[{"citation":{"apa":"Singh, V. (2009). <i>Formalizing and Verifying Transactional Memories</i>. <i>Formalizing and Verifying Transactional Memories</i>. EPFL Lausanne.","chicago":"Singh, Vasu. “Formalizing and Verifying Transactional Memories.” <i>Formalizing and Verifying Transactional Memories</i>. EPFL Lausanne, 2009.","ama":"Singh V. Formalizing and Verifying Transactional Memories. <i>Formalizing and Verifying Transactional Memories</i>. 2009.","short":"V. Singh, Formalizing and Verifying Transactional Memories, EPFL Lausanne, 2009.","ista":"Singh V. 2009. Formalizing and Verifying Transactional Memories. EPFL Lausanne.","ieee":"V. Singh, “Formalizing and Verifying Transactional Memories,” EPFL Lausanne, 2009.","mla":"Singh, Vasu. “Formalizing and Verifying Transactional Memories.” <i>Formalizing and Verifying Transactional Memories</i>, EPFL Lausanne, 2009."},"day":"01","publisher":"EPFL Lausanne","extern":1,"_id":"4363","title":"Formalizing and Verifying Transactional Memories","publist_id":"1095","month":"01","publication":"Formalizing and Verifying Transactional Memories","status":"public","type":"dissertation","quality_controlled":0,"date_created":"2018-12-11T12:08:28Z","publication_status":"published","author":[{"full_name":"Vasu Singh","last_name":"Singh","first_name":"Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87"}],"year":"2009","date_updated":"2021-01-12T07:56:25Z","date_published":"2009-01-01T00:00:00Z"},{"status":"public","publication_status":"published","abstract":[{"lang":"eng","text":"We present an abstraction refinement technique for the verification of universally quantified array assertions such as “all elements in the array are sorted”. Our technique can be seamlessly combined with existing software model checking algorithms. We implemented our technique in the ACSAR software model checker and successfully verified quantified array assertions for both text book examples and real-life examples taken from the Linux operating system kernel."}],"intvolume":"      5673","date_created":"2018-12-11T12:08:29Z","doi":"10.1007/978-3-642-03237-0_3","type":"conference","oa_version":"None","author":[{"first_name":"Mohamed","full_name":"Seghir, Mohamed","last_name":"Seghir"},{"last_name":"Podelski","full_name":"Podelski, Andreas","first_name":"Andreas"},{"id":"447BFB88-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas","last_name":"Wies","full_name":"Wies, Thomas"}],"article_processing_charge":"No","date_published":"2009-01-01T00:00:00Z","date_updated":"2025-07-02T06:45:01Z","year":"2009","alternative_title":["LNCS"],"citation":{"apa":"Seghir, M., Podelski, A., &#38; Wies, T. (2009). Abstraction refinement for quantified array assertions. In <i>16th International Symposium on Static Analysis</i> (Vol. 5673, pp. 3–18). Los Angeles, CA, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-642-03237-0_3\">https://doi.org/10.1007/978-3-642-03237-0_3</a>","chicago":"Seghir, Mohamed, Andreas Podelski, and Thomas Wies. “Abstraction Refinement for Quantified Array Assertions.” In <i>16th International Symposium on Static Analysis</i>, 5673:3–18. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-03237-0_3\">https://doi.org/10.1007/978-3-642-03237-0_3</a>.","ama":"Seghir M, Podelski A, Wies T. Abstraction refinement for quantified array assertions. In: <i>16th International Symposium on Static Analysis</i>. Vol 5673. Springer; 2009:3-18. doi:<a href=\"https://doi.org/10.1007/978-3-642-03237-0_3\">10.1007/978-3-642-03237-0_3</a>","short":"M. Seghir, A. Podelski, T. Wies, in:, 16th International Symposium on Static Analysis, Springer, 2009, pp. 3–18.","ieee":"M. Seghir, A. Podelski, and T. Wies, “Abstraction refinement for quantified array assertions,” in <i>16th International Symposium on Static Analysis</i>, Los Angeles, CA, United States, 2009, vol. 5673, pp. 3–18.","ista":"Seghir M, Podelski A, Wies T. 2009. Abstraction refinement for quantified array assertions. 16th International Symposium on Static Analysis. SAS: Static Analysis Symposium, LNCS, vol. 5673, 3–18.","mla":"Seghir, Mohamed, et al. “Abstraction Refinement for Quantified Array Assertions.” <i>16th International Symposium on Static Analysis</i>, vol. 5673, Springer, 2009, pp. 3–18, doi:<a href=\"https://doi.org/10.1007/978-3-642-03237-0_3\">10.1007/978-3-642-03237-0_3</a>."},"language":[{"iso":"eng"}],"extern":"1","_id":"4365","publisher":"Springer","day":"01","month":"01","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","conference":{"end_date":"2009-08-11","name":"SAS: Static Analysis Symposium","location":"Los Angeles, CA, United States","start_date":"2009-08-09"},"publist_id":"1094","volume":5673,"title":"Abstraction refinement for quantified array assertions","publication":"16th International Symposium on Static Analysis","page":"3 - 18"},{"extern":"1","_id":"4375","day":"01","publisher":"Springer","citation":{"apa":"Lahiri, S., Qadeer, S., Galeotti, J., Voung, J., &#38; Wies, T. (2009). Intra-module inference. In <i>21st International Conference on Computer Aided Verification</i> (Vol. 5643, pp. 493–508). Grenoble, France: Springer. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_37\">https://doi.org/10.1007/978-3-642-02658-4_37</a>","chicago":"Lahiri, Shuvendu, Shaz Qadeer, Juan Galeotti, Jan Voung, and Thomas Wies. “Intra-Module Inference.” In <i>21st International Conference on Computer Aided Verification</i>, 5643:493–508. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_37\">https://doi.org/10.1007/978-3-642-02658-4_37</a>.","ama":"Lahiri S, Qadeer S, Galeotti J, Voung J, Wies T. Intra-module inference. In: <i>21st International Conference on Computer Aided Verification</i>. Vol 5643. Springer; 2009:493-508. doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_37\">10.1007/978-3-642-02658-4_37</a>","ieee":"S. Lahiri, S. Qadeer, J. Galeotti, J. Voung, and T. Wies, “Intra-module inference,” in <i>21st International Conference on Computer Aided Verification</i>, Grenoble, France, 2009, vol. 5643, pp. 493–508.","short":"S. Lahiri, S. Qadeer, J. Galeotti, J. Voung, T. Wies, in:, 21st International Conference on Computer Aided Verification, Springer, 2009, pp. 493–508.","ista":"Lahiri S, Qadeer S, Galeotti J, Voung J, Wies T. 2009. Intra-module inference. 21st International Conference on Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 5643, 493–508.","mla":"Lahiri, Shuvendu, et al. “Intra-Module Inference.” <i>21st International Conference on Computer Aided Verification</i>, vol. 5643, Springer, 2009, pp. 493–508, doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_37\">10.1007/978-3-642-02658-4_37</a>."},"language":[{"iso":"eng"}],"page":"493 - 508","publication":"21st International Conference on Computer Aided Verification","publication_identifier":{"eisbn":["978-3-642-02658-4"]},"publist_id":"1082","conference":{"location":"Grenoble, France","start_date":"2009-06-26","name":"CAV: Computer Aided Verification","end_date":"2009-07-02"},"volume":5643,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"01","title":"Intra-module inference","doi":"10.1007/978-3-642-02658-4_37","date_created":"2018-12-11T12:08:32Z","publication_status":"published","intvolume":"      5643","oa_version":"None","type":"conference","status":"public","date_updated":"2025-07-02T06:41:41Z","date_published":"2009-01-01T00:00:00Z","alternative_title":["LNCS"],"year":"2009","article_processing_charge":"No","author":[{"first_name":"Shuvendu","last_name":"Lahiri","full_name":"Lahiri, Shuvendu"},{"first_name":"Shaz","last_name":"Qadeer","full_name":"Qadeer, Shaz"},{"first_name":"Juan","last_name":"Galeotti","full_name":"Galeotti, Juan"},{"first_name":"Jan","full_name":"Voung, Jan","last_name":"Voung"},{"full_name":"Wies, Thomas","last_name":"Wies","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas"}]},{"author":[{"first_name":"Roberto","full_name":"Lublinerman, Roberto","last_name":"Lublinerman"},{"first_name":"Swarat","last_name":"Chaudhuri","full_name":"Chaudhuri, Swarat"},{"first_name":"Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","full_name":"Cerny, Pavol","last_name":"Cerny"}],"article_processing_charge":"No","year":"2009","issue":"10","date_published":"2009-10-25T00:00:00Z","date_updated":"2025-07-02T06:17:51Z","status":"public","quality_controlled":"1","type":"journal_article","oa_version":"None","intvolume":"        44","date_created":"2018-12-11T12:08:32Z","abstract":[{"text":"We present Chorus, a high-level parallel programming model suitable for irregular, heap-manipulating applications like mesh refinement and epidemic simulations, and JChorus, an implementation of the model on top of Java. One goal of Chorus is to express the dynamic and instance-dependent patterns of memory access that are common in typical irregular applications. Its other focus is locality of effects: the property that in many of the same applications, typical imperative commands only affect small, local regions in the shared heap.\r\nChorus addresses dynamism and locality through the unifying abstraction of an object assembly: a local region in a shared data structure equipped with a short-lived, speculative thread of control. The thread of control in an assembly can only access objects within the assembly. While objects can migrate from assembly to assembly, such migration is local--i.e., objects only move from one assembly to a neighboring one--and does not lead to aliasing. Programming primitives include a merge operation, by which an assembly merges with an adjacent assembly, and a split operation, which splits an assembly into smaller ones. Our abstractions are race and deadlock-free, and inherently data-centric.