei
  full_name: Fu, Hongfei
  last_name: Fu
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
citation:
  ama: 'Sun Y, Fu H, Chatterjee K, Goharshady AK. Automated tail bound analysis for probabilistic
    recurrence relations. In: <i>Computer Aided Verification</i>. Vol 13966. Springer
    Nature; 2023:16-39. doi:<a href="https://doi.org/10.1007/978-3-031-37709-9_2">10.1007/978-3-031-37709-9_2</a>'
  apa: 'Sun, Y., Fu, H., Chatterjee, K., &#38; Goharshady, A. K. (2023). Automated
    tail bound analysis for probabilistic recurrence relations. In <i>Computer Aided
    Verification</i> (Vol. 13966, pp. 16–39). Paris, France: Springer Nature. <a href="https://doi.org/10.1007/978-3-031-37709-9_2">https://doi.org/10.1007/978-3-031-37709-9_2</a>'
  chicago: Sun, Yican, Hongfei Fu, Krishnendu Chatterjee, and Amir Kafshdar Goharshady.
    “Automated Tail Bound Analysis for Probabilistic Recurrence Relations.” In <i>Computer
    Aided Verification</i>, 13966:16–39. Springer Nature, 2023. <a href="https://doi.org/10.1007/978-3-031-37709-9_2">https://doi.org/10.1007/978-3-031-37709-9_2</a>.
  ieee: Y. Sun, H. Fu, K. Chatterjee, and A. K. Goharshady, “Automated tail bound
    analysis for probabilistic recurrence relations,” in <i>Computer Aided Verification</i>,
    Paris, France, 2023, vol. 13966, pp. 16–39.
  ista: 'Sun Y, Fu H, Chatterjee K, Goharshady AK. 2023. Automated tail bound analysis
    for probabilistic recurrence relations. Computer Aided Verification. CAV: Computer
    Aided Verification, LNCS, vol. 13966, 16–39.'
  mla: Sun, Yican, et al. “Automated Tail Bound Analysis for Probabilistic Recurrence
    Relations.” <i>Computer Aided Verification</i>, vol. 13966, Springer Nature, 2023,
    pp. 16–39, doi:<a href="https://doi.org/10.1007/978-3-031-37709-9_2">10.1007/978-3-031-37709-9_2</a>.
  short: Y. Sun, H. Fu, K. Chatterjee, A.K. Goharshady, in:, Computer Aided Verification,
    Springer Nature, 2023, pp. 16–39.
conference:
  end_date: 2023-07-22
  location: Paris, France
  name: 'CAV: Computer Aided Verification'
  start_date: 2023-07-17
date_created: 2023-09-10T22:01:12Z
date_published: 2023-07-17T00:00:00Z
date_updated: 2025-09-09T12:55:28Z
day: '17'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1007/978-3-031-37709-9_2
ec_funded: 1
external_id:
  isi:
  - '001310805600002'
file:
- access_level: open_access
  checksum: 42917e086f8c7699f3bccf84f74fe000
  content_type: application/pdf
  creator: dernst
  date_created: 2023-09-20T08:24:47Z
  date_updated: 2023-09-20T08:24:47Z
  file_id: '14348'
  file_name: 2023_LNCS_Sun.pdf
  file_size: 624647
  relation: main_file
  success: 1
file_date_updated: 2023-09-20T08:24:47Z
has_accepted_license: '1'
intvolume: '     13966'
isi: 1
language:
- iso: eng
month: '07'
oa: 1
oa_version: Published Version
page: 16-39
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
publication: Computer Aided Verification
publication_identifier:
  eissn:
  - 1611-3349
  isbn:
  - '9783031377082'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
related_material:
  link:
  - relation: software
    url: https://github.com/boyvolcano/PRR
scopus_import: '1'
status: public
title: Automated tail bound analysis for probabilistic recurrence relations
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 13966
year: '2023'
...
---
_id: '12102'
abstract:
- lang: eng
  text: 'Given a Markov chain M = (V, v_0, δ), with state space V and a starting state
    v_0, and a probability threshold ε, an ε-core is a subset C of states that is
    left with probability at most ε. More formally, C ⊆ V is an ε-core, iff ℙ[reach
    (V\C)] ≤ ε. Cores have been applied in a wide variety of verification problems
    over Markov chains, Markov decision processes, and probabilistic programs, as
    a means of discarding uninteresting and low-probability parts of a probabilistic
    system and instead being able to focus on the states that are likely to be encountered
    in a real-world run. In this work, we focus on the problem of computing a minimal
    ε-core in a Markov chain. Our contributions include both negative and positive
    results: (i) We show that the decision problem on the existence of an ε-core of
    a given size is NP-complete. This solves an open problem posed in [Jan Kretínský
    and Tobias Meggendorfer, 2020]. We additionally show that the problem remains
    NP-complete even when limited to acyclic Markov chains with bounded maximal vertex
    degree; (ii) We provide a polynomial time algorithm for computing a minimal ε-core
    on Markov chains over control-flow graphs of structured programs. A straightforward
    combination of our algorithm with standard branch prediction techniques allows
    one to apply the idea of cores to find a subset of program lines that are left
    with low probability and then focus any desired static analysis on this core subset.'
acknowledgement: "The research was partially supported by the Hong Kong Research Grants
  Council ECS\r\nProject No. 26208122, ERC CoG 863818 (FoRM-SMArt), the European Union’s
  Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie
  Grant Agreement No. 665385, HKUST– Kaisa Joint Research Institute Project Grant
  HKJRI3A-055 and HKUST Startup Grant R9272. Ali Ahmadi and Roodabeh Safavi were interns
  at HKUST."
article_number: '29'
article_processing_charge: No
author:
- first_name: Ali
  full_name: Ahmadi, Ali
  last_name: Ahmadi
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Tobias
  full_name: Meggendorfer, Tobias
  id: b21b0c15-30a2-11eb-80dc-f13ca25802e1
  last_name: Meggendorfer
  orcid: 0000-0002-1712-2165
- first_name: Roodabeh
  full_name: Safavi Hemami, Roodabeh
  id: 72ed2640-8972-11ed-ae7b-f9c81ec75154
  last_name: Safavi Hemami
- first_name: Dorde
  full_name: Zikelic, Dorde
  id: 294AA7A6-F248-11E8-B48F-1D18A9856A87
  last_name: Zikelic
  orcid: 0000-0002-4681-1699
citation:
  ama: 'Ahmadi A, Chatterjee K, Goharshady AK, Meggendorfer T, Safavi Hemami R, Zikelic
    D. Algorithms and hardness results for computing cores of Markov chains. In: <i>42nd
    IARCS Annual Conference on Foundations of Software Technology and Theoretical
    Computer Science</i>. Vol 250. Schloss Dagstuhl - Leibniz-Zentrum für Informatik;
    2022. doi:<a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2022.29">10.4230/LIPIcs.FSTTCS.2022.29</a>'
  apa: 'Ahmadi, A., Chatterjee, K., Goharshady, A. K., Meggendorfer, T., Safavi Hemami,
    R., &#38; Zikelic, D. (2022). Algorithms and hardness results for computing cores
    of Markov chains. In <i>42nd IARCS Annual Conference on Foundations of Software
    Technology and Theoretical Computer Science</i> (Vol. 250). Madras, India: Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2022.29">https://doi.org/10.4230/LIPIcs.FSTTCS.2022.29</a>'
  chicago: Ahmadi, Ali, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Tobias Meggendorfer,
    Roodabeh Safavi Hemami, and Dorde Zikelic. “Algorithms and Hardness Results for
    Computing Cores of Markov Chains.” In <i>42nd IARCS Annual Conference on Foundations
    of Software Technology and Theoretical Computer Science</i>, Vol. 250. Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik, 2022. <a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2022.29">https://doi.org/10.4230/LIPIcs.FSTTCS.2022.29</a>.
  ieee: A. Ahmadi, K. Chatterjee, A. K. Goharshady, T. Meggendorfer, R. Safavi Hemami,
    and D. Zikelic, “Algorithms and hardness results for computing cores of Markov
    chains,” in <i>42nd IARCS Annual Conference on Foundations of Software Technology
    and Theoretical Computer Science</i>, Madras, India, 2022, vol. 250.
  ista: 'Ahmadi A, Chatterjee K, Goharshady AK, Meggendorfer T, Safavi Hemami R, Zikelic
    D. 2022. Algorithms and hardness results for computing cores of Markov chains.
    42nd IARCS Annual Conference on Foundations of Software Technology and Theoretical
    Computer Science. FSTTCS: Foundations of Software Technology and Theoretical Computer
    Science vol. 250, 29.'
  mla: Ahmadi, Ali, et al. “Algorithms and Hardness Results for Computing Cores of
    Markov Chains.” <i>42nd IARCS Annual Conference on Foundations of Software Technology
    and Theoretical Computer Science</i>, vol. 250, 29, Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2022, doi:<a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2022.29">10.4230/LIPIcs.FSTTCS.2022.29</a>.
  short: A. Ahmadi, K. Chatterjee, A.K. Goharshady, T. Meggendorfer, R. Safavi Hemami,
    D. Zikelic, in:, 42nd IARCS Annual Conference on Foundations of Software Technology
    and Theoretical Computer Science, Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2022.
conference:
  end_date: 2022-12-20
  location: Madras, India
  name: 'FSTTCS: Foundations of Software Technology and Theoretical Computer Science'
  start_date: 2022-12-18
corr_author: '1'
date_created: 2023-01-01T23:00:50Z
date_published: 2022-12-14T00:00:00Z
date_updated: 2025-07-10T11:50:23Z
day: '14'
ddc:
- '000'
department:
- _id: KrCh
- _id: GradSch
doi: 10.4230/LIPIcs.FSTTCS.2022.29
ec_funded: 1
file:
- access_level: open_access
  checksum: 6660c802489013f034c9e8bd57f4d46e
  content_type: application/pdf
  creator: dernst
  date_created: 2023-01-20T10:39:44Z
  date_updated: 2023-01-20T10:39:44Z
  file_id: '12324'
  file_name: 2022_LIPICs_Ahmadi.pdf
  file_size: 872534
  relation: main_file
  success: 1
file_date_updated: 2023-01-20T10:39:44Z
has_accepted_license: '1'
intvolume: '       250'
language:
- iso: eng
month: '12'
oa: 1
oa_version: Published Version
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
- _id: 2564DBCA-B435-11E9-9278-68D0E5697425
  call_identifier: H2020
  grant_number: '665385'
  name: International IST Doctoral Program
publication: 42nd IARCS Annual Conference on Foundations of Software Technology and
  Theoretical Computer Science
publication_identifier:
  isbn:
  - '9783959772617'
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
quality_controlled: '1'
scopus_import: '1'
status: public
title: Algorithms and hardness results for computing cores of Markov chains
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 250
year: '2022'
...
---
_id: '12000'
abstract:
- lang: eng
  text: "We consider the quantitative problem of obtaining lower-bounds on the probability
    of termination of a given non-deterministic probabilistic program. Specifically,
    given a non-termination threshold p∈[0,1], we aim for certificates proving that
    the program terminates with probability at least 1−p. The basic idea of our approach
    is to find a terminating stochastic invariant, i.e. a subset SI of program states
    such that (i) the probability of the program ever leaving SI is no more than p,
    and (ii) almost-surely, the program either leaves SI or terminates.\r\n\r\nWhile
    stochastic invariants are already well-known, we provide the first proof that
    the idea above is not only sound, but also complete for quantitative termination
    analysis. We then introduce a novel sound and complete characterization of stochastic
    invariants that enables template-based approaches for easy synthesis of quantitative
    termination certificates, especially in affine or polynomial forms. Finally, by
    combining this idea with the existing martingale-based methods that are relatively
    complete for qualitative termination analysis, we obtain the first automated,
    sound, and relatively complete algorithm for quantitative termination analysis.
