---
_id: '3351'
abstract:
- lang: eng
  text: In two-player games on graph, the players construct an infinite path through
    the game graph and get a reward computed by a payoff function over infinite paths.
    Over weighted graphs, the typical and most studied payoff functions compute the
    limit-average or the discounted sum of the rewards along the path. Besides their
    simple definition, these two payoff functions enjoy the property that memoryless
    optimal strategies always exist. In an attempt to construct other simple payoff
    functions, we define a class of payoff functions which compute an (infinite) weighted
    average of the rewards. This new class contains both the limit-average and the
    discounted sum functions, and we show that they are the only members of this class
    which induce memoryless optimal strategies, showing that there is essentially
    no other simple payoff functions.
alternative_title:
- LNCS
article_processing_charge: No
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Laurent
  full_name: Doyen, Laurent
  last_name: Doyen
- first_name: Rohit
  full_name: Singh, Rohit
  last_name: Singh
citation:
  ama: 'Chatterjee K, Doyen L, Singh R. On memoryless quantitative objectives. In:
    Owe O, Steffen M, Telle JA, eds. Vol 6914. Springer; 2011:148-159. doi:<a href="https://doi.org/10.1007/978-3-642-22953-4_13">10.1007/978-3-642-22953-4_13</a>'
  apa: 'Chatterjee, K., Doyen, L., &#38; Singh, R. (2011). On memoryless quantitative
    objectives. In O. Owe, M. Steffen, &#38; J. A. Telle (Eds.) (Vol. 6914, pp. 148–159).
    Presented at the FCT: Fundamentals of Computation Theory, Oslo, Norway: Springer.
    <a href="https://doi.org/10.1007/978-3-642-22953-4_13">https://doi.org/10.1007/978-3-642-22953-4_13</a>'
  chicago: Chatterjee, Krishnendu, Laurent Doyen, and Rohit Singh. “On Memoryless
    Quantitative Objectives.” edited by Olaf Owe, Martin Steffen, and Jan Arne Telle,
    6914:148–59. Springer, 2011. <a href="https://doi.org/10.1007/978-3-642-22953-4_13">https://doi.org/10.1007/978-3-642-22953-4_13</a>.
  ieee: 'K. Chatterjee, L. Doyen, and R. Singh, “On memoryless quantitative objectives,”
    presented at the FCT: Fundamentals of Computation Theory, Oslo, Norway, 2011,
    vol. 6914, pp. 148–159.'
  ista: 'Chatterjee K, Doyen L, Singh R. 2011. On memoryless quantitative objectives.
    FCT: Fundamentals of Computation Theory, LNCS, vol. 6914, 148–159.'
  mla: Chatterjee, Krishnendu, et al. <i>On Memoryless Quantitative Objectives</i>.
    Edited by Olaf Owe et al., vol. 6914, Springer, 2011, pp. 148–59, doi:<a href="https://doi.org/10.1007/978-3-642-22953-4_13">10.1007/978-3-642-22953-4_13</a>.
  short: K. Chatterjee, L. Doyen, R. Singh, in:, O. Owe, M. Steffen, J.A. Telle (Eds.),
    Springer, 2011, pp. 148–159.
conference:
  end_date: 2011-08-25
  location: Oslo, Norway
  name: 'FCT: Fundamentals of Computation Theory'
  start_date: 2011-08-22
date_created: 2018-12-11T12:02:50Z
date_published: 2011-04-16T00:00:00Z
date_updated: 2025-06-11T08:12:32Z
day: '16'
department:
- _id: KrCh
doi: 10.1007/978-3-642-22953-4_13
editor:
- first_name: Olaf
  full_name: Owe, Olaf
  last_name: Owe
- first_name: Martin
  full_name: Steffen, Martin
  last_name: Steffen
- first_name: Jan Arne
  full_name: Telle, Jan Arne
  last_name: Telle
external_id:
  arxiv:
  - '1104.3211'
intvolume: '      6914'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1104.3211
month: '04'
oa: 1
oa_version: Submitted Version
page: 148 - 159
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: Springer
publist_id: '3270'
quality_controlled: '1'
scopus_import: '1'
status: public
title: On memoryless quantitative objectives
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 6914
year: '2011'
...