\r\nWe demonstrate that Chorus and JChorus allow natural programming of several important applications exhibiting irregular data-parallelism. We also present an implementation of JChorus based on a many-to-one mapping of assemblies to lower-level threads, and report on preliminary performance numbers.","lang":"eng"}],"publication_status":"published","doi":"10.1145/1639949.164009","title":"Parallel programming with object assemblies","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"10","publist_id":"1083","volume":44,"publication":"ACM SIGPLAN Notices","page":"61 - 80","language":[{"iso":"eng"}],"citation":{"short":"R. Lublinerman, S. Chaudhuri, P. Cerny, ACM SIGPLAN Notices 44 (2009) 61–80.","ieee":"R. Lublinerman, S. Chaudhuri, and P. Cerny, “Parallel programming with object assemblies,” <i>ACM SIGPLAN Notices</i>, vol. 44, no. 10. ACM, pp. 61–80, 2009.","ista":"Lublinerman R, Chaudhuri S, Cerny P. 2009. Parallel programming with object assemblies. ACM SIGPLAN Notices. 44(10), 61–80.","mla":"Lublinerman, Roberto, et al. “Parallel Programming with Object Assemblies.” <i>ACM SIGPLAN Notices</i>, vol. 44, no. 10, ACM, 2009, pp. 61–80, doi:<a href=\"https://doi.org/10.1145/1639949.164009\">10.1145/1639949.164009</a>.","apa":"Lublinerman, R., Chaudhuri, S., &#38; Cerny, P. (2009). Parallel programming with object assemblies. <i>ACM SIGPLAN Notices</i>. ACM. <a href=\"https://doi.org/10.1145/1639949.164009\">https://doi.org/10.1145/1639949.164009</a>","chicago":"Lublinerman, Roberto, Swarat Chaudhuri, and Pavol Cerny. “Parallel Programming with Object Assemblies.” <i>ACM SIGPLAN Notices</i>. ACM, 2009. <a href=\"https://doi.org/10.1145/1639949.164009\">https://doi.org/10.1145/1639949.164009</a>.","ama":"Lublinerman R, Chaudhuri S, Cerny P. Parallel programming with object assemblies. <i>ACM SIGPLAN Notices</i>. 2009;44(10):61-80. doi:<a href=\"https://doi.org/10.1145/1639949.164009\">10.1145/1639949.164009</a>"},"publisher":"ACM","day":"25","_id":"4376","extern":"1","scopus_import":"1"},{"author":[{"last_name":"Hoenicke","full_name":"Hoenicke, Jochen","first_name":"Jochen"},{"first_name":"K Rustan","last_name":"Leino","full_name":"Leino, K Rustan"},{"first_name":"Andreas","last_name":"Podelski","full_name":"Podelski, Andreas"},{"full_name":"Schäf, Martin","last_name":"Schäf","first_name":"Martin"},{"first_name":"Thomas","id":"447BFB88-F248-11E8-B48F-1D18A9856A87","last_name":"Wies","full_name":"Wies, Thomas"}],"article_processing_charge":"No","year":"2009","alternative_title":["LNCS"],"date_published":"2009-01-01T00:00:00Z","date_updated":"2025-07-02T06:38:22Z","status":"public","quality_controlled":"1","type":"conference","oa_version":"None","intvolume":"      5850","abstract":[{"lang":"eng","text":"Programming errors found early are the cheapest. Tools applying to the early stage of code development exist but either they suffer from false positives (“noise”) or they require strong user interaction. We propose to avoid this deficiency by defining a new class of errors. A program fragment is doomed if its execution will inevitably fail, in whatever state it is started. We use a formal verification method to identify such errors fully automatically and, most significantly, without producing noise. We report on preliminary experiments with a prototype tool."}],"publication_status":"published","date_created":"2018-12-11T12:08:32Z","doi":"10.1007/978-3-642-05089-3_22","title":"It's doomed; we can prove it","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"01","volume":5850,"conference":{"name":"FM: Formal Methods","start_date":"2009-11-02","location":"Eindhoven, The Netherlands","end_date":"2009-11-06"},"publist_id":"1079","page":"338 - 353","publication":"Second World Congress on Formal Methods","language":[{"iso":"eng"}],"citation":{"ama":"Hoenicke J, Leino KR, Podelski A, Schäf M, Wies T. It’s doomed; we can prove it. In: <i>Second World Congress on Formal Methods</i>. Vol 5850. Springer; 2009:338-353. doi:<a href=\"https://doi.org/10.1007/978-3-642-05089-3_22\">10.1007/978-3-642-05089-3_22</a>","chicago":"Hoenicke, Jochen, K Rustan Leino, Andreas Podelski, Martin Schäf, and Thomas Wies. “It’s Doomed; We Can Prove It.” In <i>Second World Congress on Formal Methods</i>, 5850:338–53. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-05089-3_22\">https://doi.org/10.1007/978-3-642-05089-3_22</a>.","apa":"Hoenicke, J., Leino, K. R., Podelski, A., Schäf, M., &#38; Wies, T. (2009). It’s doomed; we can prove it. In <i>Second World Congress on Formal Methods</i> (Vol. 5850, pp. 338–353). Eindhoven, The Netherlands: Springer. <a href=\"https://doi.org/10.1007/978-3-642-05089-3_22\">https://doi.org/10.1007/978-3-642-05089-3_22</a>","mla":"Hoenicke, Jochen, et al. “It’s Doomed; We Can Prove It.” <i>Second World Congress on Formal Methods</i>, vol. 5850, Springer, 2009, pp. 338–53, doi:<a href=\"https://doi.org/10.1007/978-3-642-05089-3_22\">10.1007/978-3-642-05089-3_22</a>.","ista":"Hoenicke J, Leino KR, Podelski A, Schäf M, Wies T. 2009. It’s doomed; we can prove it. Second World Congress on Formal Methods. FM: Formal Methods, LNCS, vol. 5850, 338–353.","ieee":"J. Hoenicke, K. R. Leino, A. Podelski, M. Schäf, and T. Wies, “It’s doomed; we can prove it,” in <i>Second World Congress on Formal Methods</i>, Eindhoven, The Netherlands, 2009, vol. 5850, pp. 338–353.","short":"J. Hoenicke, K.R. Leino, A. Podelski, M. Schäf, T. Wies, in:, Second World Congress on Formal Methods, Springer, 2009, pp. 338–353."},"publisher":"Springer","day":"01","_id":"4377","extern":"1","scopus_import":"1"},{"citation":{"ieee":"R. Guerraoui, T. A. Henzinger, and V. Singh, “Software transactional memory on relaxed memory models,” presented at the CAV: Computer Aided Verification, 2009, vol. 5643, pp. 321–336.","short":"R. Guerraoui, T.A. Henzinger, V. Singh, in:, Springer, 2009, pp. 321–336.","ista":"Guerraoui R, Henzinger TA, Singh V. 2009. Software transactional memory on relaxed memory models. CAV: Computer Aided Verification, LNCS, vol. 5643, 321–336.","mla":"Guerraoui, Rachid, et al. <i>Software Transactional Memory on Relaxed Memory Models</i>. Vol. 5643, Springer, 2009, pp. 321–36, doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_26\">10.1007/978-3-642-02658-4_26</a>.","ama":"Guerraoui R, Henzinger TA, Singh V. Software transactional memory on relaxed memory models. In: Vol 5643. Springer; 2009:321-336. doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_26\">10.1007/978-3-642-02658-4_26</a>","apa":"Guerraoui, R., Henzinger, T. A., &#38; Singh, V. (2009). Software transactional memory on relaxed memory models (Vol. 5643, pp. 321–336). Presented at the CAV: Computer Aided Verification, Springer. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_26\">https://doi.org/10.1007/978-3-642-02658-4_26</a>","chicago":"Guerraoui, Rachid, Thomas A Henzinger, and Vasu Singh. “Software Transactional Memory on Relaxed Memory Models,” 5643:321–36. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_26\">https://doi.org/10.1007/978-3-642-02658-4_26</a>."},"pubrep_id":"45","extern":1,"_id":"4383","publisher":"Springer","day":"19","file_date_updated":"2020-07-14T12:46:28Z","month":"06","conference":{"name":"CAV: Computer Aided Verification"},"publist_id":"1074","volume":5643,"title":"Software transactional memory on relaxed memory models","page":"321 - 336","acknowledgement":"This research was supported by the Swiss National Science Foundation.","file":[{"relation":"main_file","checksum":"df3c3e6306afd3f630a9146f91642f0a","file_size":265763,"date_updated":"2020-07-14T12:46:28Z","file_name":"IST-2012-45-v1+1_Software_transactional_memory_on_relaxed_memory_models.pdf","content_type":"application/pdf","creator":"system","file_id":"5105","access_level":"open_access","date_created":"2018-12-12T10:14:50Z"}],"status":"public","date_created":"2018-12-11T12:08:34Z","abstract":[{"text":"Pseudo-code descriptions of STMs assume sequentially consistent program execution and atomicity of high-level STM operations like read, write, and commit. These assumptions are often violated in realistic settings, as STM implementations run on relaxed memory models, with the atomicity of operations as provided by the hardware. This paper presents the first approach to verify STMs under relaxed memory models with atomicity of 32 bit loads and stores, and read-modify-write operations. We present RML, a new high-level language for expressing concurrent algorithms with a hardware-level atomicity of instructions, and whose semantics is parametrized by various relaxed memory models. We then present our tool, FOIL, which takes as input the RML description of an STM algorithm and the description of a memory model, and automatically determines the locations of fences, which if inserted, ensure the correctness of the STM algorithm under the given memory model. We use FOIL to verify DSTM, TL2, and McRT STM under the memory models of sequential consistency, total store order, partial store order, and relaxed memory order.","lang":"eng"}],"publication_status":"published","intvolume":"      5643","doi":"10.1007/978-3-642-02658-4_26","type":"conference","quality_controlled":0,"author":[{"last_name":"Guerraoui","full_name":"Guerraoui, Rachid","first_name":"Rachid"},{"full_name":"Thomas