    Notably, our completeness guarantees for quantitative termination analysis are
    as strong as the best-known methods for the qualitative variant.\r\n\r\nOur prototype
    implementation demonstrates the effectiveness of our approach on various probabilistic
    programs. We also demonstrate that our algorithm certifies lower bounds on termination
    probability for probabilistic programs that are beyond the reach of previous methods."
acknowledgement: This research was partially supported by the ERC CoG 863818 (ForM-SMArt),
  the HKUST-Kaisa Joint Research Institute Project Grant HKJRI3A-055, the HKUST Startup
  Grant R9272 and the European Union’s Horizon 2020 research and innovation programme
  under the Marie Skłodowska-Curie Grant Agreement No. 665385.
alternative_title:
- LNCS
article_processing_charge: Yes (in subscription journal)
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Tobias
  full_name: Meggendorfer, Tobias
  id: b21b0c15-30a2-11eb-80dc-f13ca25802e1
  last_name: Meggendorfer
  orcid: 0000-0002-1712-2165
- first_name: Dorde
  full_name: Zikelic, Dorde
  id: 294AA7A6-F248-11E8-B48F-1D18A9856A87
  last_name: Zikelic
  orcid: 0000-0002-4681-1699
citation:
  ama: 'Chatterjee K, Goharshady AK, Meggendorfer T, Zikelic D. Sound and complete
    certificates for auantitative termination analysis of probabilistic programs.
    In: <i>Proceedings of the 34th International Conference on Computer Aided Verification</i>.
    Vol 13371. Springer; 2022:55-78. doi:<a href="https://doi.org/10.1007/978-3-031-13185-1_4">10.1007/978-3-031-13185-1_4</a>'
  apa: 'Chatterjee, K., Goharshady, A. K., Meggendorfer, T., &#38; Zikelic, D. (2022).
    Sound and complete certificates for auantitative termination analysis of probabilistic
    programs. In <i>Proceedings of the 34th International Conference on Computer Aided
    Verification</i> (Vol. 13371, pp. 55–78). Haifa, Israel: Springer. <a href="https://doi.org/10.1007/978-3-031-13185-1_4">https://doi.org/10.1007/978-3-031-13185-1_4</a>'
  chicago: Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Tobias Meggendorfer,
    and Dorde Zikelic. “Sound and Complete Certificates for Auantitative Termination
    Analysis of Probabilistic Programs.” In <i>Proceedings of the 34th International
    Conference on Computer Aided Verification</i>, 13371:55–78. Springer, 2022. <a
    href="https://doi.org/10.1007/978-3-031-13185-1_4">https://doi.org/10.1007/978-3-031-13185-1_4</a>.
  ieee: K. Chatterjee, A. K. Goharshady, T. Meggendorfer, and D. Zikelic, “Sound and complete
    certificates for auantitative termination analysis of probabilistic programs,”
    in <i>Proceedings of the 34th International Conference on Computer Aided Verification</i>,
    Haifa, Israel, 2022, vol. 13371, pp. 55–78.
  ista: 'Chatterjee K, Goharshady AK, Meggendorfer T, Zikelic D. 2022. Sound and complete
    certificates for auantitative termination analysis of probabilistic programs.
    Proceedings of the 34th International Conference on Computer Aided Verification.
    CAV: Computer Aided Verification, LNCS, vol. 13371, 55–78.'
  mla: Chatterjee, Krishnendu, et al. “Sound and Complete Certificates for Auantitative
    Termination Analysis of Probabilistic Programs.” <i>Proceedings of the 34th International
    Conference on Computer Aided Verification</i>, vol. 13371, Springer, 2022, pp.
    55–78, doi:<a href="https://doi.org/10.1007/978-3-031-13185-1_4">10.1007/978-3-031-13185-1_4</a>.
  short: K. Chatterjee, A.K. Goharshady, T. Meggendorfer, D. Zikelic, in:, Proceedings
    of the 34th International Conference on Computer Aided Verification, Springer,
    2022, pp. 55–78.
conference:
  end_date: 2022-08-10
  location: Haifa, Israel
  name: 'CAV: Computer Aided Verification'
  start_date: 2022-08-07
date_created: 2022-08-28T22:02:02Z
date_published: 2022-08-07T00:00:00Z
date_updated: 2026-04-07T13:27:55Z
day: '07'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1007/978-3-031-13185-1_4
ec_funded: 1
external_id:
  isi:
  - '000870304500004'
file:
- access_level: open_access
  checksum: 24e0f810ec52735a90ade95198bc641d
  content_type: application/pdf
  creator: alisjak
  date_created: 2022-08-29T09:17:01Z
  date_updated: 2022-08-29T09:17:01Z
  file_id: '12003'
  file_name: 2022_LNCS_Chatterjee.pdf
  file_size: 505094
  relation: main_file
  success: 1
file_date_updated: 2022-08-29T09:17:01Z
has_accepted_license: '1'
intvolume: '     13371'
isi: 1
language:
- iso: eng
month: '08'
oa: 1
oa_version: Published Version
page: 55-78
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
- _id: 2564DBCA-B435-11E9-9278-68D0E5697425
  call_identifier: H2020
  grant_number: '665385'
  name: International IST Doctoral Program
publication: Proceedings of the 34th International Conference on Computer Aided Verification
publication_identifier:
  eissn:
  - 1611-3349
  isbn:
  - '9783031131844'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer
quality_controlled: '1'
related_material:
  record:
  - id: '14539'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Sound and complete certificates for auantitative termination analysis of probabilistic
  programs
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 4359f0d1-fa6c-11eb-b949-802e58b17ae8
volume: 13371
year: '2022'
...
---
_id: '9645'
abstract:
- lang: eng
  text: "We consider the fundamental problem of reachability analysis over imperative
    programs with real variables. Previous works that tackle reachability are either
    unable to handle programs consisting of general loops (e.g. symbolic execution),
    or lack completeness guarantees (e.g. abstract interpretation), or are not automated
    (e.g. incorrectness logic). In contrast, we propose a novel approach for reachability
    analysis that can handle general and complex loops, is complete, and can be entirely
    automated for a wide family of programs. Through the notion of Inductive Reachability
    Witnesses (IRWs), our approach extends ideas from both invariant generation and
    termination to reachability analysis.\r\n\r\nWe first show that our IRW-based
    approach is sound and complete for reachability analysis of imperative programs.
    Then, we focus on linear and polynomial programs and develop automated methods
    for synthesizing linear and polynomial IRWs. In the linear case, we follow the
    well-known approaches using Farkas' Lemma. Our main contribution is in the polynomial
    case, where we present a push-button semi-complete algorithm. We achieve this
    using a novel combination of classical theorems in real algebraic geometry, such
    as Putinar's Positivstellensatz and Hilbert's Strong Nullstellensatz. Finally,
    our experimental results show we can prove complex reachability objectives over
    various benchmarks that were beyond the reach of previous methods."
acknowledgement: This research was partially supported by the ERC CoG 863818 (ForM-SMArt),
  the National Natural Science Foundation of China (NSFC) Grant No. 61802254, the
  Huawei Innovation Research Program, the Facebook PhD Fellowship Program, and DOC
  Fellowship No. 24956 of the Austrian Academy of Sciences (ÖAW).
article_processing_charge: No
author:
- first_name: Ali
  full_name: Asadi, Ali
  last_name: Asadi
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Hongfei
  full_name: Fu, Hongfei
  id: 3AAD03D6-F248-11E8-B48F-1D18A9856A87
  last_name: Fu
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Mohammad
  full_name: Mahdavi, Mohammad
  last_name: Mahdavi
citation:
  ama: 'Asadi A, Chatterjee K, Fu H, Goharshady AK, Mahdavi M. Polynomial reachability
    witnesses via Stellensätze. In: <i>Proceedings of the 42nd ACM SIGPLAN International
    Conference on Programming Language Design and Implementation</i>. Association
    for Computing Machinery; 2021:772-787. doi:<a href="https://doi.org/10.1145/3453483.3454076">10.1145/3453483.3454076</a>'
  apa: 'Asadi, A., Chatterjee, K., Fu, H., Goharshady, A. K., &#38; Mahdavi, M. (2021).
    Polynomial reachability witnesses via Stellensätze. In <i>Proceedings of the 42nd
    ACM SIGPLAN International Conference on Programming Language Design and Implementation</i>
    (pp. 772–787). Online: Association for Computing Machinery. <a href="https://doi.org/10.1145/3453483.3454076">https://doi.org/10.1145/3453483.3454076</a>'
  chicago: Asadi, Ali, Krishnendu Chatterjee, Hongfei Fu, Amir Kafshdar Goharshady,
    and Mohammad Mahdavi. “Polynomial Reachability Witnesses via Stellensätze.” In
    <i>Proceedings of the 42nd ACM SIGPLAN International Conference on Programming
    Language Design and Implementation</i>, 772–87. Association for Computing Machinery,
    2021. <a href="https://doi.org/10.1145/3453483.3454076">https://doi.org/10.1145/3453483.3454076</a>.
  ieee: A. Asadi, K. Chatterjee, H. Fu, A. K. Goharshady, and M. Mahdavi, “Polynomial
    reachability witnesses via Stellensätze,” in <i>Proceedings of the 42nd ACM SIGPLAN
    International Conference on Programming Language Design and Implementation</i>,
    Online, 2021, pp. 772–787.
  ista: 'Asadi A, Chatterjee K, Fu H, Goharshady AK, Mahdavi M. 2021. Polynomial reachability
    witnesses via Stellensätze. Proceedings of the 42nd ACM SIGPLAN International
    Conference on Programming Language Design and Implementation. PLDI: Programming
    Language Design and Implementation, 772–787.'
  mla: Asadi, Ali, et al. “Polynomial Reachability Witnesses via Stellensätze.” <i>Proceedings
    of the 42nd ACM SIGPLAN International Conference on Programming Language Design
    and Implementation</i>, Association for Computing Machinery, 2021, pp. 772–87,
    doi:<a href="https://doi.org/10.1145/3453483.3454076">10.1145/3453483.3454076</a>.
  short: A. Asadi, K. Chatterjee, H. Fu, A.K. Goharshady, M. Mahdavi, in:, Proceedings
    of the 42nd ACM SIGPLAN International Conference on Programming Language Design
    and Implementation, Association for Computing Machinery, 2021, pp. 772–787.
conference:
  end_date: 2021-06-26
  location: Online
  name: 'PLDI: Programming Language Design and Implementation'
  start_date: 2021-06-20
date_created: 2021-07-11T22:01:17Z
date_published: 2021-06-01T00:00:00Z
date_updated: 2025-07-10T12:02:00Z
day: '01'
department:
- _id: KrCh
doi: 10.1145/3453483.3454076
ec_funded: 1
external_id:
  isi:
  - '000723661700050'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://hal.archives-ouvertes.fr/hal-03183862/
month: '06'
oa: 1
oa_version: Submitted Version
page: 772-787
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
publication: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming
  Language Design and Implementation
publication_identifier:
  isbn:
  - '9781450383912'
publication_status: published
publisher: Association for Computing Machinery
quality_controlled: '1'
scopus_import: '1'
status: public
title: Polynomial reachability witnesses via Stellensätze
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2021'
...
---
_id: '9646'
abstract:
- lang: eng
  text: We consider the fundamental problem of deriving quantitative bounds on the
    probability that a given assertion is violated in a probabilistic program. We
    provide automated algorithms that obtain both lower and upper bounds on the assertion
    violation probability. The main novelty of our approach is that we prove new and
    dedicated fixed-point theorems which serve as the theoretical basis of our algorithms
    and enable us to reason about assertion violation bounds in terms of pre and post
    fixed-point functions. To synthesize such fixed-points, we devise algorithms that
    utilize a wide range of mathematical tools, including repulsing ranking supermartingales,
    Hoeffding's lemma, Minkowski decompositions, Jensen's inequality, and convex optimization.