---
_id: '3352'
abstract:
- lang: eng
  text: Exploring the connection of biology with reactive systems to better understand
    living systems.
article_processing_charge: No
author:
- first_name: Jasmin
  full_name: Fisher, Jasmin
  last_name: Fisher
- first_name: David
  full_name: Harel, David
  last_name: Harel
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: Fisher J, Harel D, Henzinger TA. Biology as reactivity. <i>Communications of
    the ACM</i>. 2011;54(10):72-82. doi:<a href="https://doi.org/10.1145/2001269.2001289">10.1145/2001269.2001289</a>
  apa: Fisher, J., Harel, D., &#38; Henzinger, T. A. (2011). Biology as reactivity.
    <i>Communications of the ACM</i>. ACM. <a href="https://doi.org/10.1145/2001269.2001289">https://doi.org/10.1145/2001269.2001289</a>
  chicago: Fisher, Jasmin, David Harel, and Thomas A Henzinger. “Biology as Reactivity.”
    <i>Communications of the ACM</i>. ACM, 2011. <a href="https://doi.org/10.1145/2001269.2001289">https://doi.org/10.1145/2001269.2001289</a>.
  ieee: J. Fisher, D. Harel, and T. A. Henzinger, “Biology as reactivity,” <i>Communications
    of the ACM</i>, vol. 54, no. 10. ACM, pp. 72–82, 2011.
  ista: Fisher J, Harel D, Henzinger TA. 2011. Biology as reactivity. Communications
    of the ACM. 54(10), 72–82.
  mla: Fisher, Jasmin, et al. “Biology as Reactivity.” <i>Communications of the ACM</i>,
    vol. 54, no. 10, ACM, 2011, pp. 72–82, doi:<a href="https://doi.org/10.1145/2001269.2001289">10.1145/2001269.2001289</a>.
  short: J. Fisher, D. Harel, T.A. Henzinger, Communications of the ACM 54 (2011)
    72–82.
date_created: 2018-12-11T12:02:50Z
date_published: 2011-10-01T00:00:00Z
date_updated: 2025-09-30T09:06:32Z
day: '01'
department:
- _id: ToHe
doi: 10.1145/2001269.2001289
ec_funded: 1
external_id:
  isi:
  - '000296022500019'
intvolume: '        54'
isi: 1
issue: '10'
language:
- iso: eng
month: '10'
oa_version: None
page: 72 - 82
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication: Communications of the ACM
publication_status: published
publisher: ACM
publist_id: '3267'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Biology as reactivity
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 54
year: '2011'
...
---
_id: '3353'
abstract:
- lang: eng
  text: 'Compositional theories are crucial when designing large and complex systems
    from smaller components. In this work we propose such a theory for synchronous
    concurrent systems. Our approach follows so-called interface theories, which use
    game-theoretic interpretations of composition and refinement. These are appropriate
    for systems with distinct inputs and outputs, and explicit conditions on inputs
    that must be enforced during composition. Our interfaces model systems that execute
    in an infinite sequence of synchronous rounds. At each round, a contract must
    be satisfied. The contract is simply a relation specifying the set of valid input/output
    pairs. Interfaces can be composed by parallel, serial or feedback composition.
    A refinement relation between interfaces is defined, and shown to have two main
    properties: (1) it is preserved by composition, and (2) it is equivalent to substitutability,
    namely, the ability to replace an interface by another one in any context. Shared
    refinement and abstraction operators, corresponding to greatest lower and least
    upper bounds with respect to refinement, are also defined. Input-complete interfaces,
    that impose no restrictions on inputs, and deterministic interfaces, that produce
    a unique output for any legal input, are discussed as special cases, and an interesting
    duality between the two classes is exposed. A number of illustrative examples
    are provided, as well as algorithms to compute compositions, check refinement,
    and so on, for finite-state interfaces.'
article_number: '14'
article_processing_charge: No
author:
- first_name: Stavros
  full_name: Tripakis, Stavros
  last_name: Tripakis
- first_name: Ben
  full_name: Lickly, Ben
  last_name: Lickly
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Edward
  full_name: Lee, Edward
  last_name: Lee
citation:
  ama: Tripakis S, Lickly B, Henzinger TA, Lee E. A theory of synchronous relational
    interfaces. <i>ACM Transactions on Programming Languages and Systems (TOPLAS)</i>.