Henzinger","last_name":"Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724"},{"first_name":"Vasu","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","full_name":"Vasu Singh","last_name":"Singh"}],"oa":1,"date_published":"2009-06-19T00:00:00Z","date_updated":"2021-01-12T07:56:34Z","year":"2009","alternative_title":["LNCS"]},{"day":"10","publisher":"ACM","scopus_import":"1","_id":"4385","extern":"1","language":[{"iso":"eng"}],"citation":{"ama":"Dragojevic A, Guerraoui R, Singh A, Singh V. Preventing versus curing: Avoiding conflicts in transactional memories. In: <i>Proceedings of the 28th ACM Symposium on Principles of Distributed Computing</i>. ACM; 2009:7-16. doi:<a href=\"https://doi.org/10.1145/1582716.1582725\">10.1145/1582716.1582725</a>","apa":"Dragojevic, A., Guerraoui, R., Singh, A., &#38; Singh, V. (2009). Preventing versus curing: Avoiding conflicts in transactional memories. In <i>Proceedings of the 28th ACM symposium on Principles of distributed computing</i> (pp. 7–16). Calgary, Canada: ACM. <a href=\"https://doi.org/10.1145/1582716.1582725\">https://doi.org/10.1145/1582716.1582725</a>","chicago":"Dragojevic, Aleksandar, Rachid Guerraoui, Anmol Singh, and Vasu Singh. “Preventing versus Curing: Avoiding Conflicts in Transactional Memories.” In <i>Proceedings of the 28th ACM Symposium on Principles of Distributed Computing</i>, 7–16. ACM, 2009. <a href=\"https://doi.org/10.1145/1582716.1582725\">https://doi.org/10.1145/1582716.1582725</a>.","ista":"Dragojevic A, Guerraoui R, Singh A, Singh V. 2009. Preventing versus curing: Avoiding conflicts in transactional memories. Proceedings of the 28th ACM symposium on Principles of distributed computing. POPL: Principles of Programming Languages, 7–16.","short":"A. Dragojevic, R. Guerraoui, A. Singh, V. Singh, in:, Proceedings of the 28th ACM Symposium on Principles of Distributed Computing, ACM, 2009, pp. 7–16.","ieee":"A. Dragojevic, R. Guerraoui, A. Singh, and V. Singh, “Preventing versus curing: Avoiding conflicts in transactional memories,” in <i>Proceedings of the 28th ACM symposium on Principles of distributed computing</i>, Calgary, Canada, 2009, pp. 7–16.","mla":"Dragojevic, Aleksandar, et al. “Preventing versus Curing: Avoiding Conflicts in Transactional Memories.” <i>Proceedings of the 28th ACM Symposium on Principles of Distributed Computing</i>, ACM, 2009, pp. 7–16, doi:<a href=\"https://doi.org/10.1145/1582716.1582725\">10.1145/1582716.1582725</a>."},"page":"7 - 16","publication":"Proceedings of the 28th ACM symposium on Principles of distributed computing","title":"Preventing versus curing: Avoiding conflicts in transactional memories","publist_id":"1070","conference":{"end_date":"2009-08-12","location":"Calgary, Canada","start_date":"2009-08-10","name":"POPL: Principles of Programming Languages"},"month":"08","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa_version":"None","type":"conference","quality_controlled":"1","doi":"10.1145/1582716.1582725","date_created":"2018-12-11T12:08:35Z","abstract":[{"text":"Transactional memories are typically speculative and rely on contention managers to cure conflicts. This paper explores a complementary approach that prevents conflicts by scheduling transactions according to predictions on their access sets.\r\nWe first explore the theoretical boundaries of this approach and prove that (1) a TM scheduler with an accurate prediction can be 2-competitive with an optimal offline TM scheduler, but (2) even a slight inaccuracy in prediction makes the competitive ratio of the TM scheduler in the order of the number of transactions.\r\nWe then show that, in practice, there is room for a pragmatic approach with good average case performance. We present Shrink, a scheduler that (1) bases its prediction of transactional accesses on the access patterns of the past transactions from the same thread, and (2) uses a novel heuristic, which we call serialization affinity, to schedule transactions with a probability proportional to the current amount of contention. Shrink obtains roughly 70% accurate read and write access predictions on STMBench7 and STAMP. In our experimental evaluation, Shrink significantly improves STM performance in cases the number of executing threads is higher than the number of available CPU cores. For SwissTM, Shrink improves the performance by up to 55% on STMBench7, and up to 120% on STAMP. For TinySTM, Shrink drastically improves the performance on STMBench7 and STAMP benchmarks.","lang":"eng"}],"publication_status":"published","status":"public","year":"2009","date_updated":"2025-07-02T06:35:49Z","date_published":"2009-08-10T00:00:00Z","article_processing_charge":"No","author":[{"full_name":"Dragojevic, Aleksandar","last_name":"Dragojevic","first_name":"Aleksandar"},{"first_name":"Rachid","full_name":"Guerraoui, Rachid","last_name":"Guerraoui"},{"first_name":"Anmol","last_name":"Singh","full_name":"Singh, Anmol"},{"id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","first_name":"Vasu","last_name":"Singh","full_name":"Singh, Vasu"}]},{"author":[{"first_name":"Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","last_name":"Cerny","full_name":"Cerny, Pavol"},{"last_name":"Alur","full_name":"Alur, Rajeev","first_name":"Rajeev"}],"article_processing_charge":"No","date_published":"2009-07-01T00:00:00Z","date_updated":"2025-07-02T06:32:32Z","year":"2009","alternative_title":["LNCS"],"status":"public","publication_status":"published","date_created":"2018-12-11T12:08:36Z","abstract":[{"text":"We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants to keep secret. Existing software model checking tools analyze individual program executions, and are not applicable to checking confidentiality properties that require reasoning about equivalence among executions. We develop an automated analysis technique for such properties. We show that both over- and under- approximation is needed for sound analysis. Given a program and a confidentiality requirement, our technique produces a formula that is satisfiable if the requirement holds. We evaluate the approach by analyzing bytecode of a set of Java (J2ME) methods.","lang":"eng"}],"intvolume":"      5643","doi":"10.1007/978-3-642-02658-4_16","quality_controlled":"1","type":"conference","oa_version":"None","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"07","publist_id":"1067","conference":{"name":"CAV: Computer Aided Verification"},"volume":5643,"title":"Automated analysis of Java methods for confidentiality","publication":"21st International Conference on Computer Aided Verification","page":"173 - 187","citation":{"mla":"Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality.” <i>21st International Conference on Computer Aided Verification</i>, vol. 5643, Springer, 2009, pp. 173–87, doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_16\">10.1007/978-3-642-02658-4_16</a>.","ieee":"P. Cerny and R. Alur, “Automated analysis of Java methods for confidentiality,” in <i>21st International Conference on Computer Aided Verification</i>, 2009, vol. 5643, pp. 173–187.","short":"P. Cerny, R. Alur, in:, 21st International Conference on Computer Aided Verification, Springer, 2009, pp. 173–187.","ista":"Cerny P, Alur R. 2009. Automated analysis of Java methods for confidentiality. 21st International Conference on Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 5643, 173–187.","ama":"Cerny P, Alur R. Automated analysis of Java methods for confidentiality. In: <i>21st International Conference on Computer Aided Verification</i>. Vol 5643. Springer; 2009:173-187. doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_16\">10.1007/978-3-642-02658-4_16</a>","chicago":"Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality.” In <i>21st International Conference on Computer Aided Verification</i>, 5643:173–87. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_16\">https://doi.org/10.1007/978-3-642-02658-4_16</a>.","apa":"Cerny, P., &#38; Alur, R. (2009). Automated analysis of Java methods for confidentiality. In <i>21st International Conference on Computer Aided Verification</i> (Vol. 5643, pp. 173–187). Springer. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_16\">https://doi.org/10.1007/978-3-642-02658-4_16</a>"},"language":[{"iso":"eng"}],"extern":"1","_id":"4391","scopus_import":"1","publisher":"Springer","day":"01"},{"quality_controlled":"1","main_file_link":[{"open_access":"1","url":"http://repository.upenn.edu/cis_reports/894/"}],"abstract":[{"lang":"eng","text":"For programs whose data variables range over boolean or finite domains, program verification is decidable, and this forms the basis of recent tools for software model checking. In this paper, we consider algorithmic verification of programs that use boolean variables, and in addition, access a single read-only array whose length is potentially unbounded, and whose elements range over a potentially unbounded data domain. We show that the reachability problem, while undecidable in general, is (1) Pspace-complete for programs in which the array-accessing for-loops are not nested, (2) decidable for a restricted class of programs with doubly-nested loops. The second result establishes connections to automata and logics defining languages over data words."