    On the theoretical side, we provide (i) the first automated algorithm for lower-bounds
    on assertion violation probabilities, (ii) the first complete algorithm for upper-bounds
    of exponential form in affine programs, and (iii) provably and significantly tighter
    upper-bounds than the previous approaches. On the practical side, we show our
    algorithms can handle a wide variety of programs from the literature and synthesize
    bounds that are remarkably tighter than previous results, in some cases by thousands
    of orders of magnitude.
acknowledgement: 'We are very thankful to the anonymous reviewers for the helpful
  and valuable comments. The work was partially supported by the National Natural
  Science Foundation of China (NSFC) Grant No. 61802254, the Huawei Innovation Research
  Program, the ERC CoG 863818 (ForM-SMArt), the Facebook PhD Fellowship Program and
  DOC Fellowship #24956 of the Austrian Academy of Sciences (ÖAW).'
article_processing_charge: No
arxiv: 1
author:
- first_name: Jinyi
  full_name: Wang, Jinyi
  last_name: Wang
- first_name: Yican
  full_name: Sun, Yican
  last_name: Sun
- first_name: Hongfei
  full_name: Fu, Hongfei
  id: 3AAD03D6-F248-11E8-B48F-1D18A9856A87
  last_name: Fu
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
citation:
  ama: 'Wang J, Sun Y, Fu H, Chatterjee K, Goharshady AK. Quantitative analysis of
    assertion violations in probabilistic programs. In: <i>Proceedings of the 42nd
    ACM SIGPLAN International Conference on Programming Language Design and Implementation</i>.
    Association for Computing Machinery; 2021:1171-1186. doi:<a href="https://doi.org/10.1145/3453483.3454102">10.1145/3453483.3454102</a>'
  apa: 'Wang, J., Sun, Y., Fu, H., Chatterjee, K., &#38; Goharshady, A. K. (2021).
    Quantitative analysis of assertion violations in probabilistic programs. In <i>Proceedings
    of the 42nd ACM SIGPLAN International Conference on Programming Language Design
    and Implementation</i> (pp. 1171–1186). Online: Association for Computing Machinery.
    <a href="https://doi.org/10.1145/3453483.3454102">https://doi.org/10.1145/3453483.3454102</a>'
  chicago: Wang, Jinyi, Yican Sun, Hongfei Fu, Krishnendu Chatterjee, and Amir Kafshdar
    Goharshady. “Quantitative Analysis of Assertion Violations in Probabilistic Programs.”
    In <i>Proceedings of the 42nd ACM SIGPLAN International Conference on Programming
    Language Design and Implementation</i>, 1171–86. Association for Computing Machinery,
    2021. <a href="https://doi.org/10.1145/3453483.3454102">https://doi.org/10.1145/3453483.3454102</a>.
  ieee: J. Wang, Y. Sun, H. Fu, K. Chatterjee, and A. K. Goharshady, “Quantitative
    analysis of assertion violations in probabilistic programs,” in <i>Proceedings
    of the 42nd ACM SIGPLAN International Conference on Programming Language Design
    and Implementation</i>, Online, 2021, pp. 1171–1186.
  ista: 'Wang J, Sun Y, Fu H, Chatterjee K, Goharshady AK. 2021. Quantitative analysis
    of assertion violations in probabilistic programs. Proceedings of the 42nd ACM
    SIGPLAN International Conference on Programming Language Design and Implementation.
    PLDI: Programming Language Design and Implementation, 1171–1186.'
  mla: Wang, Jinyi, et al. “Quantitative Analysis of Assertion Violations in Probabilistic
    Programs.” <i>Proceedings of the 42nd ACM SIGPLAN International Conference on
    Programming Language Design and Implementation</i>, Association for Computing
    Machinery, 2021, pp. 1171–86, doi:<a href="https://doi.org/10.1145/3453483.3454102">10.1145/3453483.3454102</a>.
  short: J. Wang, Y. Sun, H. Fu, K. Chatterjee, A.K. Goharshady, in:, Proceedings
    of the 42nd ACM SIGPLAN International Conference on Programming Language Design
    and Implementation, Association for Computing Machinery, 2021, pp. 1171–1186.
conference:
  end_date: 2021-06-26
  location: Online
  name: 'PLDI: Programming Language Design and Implementation'
  start_date: 2021-06-20
date_created: 2021-07-11T22:01:18Z
date_published: 2021-06-01T00:00:00Z
date_updated: 2025-04-15T07:55:05Z
day: '01'
department:
- _id: KrCh
doi: 10.1145/3453483.3454102
ec_funded: 1
external_id:
  arxiv:
  - '2011.14617'
  isi:
  - '000723661700076'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/2011.14617
month: '06'
oa: 1
oa_version: Preprint
page: 1171-1186
project:
- _id: 0599E47C-7A3F-11EA-A408-12923DDC885E
  call_identifier: H2020
  grant_number: '863818'
  name: 'Formal Methods for Stochastic Models: Algorithms and Applications'
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
publication: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming
  Language Design and Implementation
publication_identifier:
  isbn:
  - '9781450383912'
publication_status: published
publisher: Association for Computing Machinery
quality_controlled: '1'
scopus_import: '1'
status: public
title: Quantitative analysis of assertion violations in probabilistic programs
type: conference
user_id: 4359f0d1-fa6c-11eb-b949-802e58b17ae8
year: '2021'
...
---
OA_place: publisher
_id: '8934'
abstract:
- lang: eng
  text: "In this thesis, we consider several of the most classical and fundamental
    problems in static analysis and formal verification, including invariant generation,
    reachability analysis, termination analysis of probabilistic programs, data-flow
    analysis, quantitative analysis of Markov chains and Markov decision processes,
    and the problem of data packing in cache management.\r\nWe use techniques from
    parameterized complexity theory, polyhedral geometry, and real algebraic geometry
    to significantly improve the state-of-the-art, in terms of both scalability and
    completeness guarantees, for the mentioned problems. In some cases, our results
    are the first theoretical improvements for the respective problems in two or three
    decades."
acknowledgement: 'The research was partially supported by an IBM PhD fellowship, a
  Facebook PhD fellowship, and DOC fellowship #24956 of the Austrian Academy of Sciences
  (OeAW).'
alternative_title:
- ISTA Thesis
article_processing_charge: No
author:
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
citation:
  ama: Goharshady AK. Parameterized and algebro-geometric advances in static program
    analysis. 2021. doi:<a href="https://doi.org/10.15479/AT:ISTA:8934">10.15479/AT:ISTA:8934</a>
  apa: Goharshady, A. K. (2021). <i>Parameterized and algebro-geometric advances in
    static program analysis</i>. Institute of Science and Technology Austria. <a href="https://doi.org/10.15479/AT:ISTA:8934">https://doi.org/10.15479/AT:ISTA:8934</a>
  chicago: Goharshady, Amir Kafshdar. “Parameterized and Algebro-Geometric Advances
    in Static Program Analysis.” Institute of Science and Technology Austria, 2021.
    <a href="https://doi.org/10.15479/AT:ISTA:8934">https://doi.org/10.15479/AT:ISTA:8934</a>.
  ieee: A. K. Goharshady, “Parameterized and algebro-geometric advances in static
    program analysis,” Institute of Science and Technology Austria, 2021.
  ista: Goharshady AK. 2021. Parameterized and algebro-geometric advances in static
    program analysis. Institute of Science and Technology Austria.
  mla: Goharshady, Amir Kafshdar. <i>Parameterized and Algebro-Geometric Advances
    in Static Program Analysis</i>. Institute of Science and Technology Austria, 2021,
    doi:<a href="https://doi.org/10.15479/AT:ISTA:8934">10.15479/AT:ISTA:8934</a>.
  short: A.K. Goharshady, Parameterized and Algebro-Geometric Advances in Static Program
    Analysis, Institute of Science and Technology Austria, 2021.
corr_author: '1'
date_created: 2020-12-10T12:17:07Z
date_published: 2021-01-01T00:00:00Z
date_updated: 2026-04-16T10:07:18Z
day: '01'
ddc:
- '005'
degree_awarded: PhD
department:
- _id: KrCh
- _id: GradSch
doi: 10.15479/AT:ISTA:8934
file:
- access_level: open_access
  checksum: d1b9db3725aed34dadd81274aeb9426c
  content_type: application/pdf
  creator: akafshda
  date_created: 2020-12-22T20:08:44Z
  date_updated: 2021-12-23T23:30:04Z
  embargo: 2021-12-22
  file_id: '8969'
  file_name: Thesis-pdfa.pdf
  file_size: 5251507
  relation: main_file
- access_level: closed
  checksum: 1661df7b393e6866d2460eba3c905130
  content_type: application/zip
  creator: akafshda
  date_created: 2020-12-22T20:08:50Z
  date_updated: 2021-03-04T23:30:04Z
  embargo_to: open_access
  file_id: '8970'
  file_name: source.zip
  file_size: 10636756
  relation: source_file
file_date_updated: 2021-12-23T23:30:04Z
has_accepted_license: '1'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Published Version
page: '278'
project:
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
- _id: 266EEEC0-B435-11E9-9278-68D0E5697425
  name: Quantitative Game-theoretic Analysis of Blockchain Applications and Smart
    Contracts
publication_identifier:
  issn:
  - 2663-337X
publication_status: published
publisher: Institute of Science and Technology Austria
related_material:
  record:
  - id: '6490'
    relation: part_of_dissertation
    status: public
  - id: '6780'
    relation: part_of_dissertation
    status: public
  - id: '7158'
    relation: part_of_dissertation
    status: public
  - id: '66'
    relation: part_of_dissertation
    status: public
  - id: '6378'
    relation: part_of_dissertation
    status: public
  - id: '311'
    relation: part_of_dissertation
    status: public
  - id: '6175'
    relation: part_of_dissertation
    status: public
  - id: '6340'
    relation: part_of_dissertation
    status: public
  - id: '7014'
    relation: part_of_dissertation
    status: public
  - id: '6009'
    relation: part_of_dissertation
    status: public
  - id: '1437'
    relation: part_of_dissertation
    status: public
  - id: '8728'
    relation: part_of_dissertation
    status: public
  - id: '8089'
    relation: part_of_dissertation
    status: public
  - id: '6380'
    relation: part_of_dissertation
    status: public
  - id: '5977'
    relation: part_of_dissertation
    status: public
  - id: '6056'
    relation: part_of_dissertation
    status: public
  - id: '639'
    relation: part_of_dissertation
    status: public
  - id: '1386'
    relation: part_of_dissertation
    status: public
  - id: '6918'
    relation: part_of_dissertation
    status: public
  - id: '7810'
    relation: part_of_dissertation
    status: public
  - id: '949'
    relation: part_of_dissertation
    status: public
status: public
supervisor:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
title: Parameterized and algebro-geometric advances in static program analysis
tmp:
  image: /images/cc_0.png
  legal_code_url: https://creativecommons.org/publicdomain/zero/1.0/legalcode
  name: Creative Commons Public Domain Dedication (CC0 1.0)
  short: CC0 (1.0)
type: dissertation
user_id: ba8df636-2132-11f1-aed0-ed93e2281fdd
year: '2021'
...