    2011;33(4). doi:<a href="https://doi.org/10.1145/1985342.1985345">10.1145/1985342.1985345</a>
  apa: Tripakis, S., Lickly, B., Henzinger, T. A., &#38; Lee, E. (2011). A theory
    of synchronous relational interfaces. <i>ACM Transactions on Programming Languages
    and Systems (TOPLAS)</i>. ACM. <a href="https://doi.org/10.1145/1985342.1985345">https://doi.org/10.1145/1985342.1985345</a>
  chicago: Tripakis, Stavros, Ben Lickly, Thomas A Henzinger, and Edward Lee. “A Theory
    of Synchronous Relational Interfaces.” <i>ACM Transactions on Programming Languages
    and Systems (TOPLAS)</i>. ACM, 2011. <a href="https://doi.org/10.1145/1985342.1985345">https://doi.org/10.1145/1985342.1985345</a>.
  ieee: S. Tripakis, B. Lickly, T. A. Henzinger, and E. Lee, “A theory of synchronous
    relational interfaces,” <i>ACM Transactions on Programming Languages and Systems
    (TOPLAS)</i>, vol. 33, no. 4. ACM, 2011.
  ista: Tripakis S, Lickly B, Henzinger TA, Lee E. 2011. A theory of synchronous relational
    interfaces. ACM Transactions on Programming Languages and Systems (TOPLAS). 33(4),
    14.
  mla: Tripakis, Stavros, et al. “A Theory of Synchronous Relational Interfaces.”
    <i>ACM Transactions on Programming Languages and Systems (TOPLAS)</i>, vol. 33,
    no. 4, 14, ACM, 2011, doi:<a href="https://doi.org/10.1145/1985342.1985345">10.1145/1985342.1985345</a>.
  short: S. Tripakis, B. Lickly, T.A. Henzinger, E. Lee, ACM Transactions on Programming
    Languages and Systems (TOPLAS) 33 (2011).
date_created: 2018-12-11T12:02:51Z
date_published: 2011-07-01T00:00:00Z
date_updated: 2025-09-30T09:05:52Z
day: '01'
ddc:
- '000'
- '005'
department:
- _id: ToHe
doi: 10.1145/1985342.1985345
ec_funded: 1
external_id:
  isi:
  - '000292766400003'
file:
- access_level: open_access
  checksum: 5d44a8aa81e33210649beae507602138
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:45Z
  date_updated: 2020-07-14T12:46:09Z
  file_id: '5235'
  file_name: IST-2012-85-v1+1_A_theory_of_synchronous_relational_interfaces.pdf
  file_size: 775662
  relation: main_file
file_date_updated: 2020-07-14T12:46:09Z
has_accepted_license: '1'
intvolume: '        33'
isi: 1
issue: '4'
language:
- iso: eng
month: '07'
oa: 1
oa_version: Submitted Version
project:
- _id: 25EFB36C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '215543'
  name: COMponent-Based Embedded Systems design Techniques
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication: ACM Transactions on Programming Languages and Systems (TOPLAS)
publication_status: published
publisher: ACM
publist_id: '3263'
pubrep_id: '85'
quality_controlled: '1'
scopus_import: '1'
status: public
title: A theory of synchronous relational interfaces
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 33
year: '2011'
...
---
_id: '3354'
abstract:
- lang: eng
  text: 'We consider two-player games played on a finite state space for an infinite
    number of rounds. The games are concurrent: in each round, the two players (player
    1 and player 2) choose their moves independently and simultaneously; the current
    state and the two moves determine the successor state. We consider ω-regular winning
    conditions specified as parity objectives. Both players are allowed to use randomization
    when choosing their moves. We study the computation of the limit-winning set of
    states, consisting of the states where the sup-inf value of the game for player
    1 is 1: in other words, a state is limit-winning if player 1 can ensure a probability
    of winning arbitrarily close to 1. We show that the limit-winning set can be computed
    in O(n2d+2) time, where n is the size of the game structure and 2d is the number
    of priorities (or colors). The membership problem of whether a state belongs to
    the limit-winning set can be decided in NP ∩ coNP. While this complexity is the
    same as for the simpler class of turn-based parity games, where in each state
    only one of the two players has a choice of moves, our algorithms are considerably
    more involved than those for turn-based games. This is because concurrent games
    do not satisfy two of the most fundamental properties of turn-based parity games.