}],"date_created":"2018-12-11T12:08:40Z","intvolume":"      5771","oa":1,"alternative_title":["LNCS"],"year":"2009","date_published":"2009-09-01T00:00:00Z","day":"01","publisher":"Springer","_id":"4403","title":"Algorithmic analysis of array-accessing programs","publist_id":"1056","volume":5771,"status":"public","oa_version":"Submitted Version","type":"conference","doi":"10.1007/978-3-642-04027-6_9","publication_status":"published","article_processing_charge":"No","author":[{"first_name":"Rajeev","last_name":"Alur","full_name":"Alur, Rajeev"},{"last_name":"Cerny","full_name":"Cerny, Pavol","first_name":"Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Weinstein","full_name":"Weinstein, Scott","first_name":"Scott"}],"date_updated":"2025-09-30T08:04:32Z","language":[{"iso":"eng"}],"citation":{"apa":"Alur, R., Cerny, P., &#38; Weinstein, S. (2009). Algorithmic analysis of array-accessing programs (Vol. 5771, pp. 86–101). Presented at the CSL: Computer Science Logic, Coimbra, Portugal: Springer. <a href=\"https://doi.org/10.1007/978-3-642-04027-6_9\">https://doi.org/10.1007/978-3-642-04027-6_9</a>","chicago":"Alur, Rajeev, Pavol Cerny, and Scott Weinstein. “Algorithmic Analysis of Array-Accessing Programs,” 5771:86–101. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-04027-6_9\">https://doi.org/10.1007/978-3-642-04027-6_9</a>.","ama":"Alur R, Cerny P, Weinstein S. Algorithmic analysis of array-accessing programs. In: Vol 5771. Springer; 2009:86-101. doi:<a href=\"https://doi.org/10.1007/978-3-642-04027-6_9\">10.1007/978-3-642-04027-6_9</a>","short":"R. Alur, P. Cerny, S. Weinstein, in:, Springer, 2009, pp. 86–101.","ieee":"R. Alur, P. Cerny, and S. Weinstein, “Algorithmic analysis of array-accessing programs,” presented at the CSL: Computer Science Logic, Coimbra, Portugal, 2009, vol. 5771, pp. 86–101.","ista":"Alur R, Cerny P, Weinstein S. 2009. Algorithmic analysis of array-accessing programs. CSL: Computer Science Logic, LNCS, vol. 5771, 86–101.","mla":"Alur, Rajeev, et al. <i>Algorithmic Analysis of Array-Accessing Programs</i>. Vol. 5771, Springer, 2009, pp. 86–101, doi:<a href=\"https://doi.org/10.1007/978-3-642-04027-6_9\">10.1007/978-3-642-04027-6_9</a>."},"extern":"1","conference":{"location":"Coimbra, Portugal","start_date":"2009-09-07","name":"CSL: Computer Science Logic","end_date":"2009-09-11"},"month":"09","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","related_material":{"record":[{"id":"2967","relation":"later_version","status":"public"}]},"page":"86 - 101"},{"publication_status":"published","abstract":[{"lang":"eng","text":"We present an on-the-fly abstraction technique for infinite-state continuous -time Markov chains. We consider Markov chains that are specified by a finite set of transition classes. Such models naturally represent biochemical reactions and therefore play an important role in the stochastic modeling of biological systems. We approximate the transient probability distributions at various time instances by solving a sequence of dynamically constructed abstract models, each depending on the previous one. Each abstract model is a finite Markov chain that represents the behavior of the original, infinite chain during a specific time interval. Our approach provides complete information about probability distributions, not just about individual parameters like the mean. The error of each abstraction can be computed, and the precision of the abstraction refined when desired. We implemented the algorithm and demonstrate its usefulness and efficiency on several case studies from systems biology."}],"intvolume":"      5643","date_created":"2018-12-11T12:08:55Z","main_file_link":[{"open_access":"0","url":"http://pub.ist.ac.at/%7Etah/Publications/sliding-window_abstraction_for_infinite_markov_chains.pdf"}],"doi":"10.1007/978-3-642-02658-4_27","quality_controlled":0,"type":"conference","status":"public","date_published":"2009-01-01T00:00:00Z","date_updated":"2021-01-12T07:57:04Z","year":"2009","alternative_title":["LNCS"],"author":[{"first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger","last_name":"Henzinger"},{"id":"3B43276C-F248-11E8-B48F-1D18A9856A87","first_name":"Maria","full_name":"Maria Mateescu","last_name":"Mateescu"},{"full_name":"Wolf, Verena","last_name":"Wolf","first_name":"Verena"}],"oa":1,"_id":"4453","extern":1,"publisher":"Springer","day":"01","file_date_updated":"2020-07-14T12:46:30Z","citation":{"ista":"Henzinger TA, Mateescu M, Wolf V. 2009. Sliding-window abstraction for infinite Markov chains. CAV: Computer Aided Verification, LNCS, vol. 5643, 337–352.","ieee":"T. A. Henzinger, M. Mateescu, and V. Wolf, “Sliding-window abstraction for infinite Markov chains,” presented at the CAV: Computer Aided Verification, 2009, vol. 5643, pp. 337–352.","short":"T.A. Henzinger, M. Mateescu, V. Wolf, in:, Springer, 2009, pp. 337–352.","mla":"Henzinger, Thomas A., et al. <i>Sliding-Window Abstraction for Infinite Markov Chains</i>. Vol. 5643, Springer, 2009, pp. 337–52, doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_27\">10.1007/978-3-642-02658-4_27</a>.","ama":"Henzinger TA, Mateescu M, Wolf V. Sliding-window abstraction for infinite Markov chains. In: Vol 5643. Springer; 2009:337-352. doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_27\">10.1007/978-3-642-02658-4_27</a>","apa":"Henzinger, T. A., Mateescu, M., &#38; Wolf, V. (2009). Sliding-window abstraction for infinite Markov chains (Vol. 5643, pp. 337–352). Presented at the CAV: Computer Aided Verification, Springer. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_27\">https://doi.org/10.1007/978-3-642-02658-4_27</a>","chicago":"Henzinger, Thomas A, Maria Mateescu, and Verena Wolf. “Sliding-Window Abstraction for Infinite Markov Chains,” 5643:337–52. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_27\">https://doi.org/10.1007/978-3-642-02658-4_27</a>."},"pubrep_id":"40","file":[{"creator":"system","content_type":"application/pdf","date_created":"2018-12-12T10:12:20Z","access_level":"open_access","file_id":"4938","file_size":804295,"checksum":"36b974111521ea534aae294166e93a63","relation":"main_file","file_name":"IST-2012-40-v1+1_Sliding-window_abstraction_for_infinite_markov_chains.pdf","date_updated":"2020-07-14T12:46:30Z"}],"acknowledgement":"The research has been partially funded by the Swiss National Science Foundation under grant 205321-111840.","page":"337 - 352","month":"01","publist_id":"278","conference":{"name":"CAV: Computer Aided Verification"},"volume":5643,"title":"Sliding-window abstraction for infinite Markov chains"},{"status":"public","doi":"10.1007/978-3-642-03845-7_12","abstract":[{"lang":"eng","text":"Molecular noise, which arises from the randomness of the discrete events in the cell, significantly influences fundamental biological processes. Discrete -state continuous-time stochastic models (CTMC) can be used to describe such effects, but the calculation of the probabilities of certain events is computationally expensive.\nWe present a comparison of two analysis approaches for CTMC. On one hand, we estimate the probabilities of interest using repeated Gillespie simulation and determine the statistical accuracy that we obtain. On the other hand, we apply a numerical reachability analysis that approximates the probability distributions of the system at several time instances. We use examples of cellular processes to demonstrate the superiority of the reachability analysis if accurate results are required."}],"intvolume":"      5688","publication_status":"published","date_created":"2018-12-11T12:09:21Z","type":"conference","quality_controlled":0,"author":[{"first_name":"Frédéric","last_name":"Didier","full_name":"Didier, Frédéric"},{"full_name":"Thomas Henzinger","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"full_name":"Maria Mateescu","last_name":"Mateescu","first_name":"Maria","id":"3B43276C-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Verena","last_name":"Wolf","full_name":"Wolf, Verena"}],"date_updated":"2025-09-30T09:03:30Z","date_published":"2009-08-17T00:00:00Z","alternative_title":["LNCS"],"year":"2009","citation":{"mla":"Didier, Frédéric, et al. <i>Approximation of Event Probabilities in Noisy Cellular Processes</i>. Vol. 5688, Springer, 2009, pp. 173–88, doi:<a href=\"https://doi.org/10.1007/978-3-642-03845-7_12\">10.1007/978-3-642-03845-7_12</a>.","ieee":"F. Didier, T. A. Henzinger, M. Mateescu, and V. Wolf, “Approximation of event probabilities in noisy cellular processes,” presented at the CMSB: Computational Methods in Systems Biology, 2009, vol. 5688, pp. 173–188.","short":"F. Didier, T.A. Henzinger, M. Mateescu, V. Wolf, in:, Springer, 2009, pp. 173–188.","ista":"Didier F, Henzinger TA, Mateescu M, Wolf V. 2009. Approximation of event probabilities in noisy cellular processes. CMSB: Computational Methods in Systems Biology, LNCS, vol. 5688, 173–188.","ama":"Didier F, Henzinger TA, Mateescu M, Wolf V. Approximation of event probabilities in noisy cellular processes. In: Vol 5688. Springer; 2009:173-188. doi:<a href=\"https://doi.org/10.1007/978-3-642-03845-7_12\">10.1007/978-3-642-03845-7_12</a>","chicago":"Didier, Frédéric, Thomas A Henzinger, Maria Mateescu, and Verena Wolf. “Approximation of Event Probabilities in Noisy Cellular Processes,” 5688:173–88. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-03845-7_12\">https://doi.org/10.1007/978-3-642-03845-7_12</a>.","apa":"Didier, F., Henzinger, T. A., Mateescu, M., &#38; Wolf, V. (2009). Approximation of event probabilities in noisy cellular processes (Vol. 5688, pp. 173–188). Presented at the CMSB: Computational Methods in Systems Biology, Springer. <a href=\"https://doi.org/10.1007/978-3-642-03845-7_12\">https://doi.org/10.1007/978-3-642-03845-7_12</a>"},"_id":"4535","extern":1,"day":"17","publisher":"Springer","publist_id":"189","volume":5688,"conference":{"name":"CMSB: Computational Methods in Systems Biology"},"month":"08","title":"Approximation of event probabilities in noisy cellular processes","page":"173 - 188","acknowledgement":"This research was supported in part by the Swiss National Science Foundation under grant 205321-111840 and by the Excellence Cluster on Multimodal Computing and Interaction.","related_material":{"record":[{"id":"3364","status":"public","relation":"later_version"}]}},{"related_material":{"record":[{"relation":"later_version","status":"public","id":"3867"}]},"page":"199 - 208","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"01","publist_id":"181","conference":{"name":"LICS: Logic in Computer Science"},"title":"Expressiveness and closure properties for quantitative languages","extern":"1","_id":"4540","scopus_import":"1","publisher":"IEEE","day":"01","citation":{"ama":"Chatterjee K, Doyen L, Henzinger TA. Expressiveness and closure properties for quantitative languages. In: IEEE; 2009:199-208. doi:<a href=\"https://doi.org/10.1109/LICS.2009.16\">10.1109/LICS.2009.16</a>","chicago":"Chatterjee, Krishnendu, Laurent Doyen, and Thomas A Henzinger. “Expressiveness and Closure Properties for Quantitative Languages,” 199–208. IEEE, 2009. <a href=\"https://doi.org/10.1109/LICS.2009.16\">https://doi.org/10.1109/LICS.2009.16</a>.","apa":"Chatterjee, K., Doyen, L., &#38; Henzinger, T. A. (2009). Expressiveness and closure properties for quantitative languages (pp. 199–208). Presented at the LICS: Logic in Computer Science, IEEE. <a href=\"https://doi.org/10.1109/LICS.2009.16\">https://doi.org/10.1109/LICS.2009.16</a>","mla":"Chatterjee, Krishnendu, et al. <i>Expressiveness and Closure Properties for Quantitative Languages</i>. IEEE, 2009, pp. 199–208, doi:<a href=\"https://doi.org/10.1109/LICS.2009.16\">10.1109/LICS.2009.16</a>.","ieee":"K. Chatterjee, L. Doyen, and T. A. Henzinger, “Expressiveness and closure properties for quantitative languages,” presented at the LICS: Logic in Computer Science, 2009, pp. 199–208.","ista":"Chatterjee K, Doyen L, Henzinger TA. 2009. Expressiveness and closure properties for quantitative languages. LICS: Logic in Computer Science, 199–208.","short":"K. Chatterjee, L. Doyen, T.A. Henzinger, in:, IEEE, 2009, pp. 199–208."},"language":[{"iso":"eng"}],"pubrep_id":"55","date_published":"2009-01-01T00:00:00Z","date_updated":"2025-09-30T09:30:59Z","year":"2009","author":[{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu"},{"first_name":"Laurent","full_name":"Doyen, Laurent","last_name":"Doyen"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","full_name":"Henzinger, Thomas A","last_name":"Henzinger"}],"article_processing_charge":"No","date_created":"2018-12-11T12:09:23Z","abstract":[{"text":"Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages L that assign to each word w a real number L(w). In the case of infinite words, the value of a run is naturally computed as the maximum, limsup, liminf, limit average, or discounted sum of the transition weights. We study expressiveness and closure questions about these quantitative languages. We first show that the set of words with value greater than a threshold can be non-w-regular for deterministic limit-average and discounted-sum automata, while this set is always w-regular when the threshold is isolated (i.e., some neighborhood around the threshold contains no word). In the latter case, we prove that the w-regular language is robust against small perturbations of the transition weights. We next consider automata with transition weights 0 or 1 and show that they are as expressive as general weighted automata in the limit-average case, but not in the discounted-sum case. Third, for quantitative languages L-1 and L-2, we consider the operations max(L-1, L-2), min(L-1, L-2), and 1-L-1, which generalize the boolean operations on languages, as well as the sum L-1 + L-2. We establish the closure properties of all classes of quantitative languages with respect to these four operations.","lang":"eng"}],"publication_status":"published","doi":"10.1109/LICS.2009.16","quality_controlled":"1","type":"conference","oa_version":"None","status":"public"},{"author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu"},{"first_name":"Laurent","full_name":"Doyen, Laurent","last_name":"Doyen"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","full_name":"Henzinger, Thomas A","last_name":"Henzinger"}],"date_updated":"2024-10-09T20:53:55Z","department":[{"_id":"KrCh"}],"status":"public","doi":"10.1007/978-3-642-03409-1_2","publication_status":"published","oa_version":"Submitted Version","type":"conference","conference":{"end_date":"2009-09-04","start_date":"2009-09-02","location":"Wroclaw, Poland","name":"FCT: Fundamentals of Computation Theory"},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"09","file":[{"file_name":"IST-2012-39-v1+1_Alternating_Weighted_Automata.pdf","date_updated":"2020-07-14T12:46:31Z","relation":"main_file","checksum":"e8f53abb63579de3f2bff58b2a1188e2","file_size":164428,"file_id":"5126","access_level":"open_access","date_created":"2018-12-12T10:15:09Z","content_type":"application/pdf","creator":"system"}],"acknowledgement":"This research was supported in part by the Swiss National Science Foundation under the Indo-Swiss Joint Research Programme, by the European Network of Excellence on Embedded Systems Design (ArtistDesign), by the European Combest, Quasimodo, and Gasics projects, by the PAI program Moves funded by the Belgian Federal Government, and by the CFV (Federated Center in Verification) funded by the F.R.S.-FNRS.","page":"3 - 13","has_accepted_license":"1","citation":{"apa":"Chatterjee, K., Doyen, L., &#38; Henzinger, T. A. (2009). Alternating weighted automata (Vol. 5699, pp. 3–13). Presented at the FCT: Fundamentals of Computation Theory, Wroclaw, Poland: Springer. <a href=\"https://doi.org/10.1007/978-3-642-03409-1_2\">https://doi.org/10.1007/978-3-642-03409-1_2</a>","chicago":"Chatterjee, Krishnendu, Laurent Doyen, and Thomas A Henzinger. “Alternating Weighted Automata,” 5699:3–13. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-03409-1_2\">https://doi.org/10.1007/978-3-642-03409-1_2</a>.","ama":"Chatterjee K, Doyen L, Henzinger TA. Alternating weighted automata. In: Vol 5699. Springer; 2009:3-13. doi:<a href=\"https://doi.org/10.1007/978-3-642-03409-1_2\">10.1007/978-3-642-03409-1_2</a>","ista":"Chatterjee K, Doyen L, Henzinger TA. 2009. Alternating weighted automata. FCT: Fundamentals of Computation Theory, LNCS, vol. 5699, 3–13.","ieee":"K. Chatterjee, L. Doyen, and T. A. Henzinger, “Alternating weighted automata,” presented at the FCT: Fundamentals of Computation Theory, Wroclaw, Poland, 2009, vol. 5699, pp. 3–13.","short":"K. Chatterjee, L. Doyen, T.A. Henzinger, in:, Springer, 2009, pp. 3–13.","mla":"Chatterjee, Krishnendu, et al. <i>Alternating Weighted Automata</i>. Vol. 5699, Springer, 2009, pp. 3–13, doi:<a href=\"https://doi.org/10.1007/978-3-642-03409-1_2\">10.1007/978-3-642-03409-1_2</a>."},"language":[{"iso":"eng"}],"pubrep_id":"39","scopus_import":1,"project":[{"name":"Design for Embedded Systems","_id":"25F1337C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","grant_number":"214373"},{"grant_number":"215543","_id":"25EFB36C-B435-11E9-9278-68D0E5697425","name":"COMponent-Based Embedded Systems design Techniques","call_identifier":"FP7"}],"file_date_updated":"2020-07-14T12:46:31Z","corr_author":"1","oa":1,"date_published":"2009-09-10T00:00:00Z","alternative_title":["LNCS"],"year":"2009","abstract":[{"lang":"eng","text":"Weighted automata are finite automata with numerical weights on transitions. Nondeterministic weighted automata define quantitative languages L that assign to each word w a real number L(w) computed as the maximal value of all runs over w, and the value of a run r is a function of the sequence of weights that appear along r. There are several natural functions to consider such as Sup, LimSup, LimInf, limit average, and discounted sum of transition weights.\r\nWe introduce alternating weighted automata in which the transitions of the runs are chosen by two players in a turn-based fashion. Each word is assigned the maximal value of a run that the first player can enforce regardless of the choices made by the second player. We survey the results about closure properties, expressiveness, and decision problems for nondeterministic weighted automata, and we extend these results to alternating weighted automata.\r\nFor quantitative languages L 1 and L 2, we consider the pointwise operations max(L 1,L 2), min(L 1,L 2), 1 − L 1, and the sum L 1 + L 2. We establish the closure properties of all classes of alternating weighted automata with respect to these four operations.\r\nWe next compare the expressive power of the various classes of alternating and nondeterministic weighted automata over infinite words. In particular, for limit average and discounted sum, we show that alternation brings more expressive power than nondeterminism.\r\nFinally, we present decidability results and open questions for the quantitative extension of the classical decision problems in automata theory: emptiness, universality, language inclusion, and language equivalence."