---
_id: '8671'
abstract:
- lang: eng
  text: 'We study relations between evidence theory and S-approximation spaces. Both
    theories have their roots in the analysis of Dempsterchr(''39'')s multivalued
    mappings and lower and upper probabilities, and have close relations to rough
    sets. We show that an S-approximation space, satisfying a monotonicity condition,
    can induce a natural belief structure which is a fundamental block in evidence
    theory. We also demonstrate that one can induce a natural belief structure on
    one set, given a belief structure on another set, if the two sets are related
    by a partial monotone S-approximation space. '
acknowledgement: We are very grateful to the anonymous reviewer for detailed comments
  and suggestions that significantly improved the presentation of this paper. The
  research was partially supported by a DOC fellowship of the Austrian Academy of
  Sciences.
article_processing_charge: No
article_type: original
arxiv: 1
author:
- first_name: A.
  full_name: Shakiba, A.
  last_name: Shakiba
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: M.R.
  full_name: Hooshmandasl, M.R.
  last_name: Hooshmandasl
- first_name: M.
  full_name: Alambardar Meybodi, M.
  last_name: Alambardar Meybodi
citation:
  ama: Shakiba A, Goharshady AK, Hooshmandasl MR, Alambardar Meybodi M. A note on
    belief structures and s-approximation spaces. <i>Iranian Journal of Mathematical
    Sciences and Informatics</i>. 2020;15(2):117-128. doi:<a href="https://doi.org/10.29252/ijmsi.15.2.117">10.29252/ijmsi.15.2.117</a>
  apa: Shakiba, A., Goharshady, A. K., Hooshmandasl, M. R., &#38; Alambardar Meybodi,
    M. (2020). A note on belief structures and s-approximation spaces. <i>Iranian
    Journal of Mathematical Sciences and Informatics</i>. Iranian Academic Center
    for Education, Culture and Research. <a href="https://doi.org/10.29252/ijmsi.15.2.117">https://doi.org/10.29252/ijmsi.15.2.117</a>
  chicago: Shakiba, A., Amir Kafshdar Goharshady, M.R. Hooshmandasl, and M. Alambardar
    Meybodi. “A Note on Belief Structures and S-Approximation Spaces.” <i>Iranian
    Journal of Mathematical Sciences and Informatics</i>. Iranian Academic Center
    for Education, Culture and Research, 2020. <a href="https://doi.org/10.29252/ijmsi.15.2.117">https://doi.org/10.29252/ijmsi.15.2.117</a>.
  ieee: A. Shakiba, A. K. Goharshady, M. R. Hooshmandasl, and M. Alambardar Meybodi,
    “A note on belief structures and s-approximation spaces,” <i>Iranian Journal of
    Mathematical Sciences and Informatics</i>, vol. 15, no. 2. Iranian Academic Center
    for Education, Culture and Research, pp. 117–128, 2020.
  ista: Shakiba A, Goharshady AK, Hooshmandasl MR, Alambardar Meybodi M. 2020. A note
    on belief structures and s-approximation spaces. Iranian Journal of Mathematical
    Sciences and Informatics. 15(2), 117–128.
  mla: Shakiba, A., et al. “A Note on Belief Structures and S-Approximation Spaces.”
    <i>Iranian Journal of Mathematical Sciences and Informatics</i>, vol. 15, no.
    2, Iranian Academic Center for Education, Culture and Research, 2020, pp. 117–28,
    doi:<a href="https://doi.org/10.29252/ijmsi.15.2.117">10.29252/ijmsi.15.2.117</a>.
  short: A. Shakiba, A.K. Goharshady, M.R. Hooshmandasl, M. Alambardar Meybodi, Iranian
    Journal of Mathematical Sciences and Informatics 15 (2020) 117–128.
date_created: 2020-10-18T22:01:36Z
date_published: 2020-10-01T00:00:00Z
date_updated: 2025-04-15T07:55:04Z
day: '01'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.29252/ijmsi.15.2.117
external_id:
  arxiv:
  - '1805.10672'
file:
- access_level: open_access
  checksum: f299661a6d51cda6d255a76be696f48d
  content_type: application/pdf
  creator: dernst
  date_created: 2020-10-19T11:14:20Z
  date_updated: 2020-10-19T11:14:20Z
  file_id: '8676'
  file_name: 2020_ijmsi_Shakiba_accepted.pdf
  file_size: 261688
  relation: main_file
  success: 1
file_date_updated: 2020-10-19T11:14:20Z
has_accepted_license: '1'
intvolume: '        15'
issue: '2'
language:
- iso: eng
month: '10'
oa: 1
oa_version: Submitted Version
page: 117-128
project:
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
publication: Iranian Journal of Mathematical Sciences and Informatics
publication_identifier:
  eissn:
  - 2008-9473
  issn:
  - 1735-4463
publication_status: published
publisher: Iranian Academic Center for Education, Culture and Research
quality_controlled: '1'
scopus_import: '1'
status: public
title: A note on belief structures and s-approximation spaces
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 15
year: '2020'
...
---
_id: '7810'
abstract:
- lang: eng
  text: "Interprocedural data-flow analyses form an expressive and useful paradigm
    of numerous static analysis applications, such as live variables analysis, alias
    analysis and null pointers analysis. The most widely-used framework for interprocedural
    data-flow analysis is IFDS, which encompasses distributive data-flow functions
    over a finite domain. On-demand data-flow analyses restrict the focus of the analysis
    on specific program locations and data facts. This setting provides a natural
    split between (i) an offline (or preprocessing) phase, where the program is partially
    analyzed and analysis summaries are created, and (ii) an online (or query) phase,
    where analysis queries arrive on demand and the summaries are used to speed up
    answering queries.\r\nIn this work, we consider on-demand IFDS analyses where
    the queries concern program locations of the same procedure (aka same-context
    queries). We exploit the fact that flow graphs of programs have low treewidth
    to develop faster algorithms that are space and time optimal for many common data-flow
    analyses, in both the preprocessing and the query phase. We also use treewidth
    to develop query solutions that are embarrassingly parallelizable, i.e. the total
    work for answering each query is split to a number of threads such that each thread
    performs only a constant amount of work. Finally, we implement a static analyzer
    based on our algorithms, and perform a series of on-demand analysis experiments
    on standard benchmarks. Our experimental results show a drastic speed-up of the
    queries after only a lightweight preprocessing phase, which significantly outperforms
    existing techniques."
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Rasmus
  full_name: Ibsen-Jensen, Rasmus
  id: 3B699956-F248-11E8-B48F-1D18A9856A87
  last_name: Ibsen-Jensen
  orcid: 0000-0003-4783-0389
- first_name: Andreas
  full_name: Pavlogiannis, Andreas
  id: 49704004-F248-11E8-B48F-1D18A9856A87
  last_name: Pavlogiannis
  orcid: 0000-0002-8943-0722
citation:
  ama: 'Chatterjee K, Goharshady AK, Ibsen-Jensen R, Pavlogiannis A. Optimal and perfectly
    parallel algorithms for on-demand data-flow analysis. In: <i>European Symposium
    on Programming</i>. Vol 12075. Springer Nature; 2020:112-140. doi:<a href="https://doi.org/10.1007/978-3-030-44914-8_5">10.1007/978-3-030-44914-8_5</a>'
  apa: 'Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R., &#38; Pavlogiannis, A.
    (2020). Optimal and perfectly parallel algorithms for on-demand data-flow analysis.
    In <i>European Symposium on Programming</i> (Vol. 12075, pp. 112–140). Dublin,
    Ireland: Springer Nature. <a href="https://doi.org/10.1007/978-3-030-44914-8_5">https://doi.org/10.1007/978-3-030-44914-8_5</a>'
  chicago: Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Rasmus Ibsen-Jensen,
    and Andreas Pavlogiannis. “Optimal and Perfectly Parallel Algorithms for On-Demand
    Data-Flow Analysis.” In <i>European Symposium on Programming</i>, 12075:112–40.
    Springer Nature, 2020. <a href="https://doi.org/10.1007/978-3-030-44914-8_5">https://doi.org/10.1007/978-3-030-44914-8_5</a>.
  ieee: K. Chatterjee, A. K. Goharshady, R. Ibsen-Jensen, and A. Pavlogiannis, “Optimal
    and perfectly parallel algorithms for on-demand data-flow analysis,” in <i>European
    Symposium on Programming</i>, Dublin, Ireland, 2020, vol. 12075, pp. 112–140.
  ista: 'Chatterjee K, Goharshady AK, Ibsen-Jensen R, Pavlogiannis A. 2020. Optimal
    and perfectly parallel algorithms for on-demand data-flow analysis. European Symposium
    on Programming. ESOP: Programming Languages and Systems, LNCS, vol. 12075, 112–140.'
  mla: Chatterjee, Krishnendu, et al. “Optimal and Perfectly Parallel Algorithms for
    On-Demand Data-Flow Analysis.” <i>European Symposium on Programming</i>, vol.
    12075, Springer Nature, 2020, pp. 112–40, doi:<a href="https://doi.org/10.1007/978-3-030-44914-8_5">10.1007/978-3-030-44914-8_5</a>.
  short: K. Chatterjee, A.K. Goharshady, R. Ibsen-Jensen, A. Pavlogiannis, in:, European
    Symposium on Programming, Springer Nature, 2020, pp. 112–140.
conference:
  end_date: 2020-04-30
  location: Dublin, Ireland
  name: 'ESOP: Programming Languages and Systems'
  start_date: 2020-04-25
corr_author: '1'
date_created: 2020-05-10T22:00:50Z
date_published: 2020-04-18T00:00:00Z
date_updated: 2026-04-27T22:31:01Z
day: '18'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1007/978-3-030-44914-8_5
external_id:
  isi:
  - '000681656800005'
file:
- access_level: open_access
  checksum: 8618b80f4cf7b39a60e61a6445ad9807
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-26T13:34:48Z
  date_updated: 2020-07-14T12:48:03Z
  file_id: '7895'
  file_name: 2020_LNCS_Chatterjee.pdf
  file_size: 651250
  relation: main_file
file_date_updated: 2020-07-14T12:48:03Z
has_accepted_license: '1'
intvolume: '     12075'
isi: 1
language:
- iso: eng
month: '04'
oa: 1
oa_version: Published Version
page: 112-140
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
- _id: 266EEEC0-B435-11E9-9278-68D0E5697425
  name: Quantitative Game-theoretic Analysis of Blockchain Applications and Smart
    Contracts
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
publication: European Symposium on Programming
publication_identifier:
  eissn:
  - 1611-3349
  isbn:
  - '9783030449131'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Optimal and perfectly parallel algorithms for on-demand data-flow analysis
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: ba8df636-2132-11f1-aed0-ed93e2281fdd
volume: 12075
year: '2020'
...
---
_id: '8728'
abstract:
- lang: eng
  text: Discrete-time Markov Chains (MCs) and Markov Decision Processes (MDPs) are
    two standard formalisms in system analysis. Their main associated quantitative
    objectives are hitting probabilities, discounted sum, and mean payoff. Although
    there are many techniques for computing these objectives in general MCs/MDPs,
    they have not been thoroughly studied in terms of parameterized algorithms, particularly
    when treewidth is used as the parameter. This is in sharp contrast to qualitative
    objectives for MCs, MDPs and graph games, for which treewidth-based algorithms
    yield significant complexity improvements. In this work, we show that treewidth
    can also be used to obtain faster algorithms for the quantitative problems. For
    an MC with n states and m transitions, we show that each of the classical quantitative
    objectives can be computed in   O((n+m)⋅t2)  time, given a tree decomposition
    of the MC with width t. Our results also imply a bound of   O(κ⋅(n+m)⋅t2)  for
    each objective on MDPs, where   κ  is the number of strategy-iteration refinements
    required for the given input and objective. Finally, we make an experimental evaluation
    of our new algorithms on low-treewidth MCs and MDPs obtained from the DaCapo benchmark
    suite. Our experiments show that on low-treewidth MCs and MDPs, our algorithms
    outperform existing well-established methods by one or more orders of magnitude.
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Ali
  full_name: Asadi, Ali
  last_name: Asadi
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Kiarash
  full_name: Mohammadi, Kiarash
  last_name: Mohammadi
- first_name: Andreas
  full_name: Pavlogiannis, Andreas
  id: 49704004-F248-11E8-B48F-1D18A9856A87
  last_name: Pavlogiannis
  orcid: 0000-0002-8943-0722
citation:
  ama: 'Asadi A, Chatterjee K, Goharshady AK, Mohammadi K, Pavlogiannis A. Faster
    algorithms for quantitative analysis of MCs and MDPs with small treewidth. In:
    <i>Automated Technology for Verification and Analysis</i>. Vol 12302. Springer
    Nature; 2020:253-270. doi:<a href="https://doi.org/10.1007/978-3-030-59152-6_14">10.1007/978-3-030-59152-6_14</a>'
  apa: 'Asadi, A., Chatterjee, K., Goharshady, A. K., Mohammadi, K., &#38; Pavlogiannis,
    A. (2020). Faster algorithms for quantitative analysis of MCs and MDPs with small
    treewidth. In <i>Automated Technology for Verification and Analysis</i> (Vol.