    First, in concurrent games limit-winning strategies require randomization; and
    second, they require infinite memory.'
article_number: '28'
article_processing_charge: No
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Luca
  full_name: De Alfaro, Luca
  last_name: De Alfaro
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: Chatterjee K, De Alfaro L, Henzinger TA. Qualitative concurrent parity games.
    <i>ACM Transactions on Computational Logic (TOCL)</i>. 2011;12(4). doi:<a href="https://doi.org/10.1145/1970398.1970404">10.1145/1970398.1970404</a>
  apa: Chatterjee, K., De Alfaro, L., &#38; Henzinger, T. A. (2011). Qualitative concurrent
    parity games. <i>ACM Transactions on Computational Logic (TOCL)</i>. ACM. <a href="https://doi.org/10.1145/1970398.1970404">https://doi.org/10.1145/1970398.1970404</a>
  chicago: Chatterjee, Krishnendu, Luca De Alfaro, and Thomas A Henzinger. “Qualitative
    Concurrent Parity Games.” <i>ACM Transactions on Computational Logic (TOCL)</i>.
    ACM, 2011. <a href="https://doi.org/10.1145/1970398.1970404">https://doi.org/10.1145/1970398.1970404</a>.
  ieee: K. Chatterjee, L. De Alfaro, and T. A. Henzinger, “Qualitative concurrent
    parity games,” <i>ACM Transactions on Computational Logic (TOCL)</i>, vol. 12,
    no. 4. ACM, 2011.
  ista: Chatterjee K, De Alfaro L, Henzinger TA. 2011. Qualitative concurrent parity
    games. ACM Transactions on Computational Logic (TOCL). 12(4), 28.
  mla: Chatterjee, Krishnendu, et al. “Qualitative Concurrent Parity Games.” <i>ACM
    Transactions on Computational Logic (TOCL)</i>, vol. 12, no. 4, 28, ACM, 2011,
    doi:<a href="https://doi.org/10.1145/1970398.1970404">10.1145/1970398.1970404</a>.
  short: K. Chatterjee, L. De Alfaro, T.A. Henzinger, ACM Transactions on Computational
    Logic (TOCL) 12 (2011).
corr_author: '1'
date_created: 2018-12-11T12:02:51Z
date_published: 2011-07-04T00:00:00Z
date_updated: 2025-09-30T09:05:13Z
day: '04'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1145/1970398.1970404
external_id:
  isi:
  - '000296202300006'
intvolume: '        12'
isi: 1
issue: '4'
language:
- iso: eng
month: '07'
oa_version: None
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: ACM Transactions on Computational Logic (TOCL)
publication_status: published
publisher: ACM
publist_id: '3262'
quality_controlled: '1'
related_material:
  record:
  - id: '2054'
    relation: later_version
    status: public
scopus_import: '1'
status: public
title: Qualitative concurrent parity games
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 12
year: '2011'
...
---
_id: '3355'
abstract:
- lang: eng
  text: Byzantine Fault Tolerant (BFT) protocols aim to improve the reliability of
    distributed systems. They enable systems to tolerate arbitrary failures in a bounded
    number of nodes. BFT protocols are usually proven correct for certain safety and
    liveness properties. However, recent studies have shown that the performance of
    state-of-the-art BFT protocols decreases drastically in the presence of even a
    single malicious node. This motivates a formal quantitative analysis of BFT protocols
    to investigate their performance characteristics under different scenarios. We
    present HyPerf, a new hybrid methodology based on model checking and simulation
    techniques for evaluating the performance of BFT protocols. We build a transition
    system corresponding to a BFT protocol and systematically explore the set of behaviors
    allowed by the protocol. We associate certain timing information with different
    operations in the protocol, like cryptographic operations and message transmission.