}],"intvolume":"      5699","date_created":"2018-12-11T12:09:23Z","quality_controlled":"1","publist_id":"180","volume":5699,"title":"Alternating weighted automata","ec_funded":1,"ddc":["004"],"_id":"4542","day":"10","publisher":"Springer"},{"acknowledgement":"This research was supported in part by the Swiss National Science Foundation under the Indo-Swiss Joint Research Programme, by the European Network of Excellence on Embedded Systems Design (ArtistDesign), and by the European project Combest.","page":"34 - 54","month":"08","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","conference":{"end_date":"2009-08-28","name":"MFCS: Mathematical Foundations of Computer Science","start_date":"2009-08-24","location":"High Tatras, Slovakia"},"scopus_import":1,"corr_author":"1","project":[{"_id":"25EFB36C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"COMponent-Based Embedded Systems design Techniques","grant_number":"215543"},{"grant_number":"214373","name":"Design for Embedded Systems","_id":"25F1337C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"}],"citation":{"chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, and Florian Horn. “Stochastic Games with Finitary Objectives,” 5734:34–54. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-03816-7_4\">https://doi.org/10.1007/978-3-642-03816-7_4</a>.","apa":"Chatterjee, K., Henzinger, T. A., &#38; Horn, F. (2009). Stochastic games with finitary objectives (Vol. 5734, pp. 34–54). Presented at the MFCS: Mathematical Foundations of Computer Science, High Tatras, Slovakia: Springer. <a href=\"https://doi.org/10.1007/978-3-642-03816-7_4\">https://doi.org/10.1007/978-3-642-03816-7_4</a>","ama":"Chatterjee K, Henzinger TA, Horn F. Stochastic games with finitary objectives. In: Vol 5734. Springer; 2009:34-54. doi:<a href=\"https://doi.org/10.1007/978-3-642-03816-7_4\">10.1007/978-3-642-03816-7_4</a>","mla":"Chatterjee, Krishnendu, et al. <i>Stochastic Games with Finitary Objectives</i>. Vol. 5734, Springer, 2009, pp. 34–54, doi:<a href=\"https://doi.org/10.1007/978-3-642-03816-7_4\">10.1007/978-3-642-03816-7_4</a>.","short":"K. Chatterjee, T.A. Henzinger, F. Horn, in:, Springer, 2009, pp. 34–54.","ista":"Chatterjee K, Henzinger TA, Horn F. 2009. Stochastic games with finitary objectives. MFCS: Mathematical Foundations of Computer Science, LNCS, vol. 5734, 34–54.","ieee":"K. Chatterjee, T. A. Henzinger, and F. Horn, “Stochastic games with finitary objectives,” presented at the MFCS: Mathematical Foundations of Computer Science, High Tatras, Slovakia, 2009, vol. 5734, pp. 34–54."},"language":[{"iso":"eng"}],"date_updated":"2024-10-09T20:53:54Z","department":[{"_id":"KrCh"}],"author":[{"last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","full_name":"Henzinger, Thomas A","last_name":"Henzinger"},{"first_name":"Florian","id":"37327ACE-F248-11E8-B48F-1D18A9856A87","last_name":"Horn","full_name":"Horn, Florian"}],"publication_status":"published","doi":"10.1007/978-3-642-03816-7_4","type":"conference","oa_version":"None","status":"public","volume":5734,"publist_id":"178","ec_funded":1,"title":"Stochastic games with finitary objectives","_id":"4543","publisher":"Springer","day":"01","date_published":"2009-08-01T00:00:00Z","year":"2009","alternative_title":["LNCS"],"date_created":"2018-12-11T12:09:24Z","intvolume":"      5734","abstract":[{"text":"The synthesis of a reactive system with respect to all omega-regular specification requires the solution of a graph game. Such games have been extended in two natural ways. First, a game graph can be equipped with probabilistic choices between alternative transitions, thus allowing the, modeling of uncertain behaviour. These are called stochastic games. Second, a liveness specification can he strengthened to require satisfaction within all unknown but bounded amount of time. These are called finitary objectives. We study. for the first time, the, combination of Stochastic games and finitary objectives. We characterize the requirements on optimal strategies and provide algorithms for Computing the maximal achievable probability of winning stochastic games with finitary parity or Street, objectives. Most notably the set of state's from which a player can win with probability . for a finitary parity objective can he computed in polynomial time even though no polynomial-time algorithm is known in the nonfinitary case.","lang":"eng"}],"quality_controlled":"1"},{"_id":"4544","extern":1,"publisher":"SIAM","file_date_updated":"2020-07-14T12:46:31Z","day":"01","citation":{"chicago":"Chatterjee, Krishnendu, Luca De Alfaro, and Thomas A Henzinger. “Termination Criteria for Solving Concurrent Safety and Reachability Games,” 197–206. SIAM, 2009. <a href=\"https://doi.org/10.1137/1.9781611973068.23\">https://doi.org/10.1137/1.9781611973068.23</a>.","apa":"Chatterjee, K., De Alfaro, L., &#38; Henzinger, T. A. (2009). Termination criteria for solving concurrent safety and reachability games (pp. 197–206). Presented at the SODA: Symposium on Discrete Algorithms, SIAM. <a href=\"https://doi.org/10.1137/1.9781611973068.23\">https://doi.org/10.1137/1.9781611973068.23</a>","ama":"Chatterjee K, De Alfaro L, Henzinger TA. Termination criteria for solving concurrent safety and reachability games. In: SIAM; 2009:197-206. doi:<a href=\"https://doi.org/10.1137/1.9781611973068.23\">10.1137/1.9781611973068.23</a>","mla":"Chatterjee, Krishnendu, et al. <i>Termination Criteria for Solving Concurrent Safety and Reachability Games</i>. SIAM, 2009, pp. 197–206, doi:<a href=\"https://doi.org/10.1137/1.9781611973068.23\">10.1137/1.9781611973068.23</a>.","short":"K. Chatterjee, L. De Alfaro, T.A. Henzinger, in:, SIAM, 2009, pp. 197–206.","ista":"Chatterjee K, De Alfaro L, Henzinger TA. 2009. Termination criteria for solving concurrent safety and reachability games. SODA: Symposium on Discrete Algorithms, 197–206.","ieee":"K. Chatterjee, L. De Alfaro, and T. A. Henzinger, “Termination criteria for solving concurrent safety and reachability games,” presented at the SODA: Symposium on Discrete Algorithms, 2009, pp. 197–206."},"pubrep_id":"37","file":[{"file_size":212369,"relation":"main_file","checksum":"ce7dc1667502e26b23c07a767ac41ae6","date_updated":"2020-07-14T12:46:31Z","file_name":"IST-2012-37-v1+1_Termination_criteria_for_solving_concurrent_safety_and_reachability_games.pdf","content_type":"application/pdf","creator":"system","access_level":"open_access","date_created":"2018-12-12T10:08:03Z","file_id":"4662"}],"page":"197 - 206","month":"01","conference":{"name":"SODA: Symposium on Discrete Algorithms"},"publist_id":"176","title":"Termination criteria for solving concurrent safety and reachability games","publication_status":"published","abstract":[{"lang":"eng","text":"We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player 1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. Our result is significant because the strategy improvement algorithm provides, for the first time, a way to approximate the value of a concurrent safety game from below. Since a value iteration algorithm, or a strategy improvement algorithm for reachability games, can be used to approximate the same value from above, the combination of both algorithms yields a method for computing a converging sequence of upper and lower bounds for the values of concurrent reachability and safety games. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games."}],"date_created":"2018-12-11T12:09:24Z","main_file_link":[{"url":"https://repository.ist.ac.at/id/eprint/37","open_access":"1"}],"doi":"10.1137/1.9781611973068.23","quality_controlled":0,"type":"conference","status":"public","date_published":"2009-01-01T00:00:00Z","date_updated":"2021-01-12T07:59:35Z","year":"2009","author":[{"first_name":"Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Krishnendu Chatterjee","last_name":"Chatterjee"},{"first_name":"Luca","full_name":"de Alfaro, Luca","last_name":"De Alfaro"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","full_name":"Thomas Henzinger","last_name":"Henzinger"}],"oa":1},{"title":"A survey of stochastic games with limsup and liminf objectives","ec_funded":1,"volume":5556,"publist_id":"177","day":"24","publisher":"Springer","_id":"4545","ddc":["000","005"],"alternative_title":["LNCS"],"year":"2009","date_published":"2009-06-24T00:00:00Z","oa":1,"quality_controlled":"1","intvolume":"      5556","date_created":"2018-12-11T12:09:24Z","abstract":[{"text":"A stochastic game is a two-player game played oil a graph, where in each state the successor is chosen either by One of the players, or according to a probability distribution. We Survey Stochastic games with limsup and liminf objectives. A real-valued re-ward is assigned to each state, and the value of all infinite path is the limsup (resp. liminf) of all rewards along the path. The value of a stochastic game is the maximal expected value of an infinite path that call he achieved by resolving the decisions of the first player. We present the complexity of computing values of Stochastic games and their subclasses, and the complexity, of optimal strategies in such games. ","lang":"eng"}],"file":[{"file_size":187419,"relation":"main_file","checksum":"dabb6d24428a000254c95493d9c492e6","date_updated":"2020-07-14T12:46:31Z","file_name":"IST-2012-38-v1+1_A_survey_of_stochastic_games_with_limsup_and_liminf_objectives.pdf","creator":"system","content_type":"application/pdf","access_level":"open_access","date_created":"2018-12-12T10:13:11Z","file_id":"4992"}],"acknowledgement":"This research was supported in part by the Swiss National Science Foundation under the Indo-Swiss Joint Research Programme, by the European Network of Excellence on Embedded Systems Design (ArtistDesign), by the European projects COMBEST, Quasimodo, Gasics, by the PAI program Moves funded by the Belgian Federal Government, and by the CFV (Federated Center in Verification) funded by the F.R.S.