    12302, pp. 253–270). Hanoi, Vietnam: Springer Nature. <a href="https://doi.org/10.1007/978-3-030-59152-6_14">https://doi.org/10.1007/978-3-030-59152-6_14</a>'
  chicago: Asadi, Ali, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Kiarash Mohammadi,
    and Andreas Pavlogiannis. “Faster Algorithms for Quantitative Analysis of MCs
    and MDPs with Small Treewidth.” In <i>Automated Technology for Verification and
    Analysis</i>, 12302:253–70. Springer Nature, 2020. <a href="https://doi.org/10.1007/978-3-030-59152-6_14">https://doi.org/10.1007/978-3-030-59152-6_14</a>.
  ieee: A. Asadi, K. Chatterjee, A. K. Goharshady, K. Mohammadi, and A. Pavlogiannis,
    “Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth,”
    in <i>Automated Technology for Verification and Analysis</i>, Hanoi, Vietnam,
    2020, vol. 12302, pp. 253–270.
  ista: 'Asadi A, Chatterjee K, Goharshady AK, Mohammadi K, Pavlogiannis A. 2020.
    Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth.
    Automated Technology for Verification and Analysis. ATVA: Automated Technology
    for Verification and Analysis, LNCS, vol. 12302, 253–270.'
  mla: Asadi, Ali, et al. “Faster Algorithms for Quantitative Analysis of MCs and
    MDPs with Small Treewidth.” <i>Automated Technology for Verification and Analysis</i>,
    vol. 12302, Springer Nature, 2020, pp. 253–70, doi:<a href="https://doi.org/10.1007/978-3-030-59152-6_14">10.1007/978-3-030-59152-6_14</a>.
  short: A. Asadi, K. Chatterjee, A.K. Goharshady, K. Mohammadi, A. Pavlogiannis,
    in:, Automated Technology for Verification and Analysis, Springer Nature, 2020,
    pp. 253–270.
conference:
  end_date: 2020-10-23
  location: Hanoi, Vietnam
  name: 'ATVA: Automated Technology for Verification and Analysis'
  start_date: 2020-10-19
date_created: 2020-11-06T07:30:05Z
date_published: 2020-10-12T00:00:00Z
date_updated: 2026-04-27T22:31:00Z
day: '12'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1007/978-3-030-59152-6_14
external_id:
  isi:
  - '000723555700014'
file:
- access_level: open_access
  checksum: ae83f27e5b189d5abc2e7514f1b7e1b5
  content_type: application/pdf
  creator: dernst
  date_created: 2020-11-06T07:41:03Z
  date_updated: 2020-11-06T07:41:03Z
  file_id: '8729'
  file_name: 2020_LNCS_ATVA_Asadi_accepted.pdf
  file_size: 726648
  relation: main_file
  success: 1
file_date_updated: 2020-11-06T07:41:03Z
has_accepted_license: '1'
intvolume: '     12302'
isi: 1
language:
- iso: eng
month: '10'
oa: 1
oa_version: Submitted Version
page: 253-270
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
publication: Automated Technology for Verification and Analysis
publication_identifier:
  eisbn:
  - '9783030591526'
  eissn:
  - 1611-3349
  isbn:
  - '9783030591519'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 12302
year: '2020'
...
---
_id: '8089'
abstract:
- lang: eng
  text: "We consider the classical problem of invariant generation for programs with
    polynomial assignments and focus on synthesizing invariants that are a conjunction
    of strict polynomial inequalities. We present a sound and semi-complete method
    based on positivstellensaetze, i.e. theorems in semi-algebraic geometry that characterize
    positive polynomials over a semi-algebraic set.\r\n\r\nOn the theoretical side,
    the worst-case complexity of our approach is subexponential, whereas the worst-case
    complexity of the previous complete method (Kapur, ACA 2004) is doubly-exponential.
    Even when restricted to linear invariants, the best previous complexity for complete
    invariant generation is exponential (Colon et al, CAV 2003). On the practical
    side, we reduce the invariant generation problem to quadratic programming (QCLP),
    which is a classical optimization problem with many industrial solvers. We demonstrate
    the applicability of our approach by providing experimental results on several
    academic benchmarks. To the best of our knowledge, the only previous invariant
    generation method that provides completeness guarantees for invariants consisting
    of polynomial inequalities is (Kapur, ACA 2004), which relies on quantifier elimination
    and cannot even handle toy programs such as our running example."
article_processing_charge: No
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Hongfei
  full_name: Fu, Hongfei
  id: 3AAD03D6-F248-11E8-B48F-1D18A9856A87
  last_name: Fu
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Ehsan Kafshdar
  full_name: Goharshady, Ehsan Kafshdar
  last_name: Goharshady
citation:
  ama: 'Chatterjee K, Fu H, Goharshady AK, Goharshady EK. Polynomial invariant generation
    for non-deterministic recursive programs. In: <i>Proceedings of the 41st ACM SIGPLAN
    Conference on Programming Language Design and Implementation</i>. Association
    for Computing Machinery; 2020:672-687. doi:<a href="https://doi.org/10.1145/3385412.3385969">10.1145/3385412.3385969</a>'
  apa: 'Chatterjee, K., Fu, H., Goharshady, A. K., &#38; Goharshady, E. K. (2020).
    Polynomial invariant generation for non-deterministic recursive programs. In <i>Proceedings
    of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation</i>
    (pp. 672–687). London, United Kingdom: Association for Computing Machinery. <a
    href="https://doi.org/10.1145/3385412.3385969">https://doi.org/10.1145/3385412.3385969</a>'
  chicago: Chatterjee, Krishnendu, Hongfei Fu, Amir Kafshdar Goharshady, and Ehsan
    Kafshdar Goharshady. “Polynomial Invariant Generation for Non-Deterministic Recursive
    Programs.” In <i>Proceedings of the 41st ACM SIGPLAN Conference on Programming
    Language Design and Implementation</i>, 672–87. Association for Computing Machinery,
    2020. <a href="https://doi.org/10.1145/3385412.3385969">https://doi.org/10.1145/3385412.3385969</a>.
  ieee: K. Chatterjee, H. Fu, A. K. Goharshady, and E. K. Goharshady, “Polynomial
    invariant generation for non-deterministic recursive programs,” in <i>Proceedings
    of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation</i>,
    London, United Kingdom, 2020, pp. 672–687.
  ista: 'Chatterjee K, Fu H, Goharshady AK, Goharshady EK. 2020. Polynomial invariant
    generation for non-deterministic recursive programs. Proceedings of the 41st ACM
    SIGPLAN Conference on Programming Language Design and Implementation. PLDI: Programming
    Language Design and Implementation, 672–687.'
  mla: Chatterjee, Krishnendu, et al. “Polynomial Invariant Generation for Non-Deterministic
    Recursive Programs.” <i>Proceedings of the 41st ACM SIGPLAN Conference on Programming
    Language Design and Implementation</i>, Association for Computing Machinery, 2020,
    pp. 672–87, doi:<a href="https://doi.org/10.1145/3385412.3385969">10.1145/3385412.3385969</a>.
  short: K. Chatterjee, H. Fu, A.K. Goharshady, E.K. Goharshady, in:, Proceedings
    of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation,
    Association for Computing Machinery, 2020, pp. 672–687.
conference:
  end_date: 2020-06-20
  location: London, United Kingdom
  name: 'PLDI: Programming Language Design and Implementation'
  start_date: 2020-06-15
date_created: 2020-07-05T22:00:45Z
date_published: 2020-06-11T00:00:00Z
date_updated: 2026-04-27T22:31:00Z
day: '11'
department:
- _id: KrCh
doi: 10.1145/3385412.3385969
external_id:
  arxiv:
  - '1902.04373'
  isi:
  - '000614622300045'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1902.04373
month: '06'
oa: 1
oa_version: Preprint
page: 672-687
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
publication: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language
  Design and Implementation
publication_identifier:
  isbn:
  - '9781450376136'
publication_status: published
publisher: Association for Computing Machinery
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Polynomial invariant generation for non-deterministic recursive programs
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2020'
...
---
_id: '6918'
abstract:
- lang: eng
  text: "We consider the classic problem of Network Reliability. A network is given
    together with a source vertex, one or more target vertices, and probabilities
    assigned to each of the edges. Each edge of the network is operable with its associated
    probability and the problem is to determine the probability of having at least
    one source-to-target path that is entirely composed of operable edges. This problem
    is known to be NP-hard.\r\n\r\nWe provide a novel scalable algorithm to solve
    the Network Reliability problem when the treewidth of the underlying network is
    small. We also show our algorithm’s applicability for real-world transit networks
    that have small treewidth, including the metro networks of major cities, such
    as London and Tokyo. Our algorithm leverages tree decompositions to shrink the
    original graph into much smaller graphs, for which reliability can be efficiently
    and exactly computed using a brute force method. To the best of our knowledge,
    this is the first exact algorithm for Network Reliability that can scale to handle
    real-world instances of the problem."
acknowledgement: We are grateful to the anonymous reviewers for their comments, which
  significantly improved the present work. The research was partially supported by
  the EPSRC Early Career Fellowship EP/R023379/1, grant no. SC7-1718-01 of the London
  Mathematical Society, an IBM PhD Fellowship, and a DOC Fellowship of the Austrian
  Academy of Sciences (ÖAW).
article_number: '106665'
article_processing_charge: No
article_type: original
arxiv: 1
author:
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Fatemeh
  full_name: Mohammadi, Fatemeh
  last_name: Mohammadi
citation:
  ama: Goharshady AK, Mohammadi F. An efficient algorithm for computing network reliability
    in small treewidth. <i>Reliability Engineering and System Safety</i>. 2020;193.
    doi:<a href="https://doi.org/10.1016/j.ress.2019.106665">10.1016/j.ress.2019.106665</a>
  apa: Goharshady, A. K., &#38; Mohammadi, F. (2020). An efficient algorithm for computing
    network reliability in small treewidth. <i>Reliability Engineering and System
    Safety</i>. Elsevier. <a href="https://doi.org/10.1016/j.ress.2019.106665">https://doi.org/10.1016/j.ress.2019.106665</a>
  chicago: Goharshady, Amir Kafshdar, and Fatemeh Mohammadi. “An Efficient Algorithm
    for Computing Network Reliability in Small Treewidth.” <i>Reliability Engineering
    and System Safety</i>. Elsevier, 2020. <a href="https://doi.org/10.1016/j.ress.2019.106665">https://doi.org/10.1016/j.ress.2019.106665</a>.
  ieee: A. K. Goharshady and F. Mohammadi, “An efficient algorithm for computing network
    reliability in small treewidth,” <i>Reliability Engineering and System Safety</i>,
    vol. 193. Elsevier, 2020.
  ista: Goharshady AK, Mohammadi F. 2020. An efficient algorithm for computing network
    reliability in small treewidth. Reliability Engineering and System Safety. 193,
    106665.
  mla: Goharshady, Amir Kafshdar, and Fatemeh Mohammadi. “An Efficient Algorithm for
    Computing Network Reliability in Small Treewidth.” <i>Reliability Engineering
    and System Safety</i>, vol. 193, 106665, Elsevier, 2020, doi:<a href="https://doi.org/10.1016/j.ress.2019.106665">10.1016/j.ress.2019.106665</a>.
  short: A.K. Goharshady, F. Mohammadi, Reliability Engineering and System Safety
    193 (2020).
date_created: 2019-09-29T22:00:44Z
date_published: 2020-01-01T00:00:00Z
date_updated: 2026-04-27T22:31:01Z
day: '01'
department:
- _id: KrCh
doi: 10.1016/j.ress.2019.106665
external_id:
  arxiv:
  - '1712.09692'
  isi:
  - '000501641400050'
intvolume: '       193'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1712.09692
month: '01'
oa: 1
oa_version: Preprint
project:
- _id: 266EEEC0-B435-11E9-9278-68D0E5697425
  name: Quantitative Game-theoretic Analysis of Blockchain Applications and Smart
    Contracts
publication: Reliability Engineering and System Safety
publication_identifier:
  issn:
  - 0951-8320
publication_status: published
publisher: Elsevier
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: An efficient algorithm for computing network reliability in small treewidth
type: journal_article
user_id: ba8df636-2132-11f1-aed0-ed93e2281fdd
volume: 193
year: '2020'
...