    After an elaborate state exploration, we use the time information to evaluate
    the performance characteristics of the protocol using simulation techniques. We
    integrate our framework in Mace, a tool for building and verifying distributed
    systems. We evaluate the performance of PBFT using our framework. We describe
    two different use-cases of our methodology. For the benign operation of the protocol,
    we use the time information as random variables to compute the probability distribution
    of the execution times. In the presence of faults, we estimate the worst-case
    performance of the protocol for various attacks that can be employed by malicious
    nodes. Our results show the importance of hybrid techniques in systematically
    analyzing the performance of large-scale systems.
author:
- first_name: Raluca
  full_name: Halalai, Raluca
  id: 584C6850-E996-11E9-805B-F01764644770
  last_name: Halalai
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
citation:
  ama: 'Halalai R, Henzinger TA, Singh V. Quantitative evaluation of BFT protocols.
    In: IEEE; 2011:255-264. doi:<a href="https://doi.org/10.1109/QEST.2011.40">10.1109/QEST.2011.40</a>'
  apa: 'Halalai, R., Henzinger, T. A., &#38; Singh, V. (2011). Quantitative evaluation
    of BFT protocols (pp. 255–264). Presented at the QEST: Quantitative Evaluation
    of Systems, Aachen, Germany: IEEE. <a href="https://doi.org/10.1109/QEST.2011.40">https://doi.org/10.1109/QEST.2011.40</a>'
  chicago: Halalai, Raluca, Thomas A Henzinger, and Vasu Singh. “Quantitative Evaluation
    of BFT Protocols,” 255–64. IEEE, 2011. <a href="https://doi.org/10.1109/QEST.2011.40">https://doi.org/10.1109/QEST.2011.40</a>.
  ieee: 'R. Halalai, T. A. Henzinger, and V. Singh, “Quantitative evaluation of BFT
    protocols,” presented at the QEST: Quantitative Evaluation of Systems, Aachen,
    Germany, 2011, pp. 255–264.'
  ista: 'Halalai R, Henzinger TA, Singh V. 2011. Quantitative evaluation of BFT protocols.
    QEST: Quantitative Evaluation of Systems, 255–264.'
  mla: Halalai, Raluca, et al. <i>Quantitative Evaluation of BFT Protocols</i>. IEEE,
    2011, pp. 255–64, doi:<a href="https://doi.org/10.1109/QEST.2011.40">10.1109/QEST.2011.40</a>.
  short: R. Halalai, T.A. Henzinger, V. Singh, in:, IEEE, 2011, pp. 255–264.
conference:
  end_date: 2011-09-08
  location: Aachen, Germany
  name: 'QEST: Quantitative Evaluation of Systems'
  start_date: 2011-09-05
corr_author: '1'
date_created: 2018-12-11T12:02:51Z
date_published: 2011-10-13T00:00:00Z
date_updated: 2024-10-09T20:54:27Z
day: '13'
ddc:
- '000'
- '004'
department:
- _id: ToHe
doi: 10.1109/QEST.2011.40
file:
- access_level: open_access
  checksum: 4dc8750ab7921f51de992000b13d1b01
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:07:49Z
  date_updated: 2020-07-14T12:46:09Z
  file_id: '4648'
  file_name: IST-2012-84-v1+1_Quantitative_evaluation_of_BFT_protocols.pdf
  file_size: 272017
  relation: main_file
file_date_updated: 2020-07-14T12:46:09Z
has_accepted_license: '1'
language:
- iso: eng
month: '10'
oa: 1
oa_version: Submitted Version
page: 255 - 264
publication_status: published
publisher: IEEE
publist_id: '3260'
pubrep_id: '84'
quality_controlled: '1'
scopus_import: 1
status: public
title: Quantitative evaluation of BFT protocols
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '3356'
abstract:
- lang: eng
  text: There is recently a significant effort to add quantitative objectives to formal
    verification and synthesis. We introduce and investigate the extension of temporal
    logics with quantitative atomic assertions, aiming for a general and flexible
    framework for quantitative-oriented specifications. In the heart of quantitative
    objectives lies the accumulation of values along a computation. It is either the
    accumulated summation, as with the energy objectives, or the accumulated average,
    as with the mean-payoff objectives. We investigate the extension of temporal logics
    with the prefix-accumulation assertions Sum(v) ≥ c and Avg(v) ≥ c, where v is
    a numeric variable of the system, c is a constant rational number, and Sum(v)
    and Avg(v) denote the accumulated sum and average of the values of v from the
    beginning of the computation up to the current point of time. We also allow the