-FNRS.","page":"1 - 15","conference":{"end_date":"2009-07-12","name":"ICALP: Automata, Languages and Programming","location":"Rhodos, Greece","start_date":"2009-07-05"},"month":"06","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","project":[{"_id":"25EFB36C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"COMponent-Based Embedded Systems design Techniques","grant_number":"215543"}],"file_date_updated":"2020-07-14T12:46:31Z","corr_author":"1","scopus_import":1,"language":[{"iso":"eng"}],"pubrep_id":"38","has_accepted_license":"1","citation":{"chicago":"Chatterjee, Krishnendu, Laurent Doyen, and Thomas A Henzinger. “A Survey of Stochastic Games with Limsup and Liminf Objectives,” 5556:1–15. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02930-1_1\">https://doi.org/10.1007/978-3-642-02930-1_1</a>.","apa":"Chatterjee, K., Doyen, L., &#38; Henzinger, T. A. (2009). A survey of stochastic games with limsup and liminf objectives (Vol. 5556, pp. 1–15). Presented at the ICALP: Automata, Languages and Programming, Rhodos, Greece: Springer. <a href=\"https://doi.org/10.1007/978-3-642-02930-1_1\">https://doi.org/10.1007/978-3-642-02930-1_1</a>","ama":"Chatterjee K, Doyen L, Henzinger TA. A survey of stochastic games with limsup and liminf objectives. In: Vol 5556. Springer; 2009:1-15. doi:<a href=\"https://doi.org/10.1007/978-3-642-02930-1_1\">10.1007/978-3-642-02930-1_1</a>","mla":"Chatterjee, Krishnendu, et al. <i>A Survey of Stochastic Games with Limsup and Liminf Objectives</i>. Vol. 5556, Springer, 2009, pp. 1–15, doi:<a href=\"https://doi.org/10.1007/978-3-642-02930-1_1\">10.1007/978-3-642-02930-1_1</a>.","ieee":"K. Chatterjee, L. Doyen, and T. A. Henzinger, “A survey of stochastic games with limsup and liminf objectives,” presented at the ICALP: Automata, Languages and Programming, Rhodos, Greece, 2009, vol. 5556, pp. 1–15.","ista":"Chatterjee K, Doyen L, Henzinger TA. 2009. A survey of stochastic games with limsup and liminf objectives. ICALP: Automata, Languages and Programming, LNCS, vol. 5556, 1–15.","short":"K. Chatterjee, L. Doyen, T.A. Henzinger, in:, Springer, 2009, pp. 1–15."},"department":[{"_id":"KrCh"}],"date_updated":"2024-10-09T20:53:54Z","author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X"},{"full_name":"Doyen, Laurent","last_name":"Doyen","first_name":"Laurent"},{"full_name":"Henzinger, Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"oa_version":"Submitted Version","type":"conference","doi":"10.1007/978-3-642-02930-1_1","publication_status":"published","status":"public"},{"publication_status":"published","doi":"10.1007/978-3-642-02658-4_14","type":"conference","oa_version":"Preprint","status":"public","date_updated":"2024-10-21T06:03:07Z","department":[{"_id":"KrCh"}],"author":[{"full_name":"Bloem, Roderick","last_name":"Bloem","first_name":"Roderick"},{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A","full_name":"Henzinger, Thomas A","last_name":"Henzinger"},{"first_name":"Barbara","last_name":"Jobstmann","full_name":"Jobstmann, Barbara"}],"scopus_import":"1","project":[{"_id":"25EFB36C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"COMponent-Based Embedded Systems design Techniques","grant_number":"215543"}],"citation":{"mla":"Bloem, Roderick, et al. <i>Better Quality in Synthesis through Quantitative Objectives</i>. Vol. 5643, Springer, 2009, pp. 140–56, doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">10.1007/978-3-642-02658-4_14</a>.","ista":"Bloem R, Chatterjee K, Henzinger TA, Jobstmann B. 2009. Better quality in synthesis through quantitative objectives. CAV: Computer Aided Verification, LNCS, vol. 5643, 140–156.","short":"R. Bloem, K. Chatterjee, T.A. Henzinger, B. Jobstmann, in:, Springer, 2009, pp. 140–156.","ieee":"R. Bloem, K. Chatterjee, T. A. Henzinger, and B. Jobstmann, “Better quality in synthesis through quantitative objectives,” presented at the CAV: Computer Aided Verification, Grenoble, France, 2009, vol. 5643, pp. 140–156.","ama":"Bloem R, Chatterjee K, Henzinger TA, Jobstmann B. Better quality in synthesis through quantitative objectives. In: Vol 5643. Springer; 2009:140-156. doi:<a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">10.1007/978-3-642-02658-4_14</a>","chicago":"Bloem, Roderick, Krishnendu Chatterjee, Thomas A Henzinger, and Barbara Jobstmann. “Better Quality in Synthesis through Quantitative Objectives,” 5643:140–56. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">https://doi.org/10.1007/978-3-642-02658-4_14</a>.","apa":"Bloem, R., Chatterjee, K., Henzinger, T. A., &#38; Jobstmann, B. (2009). Better quality in synthesis through quantitative objectives (Vol. 5643, pp. 140–156). Presented at the CAV: Computer Aided Verification, Grenoble, France: Springer. <a href=\"https://doi.org/10.1007/978-3-642-02658-4_14\">https://doi.org/10.1007/978-3-642-02658-4_14</a>"},"language":[{"iso":"eng"}],"acknowledgement":"This research was supported by the Swiss National Science Foundation (Indo-Swiss Research Program and NCCR MICS) and the European Union projects COMBEST and COCONUT.","page":"140 - 156","external_id":{"arxiv":["0904.2638"]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"06","conference":{"start_date":"2009-06-26","location":"Grenoble, France","name":"CAV: Computer Aided Verification","end_date":"2009-07-02"},"intvolume":"      5643","date_created":"2018-12-11T12:09:31Z","abstract":[{"lang":"eng","text":"Most specification languages express only qualitative constraints. However, among two implementations that satisfy a given specification, one may be preferred to another. For example, if a specification asks that every request is followed by a response, one may prefer an implementation that generates responses quickly but does not generate unnecessary responses. We use quantitative properties to measure the “goodness” of an implementation. Using games with corresponding quantitative objectives, we can synthesize “optimal” implementations, which are preferred among the set of possible implementations that satisfy a given specification.\r\nIn particular, we show how automata with lexicographic mean-payoff conditions can be used to express many interesting quantitative properties for reactive systems. In this framework, the synthesis of optimal implementations requires the solution of lexicographic mean-payoff games (for safety requirements), and the solution of games with both lexicographic mean-payoff and parity objectives (for liveness requirements). We present algorithms for solving both kinds of novel graph games."}],"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/0904.2638"}],"quality_controlled":"1","date_published":"2009-06-19T00:00:00Z","year":"2009","alternative_title":["LNCS"],"oa":1,"_id":"4569","arxiv":1,"publisher":"Springer","day":"19","volume":5643,"publist_id":"141","ec_funded":1,"title":"Better quality in synthesis through quantitative objectives"},{"pubrep_id":"35","citation":{"apa":"Berwanger, D., Chatterjee, K., De Wulf, M., Doyen, L., &#38; Henzinger, T. A. (2009). Alpaga: A tool for solving parity games with imperfect information (Vol. 5505, pp. 58–61). Presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Springer. <a href=\"https://doi.org/10.1007/978-3-642-00768-2_7\">https://doi.org/10.1007/978-3-642-00768-2_7</a>","chicago":"Berwanger, Dietmar, Krishnendu Chatterjee, Martin De Wulf, Laurent Doyen, and Thomas A Henzinger. “Alpaga: A Tool for Solving Parity Games with Imperfect Information,” 5505:58–61. Springer, 2009. <a href=\"https://doi.org/10.1007/978-3-642-00768-2_7\">https://doi.org/10.1007/978-3-642-00768-2_7</a>.","ama":"Berwanger D, Chatterjee K, De Wulf M, Doyen L, Henzinger TA. Alpaga: A tool for solving parity games with imperfect information. In: Vol 5505. Springer; 2009:58-61. doi:<a href=\"https://doi.org/10.1007/978-3-642-00768-2_7\">10.1007/978-3-642-00768-2_7</a>","short":"D. Berwanger, K. Chatterjee, M. De Wulf, L. Doyen, T.A. Henzinger, in:, Springer, 2009, pp. 58–61.","ista":"Berwanger D, Chatterjee K, De Wulf M, Doyen L, Henzinger TA. 2009. Alpaga: A tool for solving parity games with imperfect information. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 5505, 58–61.","ieee":"D. Berwanger, K. Chatterjee, M. De Wulf, L. Doyen, and T. A. Henzinger, “Alpaga: A tool for solving parity games with imperfect information,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, 2009, vol. 5505, pp. 58–61.","mla":"Berwanger, Dietmar, et al. <i>Alpaga: A Tool for Solving Parity Games with Imperfect Information</i>. Vol. 5505, Springer, 2009, pp. 58–61, doi:<a href=\"https://doi.org/10.1007/978-3-642-00768-2_7\">10.1007/978-3-642-00768-2_7</a>."