---
_id: '6780'
abstract:
- lang: eng
  text: "In this work, we consider the almost-sure termination problem for probabilistic
    programs that asks whether a\r\ngiven probabilistic program terminates with probability
    1. Scalable approaches for program analysis often\r\nrely on modularity as their
    theoretical basis. In non-probabilistic programs, the classical variant rule (V-rule)\r\nof
    Floyd-Hoare logic provides the foundation for modular analysis. Extension of this
    rule to almost-sure\r\ntermination of probabilistic programs is quite tricky,
    and a probabilistic variant was proposed in [16]. While the\r\nproposed probabilistic
    variant cautiously addresses the key issue of integrability, we show that the
    proposed\r\nmodular rule is still not sound for almost-sure termination of probabilistic
    programs.\r\nBesides establishing unsoundness of the previous rule, our contributions
    are as follows: First, we present a\r\nsound modular rule for almost-sure termination
    of probabilistic programs. Our approach is based on a novel\r\nnotion of descent
    supermartingales. Second, for algorithmic approaches, we consider descent supermartingales\r\nthat
    are linear and show that they can be synthesized in polynomial time. Finally,
    we present experimental\r\nresults on a variety of benchmarks and several natural
    examples that model various types of nested while\r\nloops in probabilistic programs
    and demonstrate that our approach is able to efficiently prove their almost-sure\r\ntermination
    property"
article_number: '129'
article_processing_charge: No
arxiv: 1
author:
- first_name: Mingzhang
  full_name: Huang, Mingzhang
  last_name: Huang
- first_name: Hongfei
  full_name: Fu, Hongfei
  last_name: Fu
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
citation:
  ama: 'Huang M, Fu H, Chatterjee K, Goharshady AK. Modular verification for almost-sure
    termination of probabilistic programs. In: <i>Proceedings of the 34th ACM International
    Conference on Object-Oriented Programming, Systems, Languages, and Applications
    </i>. Vol 3. ACM; 2019. doi:<a href="https://doi.org/10.1145/3360555">10.1145/3360555</a>'
  apa: 'Huang, M., Fu, H., Chatterjee, K., &#38; Goharshady, A. K. (2019). Modular
    verification for almost-sure termination of probabilistic programs. In <i>Proceedings
    of the 34th ACM International Conference on Object-Oriented Programming, Systems,
    Languages, and Applications </i> (Vol. 3). Athens, Greece: ACM. <a href="https://doi.org/10.1145/3360555">https://doi.org/10.1145/3360555</a>'
  chicago: Huang, Mingzhang, Hongfei Fu, Krishnendu Chatterjee, and Amir Kafshdar
    Goharshady. “Modular Verification for Almost-Sure Termination of Probabilistic
    Programs.” In <i>Proceedings of the 34th ACM International Conference on Object-Oriented
    Programming, Systems, Languages, and Applications </i>, Vol. 3. ACM, 2019. <a
    href="https://doi.org/10.1145/3360555">https://doi.org/10.1145/3360555</a>.
  ieee: M. Huang, H. Fu, K. Chatterjee, and A. K. Goharshady, “Modular verification
    for almost-sure termination of probabilistic programs,” in <i>Proceedings of the
    34th ACM International Conference on Object-Oriented Programming, Systems, Languages,
    and Applications </i>, Athens, Greece, 2019, vol. 3.
  ista: 'Huang M, Fu H, Chatterjee K, Goharshady AK. 2019. Modular verification for
    almost-sure termination of probabilistic programs. Proceedings of the 34th ACM
    International Conference on Object-Oriented Programming, Systems, Languages, and
    Applications . OOPSLA: Object-oriented Programming, Systems, Languages and Applications
    vol. 3, 129.'
  mla: Huang, Mingzhang, et al. “Modular Verification for Almost-Sure Termination
    of Probabilistic Programs.” <i>Proceedings of the 34th ACM International Conference
    on Object-Oriented Programming, Systems, Languages, and Applications </i>, vol.
    3, 129, ACM, 2019, doi:<a href="https://doi.org/10.1145/3360555">10.1145/3360555</a>.
  short: M. Huang, H. Fu, K. Chatterjee, A.K. Goharshady, in:, Proceedings of the
    34th ACM International Conference on Object-Oriented Programming, Systems, Languages,
    and Applications , ACM, 2019.
conference:
  end_date: 2019-10-25
  location: Athens, Greece
  name: 'OOPSLA: Object-oriented Programming, Systems, Languages and Applications'
  start_date: 2019-10-23
date_created: 2019-08-09T09:54:20Z
date_published: 2019-10-01T00:00:00Z
date_updated: 2026-04-27T22:30:59Z
day: '01'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1145/3360555
ec_funded: 1
external_id:
  arxiv:
  - '1901.06087'
file:
- access_level: open_access
  checksum: 3482d8ace6fb4991eb7810e3b70f1b9f
  content_type: application/pdf
  creator: akafshda
  date_created: 2019-08-12T15:40:57Z
  date_updated: 2020-07-14T12:47:40Z
  file_id: '6807'
  file_name: oopsla-2019.pdf
  file_size: 1024643
  relation: main_file
- access_level: open_access
  checksum: 4e5a6fb2b59a75222a4e8335a5a60eac
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-12T15:15:14Z
  date_updated: 2020-07-14T12:47:40Z
  file_id: '7821'
  file_name: 2019_ACM_Huang.pdf
  file_size: 538579
  relation: main_file
file_date_updated: 2020-07-14T12:47:40Z
has_accepted_license: '1'
intvolume: '         3'
language:
- iso: eng
month: '10'
oa: 1
oa_version: Published Version
project:
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
- _id: 266EEEC0-B435-11E9-9278-68D0E5697425
  name: Quantitative Game-theoretic Analysis of Blockchain Applications and Smart
    Contracts
publication: 'Proceedings of the 34th ACM International Conference on Object-Oriented
  Programming, Systems, Languages, and Applications '
publication_status: published
publisher: ACM
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Modular verification for almost-sure termination of probabilistic programs
tmp:
  image: /images/cc_by_nc.png
  legal_code_url: https://creativecommons.org/licenses/by-nc/4.0/legalcode
  name: Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
  short: CC BY-NC (4.0)
type: conference
user_id: 8b945eb4-e2f2-11eb-945a-df72226e66a9
volume: 3
year: '2019'
...
---
_id: '6490'
abstract:
- lang: eng
  text: "Smart contracts are programs that are stored and executed on the Blockchain
    and can receive, manage and transfer money (cryptocurrency units). Two important
    problems regarding smart contracts are formal analysis and compiler optimization.
    Formal analysis is extremely important, because smart contracts hold funds worth
    billions of dollars and their code is immutable after deployment. Hence, an undetected
    bug can cause significant financial losses. Compiler optimization is also crucial,
    because every action of a smart contract has to be executed by every node in the
    Blockchain network. Therefore, optimizations in compiling smart contracts can
    lead to significant savings in computation, time and energy.\r\n\r\nTwo classical
    approaches in program analysis and compiler optimization are intraprocedural and
    interprocedural analysis. In intraprocedural analysis, each function is analyzed
    separately, while interprocedural analysis considers the entire program. In both
    cases, the analyses are usually reduced to graph problems over the control flow
    graph (CFG) of the program. These graph problems are often computationally expensive.
    Hence, there has been ample research on exploiting structural properties of CFGs
    for efficient algorithms. One such well-studied property is the treewidth, which
    is a measure of tree-likeness of graphs. It is known that intraprocedural CFGs
    of structured programs have treewidth at most 6, whereas the interprocedural treewidth
    cannot be bounded. This result has been used as a basis for many efficient intraprocedural
    analyses.\r\n\r\nIn this paper, we explore the idea of exploiting the treewidth
    of smart contracts for formal analysis and compiler optimization. First, similar
    to classical programs, we show that the intraprocedural treewidth of structured
    Solidity and Vyper smart contracts is at most 9. Second, for global analysis,
    we prove that the interprocedural treewidth of structured smart contracts is bounded
    by 10 and, in sharp contrast with classical programs, treewidth-based algorithms
    can be easily applied for interprocedural analysis. Finally, we supplement our
    theoretical results with experiments using a tool we implemented for computing
    treewidth of smart contracts and show that the treewidth is much lower in practice.
    We use 36,764 real-world Ethereum smart contracts as benchmarks and find that
    they have an average treewidth of at most 3.35 for the intraprocedural case and
    3.65 for the interprocedural case.\r\n"
article_processing_charge: No
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Ehsan Kafshdar
  full_name: Goharshady, Ehsan Kafshdar
  last_name: Goharshady
citation:
  ama: 'Chatterjee K, Goharshady AK, Goharshady EK. The treewidth of smart contracts.
    In: <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>. Vol Part
    F147772. ACM; 2019:400-408. doi:<a href="https://doi.org/10.1145/3297280.3297322">10.1145/3297280.3297322</a>'
  apa: 'Chatterjee, K., Goharshady, A. K., &#38; Goharshady, E. K. (2019). The treewidth
    of smart contracts. In <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>
    (Vol. Part F147772, pp. 400–408). Limassol, Cyprus: ACM. <a href="https://doi.org/10.1145/3297280.3297322">https://doi.org/10.1145/3297280.3297322</a>'
  chicago: Chatterjee, Krishnendu, Amir Kafshdar Goharshady, and Ehsan Kafshdar Goharshady.
    “The Treewidth of Smart Contracts.” In <i>Proceedings of the 34th ACM Symposium
    on Applied Computing</i>, Part F147772:400–408. ACM, 2019. <a href="https://doi.org/10.1145/3297280.3297322">https://doi.org/10.1145/3297280.3297322</a>.
  ieee: K. Chatterjee, A. K. Goharshady, and E. K. Goharshady, “The treewidth of smart
    contracts,” in <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>,
    Limassol, Cyprus, 2019, vol. Part F147772, pp. 400–408.
  ista: 'Chatterjee K, Goharshady AK, Goharshady EK. 2019. The treewidth of smart
    contracts. Proceedings of the 34th ACM Symposium on Applied Computing. SAC: Symposium
    on Applied Computing vol. Part F147772, 400–408.'
  mla: Chatterjee, Krishnendu, et al. “The Treewidth of Smart Contracts.” <i>Proceedings
    of the 34th ACM Symposium on Applied Computing</i>, vol. Part F147772, ACM, 2019,
    pp. 400–08, doi:<a href="https://doi.org/10.1145/3297280.3297322">10.1145/3297280.3297322</a>.
  short: K. Chatterjee, A.K. Goharshady, E.K. Goharshady, in:, Proceedings of the
    34th ACM Symposium on Applied Computing, ACM, 2019, pp. 400–408.
conference:
  end_date: 2019-04-12
  location: Limassol, Cyprus
  name: 'SAC: Symposium on Applied Computing'
  start_date: 2019-04-08
corr_author: '1'
date_created: 2019-05-26T21:59:15Z
date_published: 2019-04-01T00:00:00Z
date_updated: 2026-04-27T22:30:59Z
day: '01'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1145/3297280.3297322
external_id:
  isi:
  - '000474685800052'
file:
- access_level: open_access
  checksum: dddc20f6d9881f23b8755eb720ec9d6f
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-14T09:50:11Z
  date_updated: 2020-07-14T12:47:32Z
  file_id: '7827'
  file_name: 2019_ACM_Chatterjee.pdf
  file_size: 6937138
  relation: main_file
file_date_updated: 2020-07-14T12:47:32Z
has_accepted_license: '1'
isi: 1
language:
- iso: eng
month: '04'
oa: 1
oa_version: Submitted Version
page: 400-408
publication: Proceedings of the 34th ACM Symposium on Applied Computing
publication_identifier:
  isbn:
  - '9781450359337'
publication_status: published
publisher: ACM
pubrep_id: '1070'
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: The treewidth of smart contracts
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: Part F147772
year: '2019'
...