    path-accumulation assertions LimInfAvg(v) ≥ c and LimSupAvg(v) ≥ c, referring
    to the average value along an entire computation. We study the border of decidability
    for extensions of various temporal logics. In particular, we show that extending
    the fragment of CTL that has only the EX, EF, AX, and AG temporal modalities by
    prefix-accumulation assertions and extending LTL with path-accumulation assertions,
    result in temporal logics whose model-checking problem is decidable. The extended
    logics allow to significantly extend the currently known energy and mean-payoff
    objectives. Moreover, the prefix-accumulation assertions may be refined with "controlled-accumulation",
    allowing, for example, to specify constraints on the average waiting time between
    a request and a grant. On the negative side, we show that the fragment we point
    to is, in a sense, the maximal logic whose extension with prefix-accumulation
    assertions permits a decidable model-checking procedure. Extending a temporal
    logic that has the EG or EU modalities, and in particular CTL and LTL, makes the
    problem undecidable.
article_number: '5970226'
article_processing_charge: No
author:
- first_name: Udi
  full_name: Boker, Udi
  id: 31E297B6-F248-11E8-B48F-1D18A9856A87
  last_name: Boker
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Orna
  full_name: Kupferman, Orna
  last_name: Kupferman
citation:
  ama: 'Boker U, Chatterjee K, Henzinger TA, Kupferman O. Temporal specifications
    with accumulative values. In: IEEE; 2011. doi:<a href="https://doi.org/10.1109/LICS.2011.33">10.1109/LICS.2011.33</a>'
  apa: 'Boker, U., Chatterjee, K., Henzinger, T. A., &#38; Kupferman, O. (2011). Temporal
    specifications with accumulative values. Presented at the LICS: Logic in Computer
    Science, Toronto, Canada: IEEE. <a href="https://doi.org/10.1109/LICS.2011.33">https://doi.org/10.1109/LICS.2011.33</a>'
  chicago: Boker, Udi, Krishnendu Chatterjee, Thomas A Henzinger, and Orna Kupferman.
    “Temporal Specifications with Accumulative Values.” IEEE, 2011. <a href="https://doi.org/10.1109/LICS.2011.33">https://doi.org/10.1109/LICS.2011.33</a>.
  ieee: 'U. Boker, K. Chatterjee, T. A. Henzinger, and O. Kupferman, “Temporal specifications
    with accumulative values,” presented at the LICS: Logic in Computer Science, Toronto,
    Canada, 2011.'
  ista: 'Boker U, Chatterjee K, Henzinger TA, Kupferman O. 2011. Temporal specifications
    with accumulative values. LICS: Logic in Computer Science, 5970226.'
  mla: Boker, Udi, et al. <i>Temporal Specifications with Accumulative Values</i>.
    5970226, IEEE, 2011, doi:<a href="https://doi.org/10.1109/LICS.2011.33">10.1109/LICS.2011.33</a>.
  short: U. Boker, K. Chatterjee, T.A. Henzinger, O. Kupferman, in:, IEEE, 2011.
conference:
  end_date: 2011-06-24
  location: Toronto, Canada
  name: 'LICS: Logic in Computer Science'
  start_date: 2011-06-21
date_created: 2018-12-11T12:02:52Z
date_published: 2011-06-21T00:00:00Z
date_updated: 2025-09-30T09:27:30Z
day: '21'
ddc:
- '000'
- '004'
department:
- _id: ToHe
- _id: KrCh
doi: 10.1109/LICS.2011.33
ec_funded: 1
external_id:
  isi:
  - '000297350400007'
file:
- access_level: open_access
  checksum: 792128f5455f0f40f1105f0398e05fa9
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:12:42Z
  date_updated: 2020-07-14T12:46:09Z
  file_id: '4960'
  file_name: IST-2012-83-v1+1_Temporal_specifications_with_accumulative_values.pdf
  file_size: 225426
  relation: main_file
file_date_updated: 2020-07-14T12:46:09Z
has_accepted_license: '1'
isi: 1
language:
- iso: eng
month: '06'
oa: 1
oa_version: Submitted Version
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EFB36C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '215543'
  name: COMponent-Based Embedded Systems design Techniques
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: IEEE
publist_id: '3259'
pubrep_id: '83'
related_material:
  record:
  - id: '5385'
    relation: earlier_version
    status: public
  - id: '2038'
    relation: later_version
    status: public
scopus_import: '1'
status: public
title: Temporal specifications with accumulative values
type: conference
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
year: '2011'
...