},"day":"09","file_date_updated":"2020-07-14T12:46:32Z","publisher":"Springer","extern":1,"_id":"4580","title":"Alpaga: A tool for solving parity games with imperfect information","conference":{"name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems"},"volume":5505,"publist_id":"127","month":"03","file":[{"file_size":212180,"checksum":"d52b55a10a47b3e3b0e016ea9bf85c41","relation":"main_file","file_name":"IST-2012-35-v1+1_Alpaga_-_A_tool_for_solving_parity_games_with_imperfect_information.pdf","date_updated":"2020-07-14T12:46:32Z","content_type":"application/pdf","creator":"system","date_created":"2018-12-12T10:15:45Z","access_level":"open_access","file_id":"5168"}],"page":"58 - 61","status":"public","type":"conference","quality_controlled":0,"doi":"10.1007/978-3-642-00768-2_7","main_file_link":[{"url":"https://repository.ist.ac.at/35/","open_access":"1"}],"date_created":"2018-12-11T12:09:35Z","intvolume":"      5505","abstract":[{"text":"Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains.","lang":"eng"}],"publication_status":"published","oa":1,"author":[{"first_name":"Dietmar","full_name":"Berwanger, Dietmar","last_name":"Berwanger"},{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","full_name":"Krishnendu Chatterjee","last_name":"Chatterjee"},{"first_name":"Martin","last_name":"De Wulf","full_name":"De Wulf, Martin"},{"full_name":"Doyen, Laurent","last_name":"Doyen","first_name":"Laurent"},{"full_name":"Thomas Henzinger","last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"}],"alternative_title":["LNCS"],"year":"2009","date_updated":"2021-01-12T07:59:52Z","date_published":"2009-03-09T00:00:00Z"},{"page":"5851-5861","OA_type":"closed access","publication_identifier":{"issn":["0924-0136"],"eissn":["1873-4774"]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"09","extern":"1","scopus_import":"1","citation":{"mla":"Sahli, M., et al. “Quality Assessment of Polymer Replication by Hot Embossing and Micro-Injection Moulding Processes Using Scanning Mechanical Microscopy.” <i>Journal of Materials Processing Technology</i>, vol. 209, no. 18–19, Elsevier, 2009, pp. 5851–61, doi:<a href=\"https://doi.org/10.1016/j.jmatprotec.2009.06.011\">10.1016/j.jmatprotec.2009.06.011</a>.","short":"M. Sahli, C. Millot, C. Roques-Carmes, C. Khan Malek, T. Barriere, J.C. Gelin, Journal of Materials Processing Technology 209 (2009) 5851–5861.","ista":"Sahli M, Millot C, Roques-Carmes C, Khan Malek C, Barriere T, Gelin JC. 2009. Quality assessment of polymer replication by hot embossing and micro-injection moulding processes using scanning mechanical microscopy. Journal of Materials Processing Technology. 209(18–19), 5851–5861.","ieee":"M. Sahli, C. Millot, C. Roques-Carmes, C. Khan Malek, T. Barriere, and J. C. Gelin, “Quality assessment of polymer replication by hot embossing and micro-injection moulding processes using scanning mechanical microscopy,” <i>Journal of Materials Processing Technology</i>, vol. 209, no. 18–19. Elsevier, pp. 5851–5861, 2009.","ama":"Sahli M, Millot C, Roques-Carmes C, Khan Malek C, Barriere T, Gelin JC. Quality assessment of polymer replication by hot embossing and micro-injection moulding processes using scanning mechanical microscopy. <i>Journal of Materials Processing Technology</i>. 2009;209(18-19):5851-5861. doi:<a href=\"https://doi.org/10.1016/j.jmatprotec.2009.06.011\">10.1016/j.jmatprotec.2009.06.011</a>","chicago":"Sahli, M., C. Millot, Charles Roques-Carmes, C. Khan Malek, T. Barriere, and J.C. Gelin. “Quality Assessment of Polymer Replication by Hot Embossing and Micro-Injection Moulding Processes Using Scanning Mechanical Microscopy.” <i>Journal of Materials Processing Technology</i>. Elsevier, 2009. <a href=\"https://doi.org/10.1016/j.jmatprotec.2009.06.011\">https://doi.org/10.1016/j.jmatprotec.2009.06.011</a>.","apa":"Sahli, M., Millot, C., Roques-Carmes, C., Khan Malek, C., Barriere, T., &#38; Gelin, J. C. (2009). Quality assessment of polymer replication by hot embossing and micro-injection moulding processes using scanning mechanical microscopy. <i>Journal of Materials Processing Technology</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.jmatprotec.2009.06.011\">https://doi.org/10.1016/j.jmatprotec.2009.06.011</a>"},"language":[{"iso":"eng"}],"date_updated":"2026-04-15T12:52:03Z","article_processing_charge":"No","author":[{"full_name":"Sahli, M.","last_name":"Sahli","first_name":"M."},{"first_name":"C.","full_name":"Millot, C.","last_name":"Millot"},{"first_name":"Charles","id":"e2e68fc9-6505-11ef-a541-eb4e72cc3e82","full_name":"Roques-Carmes, Charles","last_name":"Roques-Carmes"},{"first_name":"C.","last_name":"Khan Malek","full_name":"Khan Malek, C."},{"first_name":"T.","last_name":"Barriere","full_name":"Barriere, T."},{"first_name":"J.C.","full_name":"Gelin, J.C.","last_name":"Gelin"}],"publication_status":"published","doi":"10.1016/j.jmatprotec.2009.06.011","type":"journal_article","oa_version":"None","status":"public","publication":"Journal of Materials Processing Technology","keyword":["Hot embossing","Micro-injection moulding","Micro-cavities replication","Polypropylene polymer","Scanning mechanical microscopy","Roughness parameters"],"volume":209,"title":"Quality assessment of polymer replication by hot embossing and micro-injection moulding processes using scanning mechanical microscopy","article_type":"original","_id":"21514","publisher":"Elsevier","day":"19","ddc":["530"],"date_published":"2009-09-19T00:00:00Z","year":"2009","issue":"18-19","intvolume":"       209","abstract":[{"lang":"eng","text":"This paper describes observations and metrological analyses made to compare the replication quality of polymeric replicas obtained by filling micro-cavities using both hot embossing and micro-injection moulding processes. The experiments are performed with polypropylene (PP) at a constant melt temperature and a constant mould temperature, whereas hot embossing tests are carried out with the same polymer at temperatures close to the softening one.\r\nThe results concerning the micro-cavities filling provide information on the reliability about the possibilities of replication topographical surface geometries. The data obtained by scanning mechanical microscopy (SMM) are used to determine the comparative filling ratio values."}],"date_created":"2026-03-30T12:22:47Z","quality_controlled":"1"},{"article_type":"original","title":"Experimental analysis and numerical modelling of the forming process of polypropylene replicas of micro-cavities using hot embossing","volume":15,"publication":"Microsystem Technologies","ddc":["530"],"publisher":"Springer Nature","day":"01","_id":"21513","year":"2009","issue":"6","date_published":"2009-06-01T00:00:00Z","quality_controlled":"1","abstract":[{"lang":"eng","text":"Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing."}],"intvolume":"        15","date_created":"2026-03-30T12:22:47Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"06","publication_identifier":{"issn":["0946-7076"],"eissn":["1432-1858"]},"page":"827-835","OA_type":"closed access","language":[{"iso":"eng"}],"citation":{"mla":"Sahli, Mohamed, et al. “Experimental Analysis and Numerical Modelling of the Forming Process of Polypropylene Replicas of Micro-Cavities Using Hot Embossing.” <i>Microsystem Technologies</i>, vol. 15, no. 6, Springer Nature, 2009, pp. 827–35, doi:<a href=\"https://doi.org/10.1007/s00542-009-0813-6\">10.1007/s00542-009-0813-6</a>.","short":"M. Sahli, C. Millot, C. Roques-Carmes, C. Khan Malek, Microsystem Technologies 15 (2009) 827–835.","ieee":"M. Sahli, C. Millot, C. Roques-Carmes, and C. Khan Malek, “Experimental analysis and numerical modelling of the forming process of polypropylene replicas of micro-cavities using hot embossing,” <i>Microsystem Technologies</i>, vol. 15, no. 6. Springer Nature, pp. 827–835, 2009.","ista":"Sahli M, Millot C, Roques-Carmes C, Khan Malek C. 2009. Experimental analysis and numerical modelling of the forming process of polypropylene replicas of micro-cavities using hot embossing. Microsystem Technologies. 15(6), 827–835.","chicago":"Sahli, Mohamed, Christine Millot, Charles Roques-Carmes, and Chantal Khan Malek. “Experimental Analysis and Numerical Modelling of the Forming Process of Polypropylene Replicas of Micro-Cavities Using Hot Embossing.” <i>Microsystem Technologies</i>. Springer Nature, 2009. <a href=\"https://doi.org/10.1007/s00542-009-0813-6\">https://doi.org/10.1007/s00542-009-0813-6</a>.","apa":"Sahli, M., Millot, C., Roques-Carmes, C., &#38; Khan Malek, C. (2009). Experimental analysis and numerical modelling of the forming process of polypropylene replicas of micro-cavities using hot embossing. <i>Microsystem Technologies</i>. Springer Nature. <a href=\"https://doi.org/10.1007/s00542-009-0813-6\">https://doi.org/10.1007/s00542-009-0813-6</a>","ama":"Sahli M, Millot C, Roques-Carmes C, Khan Malek C. Experimental analysis and numerical modelling of the forming process of polypropylene replicas of micro-cavities using hot embossing. <i>Microsystem Technologies</i>. 2009;15(6):827-835. doi:<a href=\"https://doi.org/10.1007/s00542-009-0813-6\">10.1007/s00542-009-0813-6</a>"},"extern":"1","scopus_import":"1","article_processing_charge":"No","author":[{"last_name":"Sahli","full_name":"Sahli, Mohamed","first_name":"Mohamed"},{"full_name":"Millot, Christine","last_name":"Millot","first_name":"Christine"},{"id":"e2e68fc9-6505-11ef-a541-eb4e72cc3e82","first_name":"Charles","full_name":"Roques-Carmes, Charles","last_name":"Roques-Carmes"},{"first_name":"Chantal","full_name":"Khan Malek, Chantal","last_name":"Khan Malek"}],"date_updated":"2026-04-27T09:57:37Z","status":"public","type":"journal_article","oa_version":"None","publication_status":"published","doi":"10.1007/s00542-009-0813-6"}]