---
_id: '6378'
abstract:
- lang: eng
  text: 'In today''s cryptocurrencies, Hashcash proof of work is the most commonly-adopted
    approach to mining. In Hashcash, when a miner decides to add a block to the chain,
    she has to solve the difficult computational puzzle of inverting a hash function.
    While Hashcash has been successfully adopted in both Bitcoin and Ethereum, it
    has attracted significant and harsh criticism due to its massive waste of electricity,
    its carbon footprint and environmental effects, and the inherent lack of usefulness
    in inverting a hash function. Various other mining protocols have been suggested,
    including proof of stake, in which a miner''s chance of adding the next block
    is proportional to her current balance. However, such protocols lead to a higher
    entry cost for new miners who might not still have any stake in the cryptocurrency,
    and can in the worst case lead to an oligopoly, where the rich have complete control
    over mining. In this paper, we propose Hybrid Mining: a new mining protocol that
    combines solving real-world useful problems with Hashcash. Our protocol allows
    new miners to join the network by taking part in Hashcash mining without having
    to own an initial stake. It also allows nodes of the network to submit hard computational
    problems whose solutions are of interest in the real world, e.g.~protein folding
    problems. Then, miners can choose to compete in solving these problems, in lieu
    of Hashcash, for adding a new block. Hence, Hybrid Mining incentivizes miners
    to solve useful problems, such as hard computational problems arising in biology,
    in a distributed manner. It also gives researchers in other areas an easy-to-use
    tool to outsource their hard computations to the blockchain network, which has
    enormous computational power, by paying a reward to the miner who solves the problem
    for them. Moreover, our protocol provides strong security guarantees and is at
    least as resilient to double spending as Bitcoin.'
article_processing_charge: No
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Arash
  full_name: Pourdamghani, Arash
  last_name: Pourdamghani
citation:
  ama: 'Chatterjee K, Goharshady AK, Pourdamghani A. Hybrid Mining: Exploiting blockchain’s
    computational power for distributed problem solving. In: <i>Proceedings of the
    34th ACM Symposium on Applied Computing</i>. Vol Part F147772. ACM; 2019:374-381.
    doi:<a href="https://doi.org/10.1145/3297280.3297319">10.1145/3297280.3297319</a>'
  apa: 'Chatterjee, K., Goharshady, A. K., &#38; Pourdamghani, A. (2019). Hybrid Mining:
    Exploiting blockchain’s computational power for distributed problem solving. In
    <i>Proceedings of the 34th ACM Symposium on Applied Computing</i> (Vol. Part F147772,
    pp. 374–381). Limassol, Cyprus: ACM. <a href="https://doi.org/10.1145/3297280.3297319">https://doi.org/10.1145/3297280.3297319</a>'
  chicago: 'Chatterjee, Krishnendu, Amir Kafshdar Goharshady, and Arash Pourdamghani.
    “Hybrid Mining: Exploiting Blockchain’s Computational Power for Distributed Problem
    Solving.” In <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>,
    Part F147772:374–81. ACM, 2019. <a href="https://doi.org/10.1145/3297280.3297319">https://doi.org/10.1145/3297280.3297319</a>.'
  ieee: 'K. Chatterjee, A. K. Goharshady, and A. Pourdamghani, “Hybrid Mining: Exploiting
    blockchain’s computational power for distributed problem solving,” in <i>Proceedings
    of the 34th ACM Symposium on Applied Computing</i>, Limassol, Cyprus, 2019, vol.
    Part F147772, pp. 374–381.'
  ista: 'Chatterjee K, Goharshady AK, Pourdamghani A. 2019. Hybrid Mining: Exploiting
    blockchain’s computational power for distributed problem solving. Proceedings
    of the 34th ACM Symposium on Applied Computing. ACM Symposium on Applied Computing
    vol. Part F147772, 374–381.'
  mla: 'Chatterjee, Krishnendu, et al. “Hybrid Mining: Exploiting Blockchain’s Computational
    Power for Distributed Problem Solving.” <i>Proceedings of the 34th ACM Symposium
    on Applied Computing</i>, vol. Part F147772, ACM, 2019, pp. 374–81, doi:<a href="https://doi.org/10.1145/3297280.3297319">10.1145/3297280.3297319</a>.'
  short: K. Chatterjee, A.K. Goharshady, A. Pourdamghani, in:, Proceedings of the
    34th ACM Symposium on Applied Computing, ACM, 2019, pp. 374–381.
conference:
  end_date: 2019-04-12
  location: Limassol, Cyprus
  name: ACM Symposium on Applied Computing
  start_date: 2019-04-08
date_created: 2019-05-06T12:11:36Z
date_published: 2019-04-01T00:00:00Z
date_updated: 2026-04-27T22:31:00Z
day: '01'
ddc:
- '004'
department:
- _id: KrCh
doi: 10.1145/3297280.3297319
ec_funded: 1
external_id:
  isi:
  - '000474685800049'
file:
- access_level: open_access
  checksum: fbfbcd5a0c7a743862bfc3045539a614
  content_type: application/pdf
  creator: dernst
  date_created: 2019-05-06T12:09:27Z
  date_updated: 2020-07-14T12:47:29Z
  file_id: '6379'
  file_name: 2019_ACM_Chatterjee.pdf
  file_size: 1023934
  relation: main_file
file_date_updated: 2020-07-14T12:47:29Z
has_accepted_license: '1'
isi: 1
language:
- iso: eng
month: '04'
oa: 1
oa_version: Submitted Version
page: 374-381
project:
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication: Proceedings of the 34th ACM Symposium on Applied Computing
publication_identifier:
  isbn:
  - '9781450359337'
publication_status: published
publisher: ACM
pubrep_id: '1069'
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: 'Hybrid Mining: Exploiting blockchain’s computational power for distributed
  problem solving'
type: conference
user_id: 4359f0d1-fa6c-11eb-b949-802e58b17ae8
volume: Part F147772
year: '2019'
...
---
_id: '6175'
abstract:
- lang: eng
  text: "We consider the problem of expected cost analysis over nondeterministic probabilistic
    programs,\r\nwhich aims at automated methods for analyzing the resource-usage
    of such programs.\r\nPrevious approaches for this problem could only handle nonnegative
    bounded costs.\r\nHowever, in many scenarios, such as queuing networks or analysis
    of cryptocurrency protocols,\r\nboth positive and negative costs are necessary
    and the costs are unbounded as well.\r\n\r\nIn this work, we present a sound and
    efficient approach to obtain polynomial bounds on the\r\nexpected accumulated
    cost of nondeterministic probabilistic programs.\r\nOur approach can handle (a)
    general positive and negative costs with bounded updates in\r\nvariables; and
    (b) nonnegative costs with general updates to variables.\r\nWe show that several
    natural examples which could not be\r\nhandled by previous approaches are captured
    in our framework.\r\n\r\nMoreover, our approach leads to an efficient polynomial-time
    algorithm, while no\r\nprevious approach for cost analysis of probabilistic programs
    could guarantee polynomial runtime.\r\nFinally, we show the effectiveness of our
    approach using experimental results on a variety of programs for which we efficiently
    synthesize tight resource-usage bounds."
article_processing_charge: No
arxiv: 1
author:
- first_name: Peixin
  full_name: Wang, Peixin
  last_name: Wang
- first_name: Hongfei
  full_name: Fu, Hongfei
  id: 3AAD03D6-F248-11E8-B48F-1D18A9856A87
  last_name: Fu
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Xudong
  full_name: Qin, Xudong
  last_name: Qin
- first_name: Wenjun
  full_name: Shi, Wenjun
  last_name: Shi
citation:
  ama: 'Wang P, Fu H, Goharshady AK, Chatterjee K, Qin X, Shi W. Cost analysis of
    nondeterministic probabilistic programs. In: <i>PLDI 2019: Proceedings of the
    40th ACM SIGPLAN Conference on Programming Language Design and Implementation</i>.
    Association for Computing Machinery; 2019:204-220. doi:<a href="https://doi.org/10.1145/3314221.3314581">10.1145/3314221.3314581</a>'
  apa: 'Wang, P., Fu, H., Goharshady, A. K., Chatterjee, K., Qin, X., &#38; Shi, W.
    (2019). Cost analysis of nondeterministic probabilistic programs. In <i>PLDI 2019:
    Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design
    and Implementation</i> (pp. 204–220). Phoenix, AZ, United States: Association
    for Computing Machinery. <a href="https://doi.org/10.1145/3314221.3314581">https://doi.org/10.1145/3314221.3314581</a>'
  chicago: 'Wang, Peixin, Hongfei Fu, Amir Kafshdar Goharshady, Krishnendu Chatterjee,
    Xudong Qin, and Wenjun Shi. “Cost Analysis of Nondeterministic Probabilistic Programs.”
    In <i>PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming
    Language Design and Implementation</i>, 204–20. Association for Computing Machinery,
    2019. <a href="https://doi.org/10.1145/3314221.3314581">https://doi.org/10.1145/3314221.3314581</a>.'
  ieee: 'P. Wang, H. Fu, A. K. Goharshady, K. Chatterjee, X. Qin, and W. Shi, “Cost
    analysis of nondeterministic probabilistic programs,” in <i>PLDI 2019: Proceedings
    of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation</i>,
    Phoenix, AZ, United States, 2019, pp. 204–220.'
  ista: 'Wang P, Fu H, Goharshady AK, Chatterjee K, Qin X, Shi W. 2019. Cost analysis
    of nondeterministic probabilistic programs. PLDI 2019: Proceedings of the 40th
    ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI:
    Conference on Programming Language Design and Implementation, 204–220.'
  mla: 'Wang, Peixin, et al. “Cost Analysis of Nondeterministic Probabilistic Programs.”
    <i>PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language
    Design and Implementation</i>, Association for Computing Machinery, 2019, pp.
    204–20, doi:<a href="https://doi.org/10.1145/3314221.3314581">10.1145/3314221.3314581</a>.'
  short: 'P. Wang, H. Fu, A.K. Goharshady, K. Chatterjee, X. Qin, W. Shi, in:, PLDI
    2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design
    and Implementation, Association for Computing Machinery, 2019, pp. 204–220.'
conference:
  end_date: 2019-06-26
  location: Phoenix, AZ, United States
  name: 'PLDI: Conference on Programming Language Design and Implementation'
  start_date: 2019-06-22
date_created: 2019-03-25T10:13:25Z
date_published: 2019-06-08T00:00:00Z
date_updated: 2026-04-27T22:31:00Z
day: '08'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1145/3314221.3314581
ec_funded: 1
external_id:
  arxiv:
  - '1902.04659'
  isi:
  - '000523190300014'
file:
- access_level: open_access
  checksum: 703a5e9b8c8587f2a44085ffd9a4db64
  content_type: application/pdf
  creator: akafshda
  date_created: 2019-03-25T10:11:22Z
  date_updated: 2020-07-14T12:47:20Z
  file_id: '6176'
  file_name: paper.pdf
  file_size: 4051066
  relation: main_file
file_date_updated: 2020-07-14T12:47:20Z
has_accepted_license: '1'
isi: 1
keyword:
- Program Cost Analysis
- Program Termination
- Probabilistic Programs
- Martingales
language:
- iso: eng
month: '06'
oa: 1
oa_version: Submitted Version
page: 204-220
project:
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 266EEEC0-B435-11E9-9278-68D0E5697425
  name: Quantitative Game-theoretic Analysis of Blockchain Applications and Smart
    Contracts
publication: 'PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming
  Language Design and Implementation'
publication_status: published
publisher: Association for Computing Machinery
quality_controlled: '1'
related_material:
  record:
  - id: '5457'
    relation: earlier_version
    status: public
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Cost analysis of nondeterministic probabilistic programs
type: conference
user_id: 4359f0d1-fa6c-11eb-b949-802e58b17ae8
year: '2019'
...