---
_id: '3357'
abstract:
- lang: eng
  text: We consider two-player graph games whose objectives are request-response condition,
    i.e conjunctions of conditions of the form "if a state with property Rq is visited,
    then later a state with property Rp is visited". The winner of such games can
    be decided in EXPTIME and the problem is known to be NP-hard. In this paper, we
    close this gap by showing that this problem is, in fact, EXPTIME-complete. We
    show that the problem becomes PSPACE-complete if we only consider games played
    on DAGs, and NP-complete or PTIME-complete if there is only one player (depending
    on whether he wants to enforce or spoil the request-response condition). We also
    present near-optimal bounds on the memory needed to design winning strategies
    for each player, in each case.
alternative_title:
- LNCS
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Florian
  full_name: Horn, Florian
  id: 37327ACE-F248-11E8-B48F-1D18A9856A87
  last_name: Horn
citation:
  ama: 'Chatterjee K, Henzinger TA, Horn F. The complexity of request-response games.
    In: Dediu A-H, Inenaga S, Martín-Vide C, eds. Vol 6638. Springer; 2011:227-237.
    doi:<a href="https://doi.org/10.1007/978-3-642-21254-3_17">10.1007/978-3-642-21254-3_17</a>'
  apa: 'Chatterjee, K., Henzinger, T. A., &#38; Horn, F. (2011). The complexity of
    request-response games. In A.-H. Dediu, S. Inenaga, &#38; C. Martín-Vide (Eds.)
    (Vol. 6638, pp. 227–237). Presented at the LATA: Language and Automata Theory
    and Applications, Tarragona, Spain: Springer. <a href="https://doi.org/10.1007/978-3-642-21254-3_17">https://doi.org/10.1007/978-3-642-21254-3_17</a>'
  chicago: Chatterjee, Krishnendu, Thomas A Henzinger, and Florian Horn. “The Complexity
    of Request-Response Games.” edited by Adrian-Horia Dediu, Shunsuke Inenaga, and
    Carlos Martín-Vide, 6638:227–37. Springer, 2011. <a href="https://doi.org/10.1007/978-3-642-21254-3_17">https://doi.org/10.1007/978-3-642-21254-3_17</a>.
  ieee: 'K. Chatterjee, T. A. Henzinger, and F. Horn, “The complexity of request-response
    games,” presented at the LATA: Language and Automata Theory and Applications,
    Tarragona, Spain, 2011, vol. 6638, pp. 227–237.'
  ista: 'Chatterjee K, Henzinger TA, Horn F. 2011. The complexity of request-response
    games. LATA: Language and Automata Theory and Applications, LNCS, vol. 6638, 227–237.'
  mla: Chatterjee, Krishnendu, et al. <i>The Complexity of Request-Response Games</i>.
    Edited by Adrian-Horia Dediu et al., vol. 6638, Springer, 2011, pp. 227–37, doi:<a
    href="https://doi.org/10.1007/978-3-642-21254-3_17">10.1007/978-3-642-21254-3_17</a>.
  short: K. Chatterjee, T.A. Henzinger, F. Horn, in:, A.-H. Dediu, S. Inenaga, C.