---
_id: '7158'
abstract:
- lang: eng
  text: "Interprocedural analysis is at the heart of numerous applications in programming
    languages, such as alias analysis, constant propagation, and so on. Recursive
    state machines (RSMs) are standard models for interprocedural analysis. We consider
    a general framework with RSMs where the transitions are labeled from a semiring
    and path properties are algebraic with semiring operations. RSMs with algebraic
    path properties can model interprocedural dataflow analysis problems, the shortest
    path problem, the most probable path problem, and so on. The traditional algorithms
    for interprocedural analysis focus on path properties where the starting point
    is fixed as the entry point of a specific method. In this work, we consider possible
    multiple queries as required in many applications such as in alias analysis. The
    study of multiple queries allows us to bring in an important algorithmic distinction
    between the resource usage of the one-time preprocessing vs for each individual
    query. The second aspect we consider is that the control flow graphs for most
    programs have constant treewidth.\r\n\r\nOur main contributions are simple and
    implementable algorithms that support multiple queries for algebraic path properties
    for RSMs that have constant treewidth. Our theoretical results show that our algorithms
    have small additional one-time preprocessing but can answer subsequent queries
    significantly faster as compared to the current algorithmic solutions for interprocedural
    dataflow analysis. We have also implemented our algorithms and evaluated their
    performance for performing on-demand interprocedural dataflow analysis on various
    domains, such as for live variable analysis and reaching definitions, on a standard
    benchmark set. Our experimental results align with our theoretical statements
    and show that after a lightweight preprocessing, on-demand queries are answered
    much faster than the standard existing algorithmic approaches.\r\n"
article_number: '23'
article_processing_charge: No
article_type: original
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
- first_name: Prateesh
  full_name: Goyal, Prateesh
  last_name: Goyal
- first_name: Rasmus
  full_name: Ibsen-Jensen, Rasmus
  id: 3B699956-F248-11E8-B48F-1D18A9856A87
  last_name: Ibsen-Jensen
  orcid: 0000-0003-4783-0389
- first_name: Andreas
  full_name: Pavlogiannis, Andreas
  id: 49704004-F248-11E8-B48F-1D18A9856A87
  last_name: Pavlogiannis
  orcid: 0000-0002-8943-0722
citation:
  ama: Chatterjee K, Goharshady AK, Goyal P, Ibsen-Jensen R, Pavlogiannis A. Faster
    algorithms for dynamic algebraic queries in basic RSMs with constant treewidth.
    <i>ACM Transactions on Programming Languages and Systems</i>. 2019;41(4). doi:<a
    href="https://doi.org/10.1145/3363525">10.1145/3363525</a>
  apa: Chatterjee, K., Goharshady, A. K., Goyal, P., Ibsen-Jensen, R., &#38; Pavlogiannis,
    A. (2019). Faster algorithms for dynamic algebraic queries in basic RSMs with
    constant treewidth. <i>ACM Transactions on Programming Languages and Systems</i>.
    ACM. <a href="https://doi.org/10.1145/3363525">https://doi.org/10.1145/3363525</a>
  chicago: Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Prateesh Goyal, Rasmus
    Ibsen-Jensen, and Andreas Pavlogiannis. “Faster Algorithms for Dynamic Algebraic
    Queries in Basic RSMs with Constant Treewidth.” <i>ACM Transactions on Programming
    Languages and Systems</i>. ACM, 2019. <a href="https://doi.org/10.1145/3363525">https://doi.org/10.1145/3363525</a>.
  ieee: K. Chatterjee, A. K. Goharshady, P. Goyal, R. Ibsen-Jensen, and A. Pavlogiannis,
    “Faster algorithms for dynamic algebraic queries in basic RSMs with constant treewidth,”
    <i>ACM Transactions on Programming Languages and Systems</i>, vol. 41, no. 4.
    ACM, 2019.
  ista: Chatterjee K, Goharshady AK, Goyal P, Ibsen-Jensen R, Pavlogiannis A. 2019.
    Faster algorithms for dynamic algebraic queries in basic RSMs with constant treewidth.
    ACM Transactions on Programming Languages and Systems. 41(4), 23.
  mla: Chatterjee, Krishnendu, et al. “Faster Algorithms for Dynamic Algebraic Queries
    in Basic RSMs with Constant Treewidth.” <i>ACM Transactions on Programming Languages
    and Systems</i>, vol. 41, no. 4, 23, ACM, 2019, doi:<a href="https://doi.org/10.1145/3363525">10.1145/3363525</a>.
  short: K. Chatterjee, A.K. Goharshady, P. Goyal, R. Ibsen-Jensen, A. Pavlogiannis,
    ACM Transactions on Programming Languages and Systems 41 (2019).
date_created: 2019-12-09T08:33:33Z
date_published: 2019-11-01T00:00:00Z
date_updated: 2026-04-27T22:31:00Z
day: '01'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1145/3363525
ec_funded: 1
external_id:
  isi:
  - '000564108400004'
file:
- access_level: open_access
  checksum: 291cc86a07bd010d4815e177dac57b70
  content_type: application/pdf
  creator: dernst
  date_created: 2020-10-08T12:58:10Z
  date_updated: 2020-10-08T12:58:10Z
  file_id: '8632'
  file_name: 2019_ACMTransactions_Chatterjee.pdf
  file_size: 667357
  relation: main_file
  success: 1
file_date_updated: 2020-10-08T12:58:10Z
has_accepted_license: '1'
intvolume: '        41'
isi: 1
issue: '4'
language:
- iso: eng
month: '11'
oa: 1
oa_version: Submitted Version
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
publication: ACM Transactions on Programming Languages and Systems
publication_identifier:
  issn:
  - 0164-0925
publication_status: published
publisher: ACM
quality_controlled: '1'
related_material:
  record:
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Faster algorithms for dynamic algebraic queries in basic RSMs with constant
  treewidth
type: journal_article
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 41
year: '2019'
...
---
_id: '7014'
abstract:
- lang: eng
  text: "We study the problem of developing efficient approaches for proving\r\nworst-case
    bounds of non-deterministic recursive programs. Ranking functions\r\nare sound
    and complete for proving termination and worst-case bounds of\r\nnonrecursive
    programs. First, we apply ranking functions to recursion,\r\nresulting in measure
    functions. We show that measure functions provide a sound\r\nand complete approach
    to prove worst-case bounds of non-deterministic recursive\r\nprograms. Our second
    contribution is the synthesis of measure functions in\r\nnonpolynomial forms.
    We show that non-polynomial measure functions with\r\nlogarithm and exponentiation
    can be synthesized through abstraction of\r\nlogarithmic or exponentiation terms,
    Farkas' Lemma, and Handelman's Theorem\r\nusing linear programming. While previous
    methods obtain worst-case polynomial\r\nbounds, our approach can synthesize bounds
    of the form $\\mathcal{O}(n\\log n)$\r\nas well as $\\mathcal{O}(n^r)$ where $r$
    is not an integer. We present\r\nexperimental results to demonstrate that our
    approach can obtain efficiently\r\nworst-case bounds of classical recursive algorithms
    such as (i) Merge-Sort, the\r\ndivide-and-conquer algorithm for the Closest-Pair
    problem, where we obtain\r\n$\\mathcal{O}(n \\log n)$ worst-case bound, and (ii)
    Karatsuba's algorithm for\r\npolynomial multiplication and Strassen's algorithm
    for matrix multiplication,\r\nwhere we obtain $\\mathcal{O}(n^r)$ bound such that
    $r$ is not an integer and\r\nclose to the best-known bounds for the respective
    algorithms."
article_number: '20'
article_processing_charge: No
article_type: original
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Hongfei
  full_name: Fu, Hongfei
  last_name: Fu
- first_name: Amir Kafshdar
  full_name: Goharshady, Amir Kafshdar
  id: 391365CE-F248-11E8-B48F-1D18A9856A87
  last_name: Goharshady
  orcid: 0000-0003-1702-6584
citation:
  ama: Chatterjee K, Fu H, Goharshady AK. Non-polynomial worst-case analysis of recursive
    programs. <i>ACM Transactions on Programming Languages and Systems</i>. 2019;41(4).
    doi:<a href="https://doi.org/10.1145/3339984">10.1145/3339984</a>
  apa: Chatterjee, K., Fu, H., &#38; Goharshady, A. K. (2019). Non-polynomial worst-case
    analysis of recursive programs. <i>ACM Transactions on Programming Languages and
    Systems</i>. ACM. <a href="https://doi.org/10.1145/3339984">https://doi.org/10.1145/3339984</a>
  chicago: Chatterjee, Krishnendu, Hongfei Fu, and Amir Kafshdar Goharshady. “Non-Polynomial
    Worst-Case Analysis of Recursive Programs.” <i>ACM Transactions on Programming
    Languages and Systems</i>. ACM, 2019. <a href="https://doi.org/10.1145/3339984">https://doi.org/10.1145/3339984</a>.
  ieee: K. Chatterjee, H. Fu, and A. K. Goharshady, “Non-polynomial worst-case analysis
    of recursive programs,” <i>ACM Transactions on Programming Languages and Systems</i>,
    vol. 41, no. 4. ACM, 2019.
  ista: Chatterjee K, Fu H, Goharshady AK. 2019. Non-polynomial worst-case analysis
    of recursive programs. ACM Transactions on Programming Languages and Systems.
    41(4), 20.
  mla: Chatterjee, Krishnendu, et al. “Non-Polynomial Worst-Case Analysis of Recursive
    Programs.” <i>ACM Transactions on Programming Languages and Systems</i>, vol.
    41, no. 4, 20, ACM, 2019, doi:<a href="https://doi.org/10.1145/3339984">10.1145/3339984</a>.
  short: K. Chatterjee, H. Fu, A.K. Goharshady, ACM Transactions on Programming Languages
    and Systems 41 (2019).
date_created: 2019-11-13T08:33:43Z
date_published: 2019-10-01T00:00:00Z
date_updated: 2026-04-27T22:31:00Z
day: '01'
department:
- _id: KrCh
doi: 10.1145/3339984
ec_funded: 1
external_id:
  arxiv:
  - '1705.00317'
  isi:
  - '000564108400001'
intvolume: '        41'
isi: 1
issue: '4'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1705.00317
month: '10'
oa: 1
oa_version: Preprint
project:
- _id: 25892FC0-B435-11E9-9278-68D0E5697425
  grant_number: ICT15-003
  name: Efficient Algorithms for Computer Aided Verification
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 267066CE-B435-11E9-9278-68D0E5697425
  name: Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies
- _id: 266EEEC0-B435-11E9-9278-68D0E5697425
  name: Quantitative Game-theoretic Analysis of Blockchain Applications and Smart
    Contracts
publication: ACM Transactions on Programming Languages and Systems
publication_status: published
publisher: ACM
quality_controlled: '1'
related_material:
  record:
  - id: '639'
    relation: earlier_version
    status: public
  - id: '8934'
    relation: dissertation_contains
    status: public
scopus_import: '1'
status: public
title: Non-polynomial worst-case analysis of recursive programs
type: journal_article
user_id: 4359f0d1-fa6c-11eb-b949-802e58b17ae8
volume: 41
year: '2019'
...