    Martín-Vide (Eds.), Springer, 2011, pp. 227–237.
conference:
  end_date: 2011-05-31
  location: Tarragona, Spain
  name: 'LATA: Language and Automata Theory and Applications'
  start_date: 2011-05-26
corr_author: '1'
date_created: 2018-12-11T12:02:52Z
date_published: 2011-01-01T00:00:00Z
date_updated: 2024-10-09T20:54:27Z
day: '01'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1007/978-3-642-21254-3_17
editor:
- first_name: Adrian-Horia
  full_name: Dediu, Adrian-Horia
  last_name: Dediu
- first_name: Shunsuke
  full_name: Inenaga, Shunsuke
  last_name: Inenaga
- first_name: Carlos
  full_name: Martín-Vide, Carlos
  last_name: Martín-Vide
intvolume: '      6638'
language:
- iso: eng
month: '01'
oa_version: None
page: 227 - 237
publication_status: published
publisher: Springer
publist_id: '3258'
quality_controlled: '1'
scopus_import: 1
status: public
title: The complexity of request-response games
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6638
year: '2011'
...
---
_id: '3358'
abstract:
- lang: eng
  text: The static scheduling problem often arises as a fundamental problem in real-time
    systems and grid computing. We consider the problem of statically scheduling a
    large job expressed as a task graph on a large number of computing nodes, such
    as a data center. This paper solves the large-scale static scheduling problem
    using abstraction refinement, a technique commonly used in formal verification
    to efficiently solve computationally hard problems. A scheduler based on abstraction
    refinement first attempts to solve the scheduling problem with abstract representations
    of the job and the computing resources. As abstract representations are generally
    small, the scheduling can be done reasonably fast. If the obtained schedule does
    not meet specified quality conditions (like data center utilization or schedule
    makespan) then the scheduler refines the job and data center abstractions and,
    again solves the scheduling problem. We develop different schedulers based on
    abstraction refinement. We implemented these schedulers and used them to schedule
    task graphs from various computing domains on simulated data centers with realistic
    topologies. We compared the speed of scheduling and the quality of the produced
    schedules with our abstraction refinement schedulers against a baseline scheduler
    that does not use any abstraction. We conclude that abstraction refinement techniques
    give a significant speed-up compared to traditional static scheduling heuristics,
    at a reasonable cost in the quality of the produced schedules. We further used
    our static schedulers in an actual system that we deployed on Amazon EC2 and compared
    it against the Hadoop dynamic scheduler for large MapReduce jobs. Our experiments
    indicate that there is great potential for static scheduling techniques.
article_processing_charge: No
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Vasu
  full_name: Singh, Vasu
  id: 4DAE2708-F248-11E8-B48F-1D18A9856A87
  last_name: Singh
- first_name: Thomas
  full_name: Wies, Thomas
  id: 447BFB88-F248-11E8-B48F-1D18A9856A87
  last_name: Wies
- first_name: Damien
  full_name: Zufferey, Damien
  id: 4397AC76-F248-11E8-B48F-1D18A9856A87
  last_name: Zufferey
  orcid: 0000-0002-3197-8736
citation:
  ama: 'Henzinger TA, Singh V, Wies T, Zufferey D. Scheduling large jobs by abstraction
    refinement. In: ACM; 2011:329-342. doi:<a href="https://doi.org/10.1145/1966445.1966476">10.1145/1966445.1966476</a>'
  apa: 'Henzinger, T. A., Singh, V., Wies, T., &#38; Zufferey, D. (2011). Scheduling
    large jobs by abstraction refinement (pp. 329–342). Presented at the EuroSys,
    Salzburg, Austria: ACM. <a href="https://doi.org/10.1145/1966445.1966476">https://doi.org/10.1145/1966445.1966476</a>'
  chicago: Henzinger, Thomas A, Vasu Singh, Thomas Wies, and Damien Zufferey. “Scheduling
    Large Jobs by Abstraction Refinement,” 329–42. ACM, 2011. <a href="https://doi.org/10.1145/1966445.1966476">https://doi.org/10.1145/1966445.1966476</a>.
  ieee: T. A. Henzinger, V. Singh, T. Wies, and D. Zufferey, “Scheduling large jobs
    by abstraction refinement,” presented at the EuroSys, Salzburg, Austria, 2011,
    pp. 329–342.
  ista: Henzinger TA, Singh V, Wies T, Zufferey D. 2011. Scheduling large jobs by
    abstraction refinement. EuroSys, 329–342.
  mla: Henzinger, Thomas A., et al. <i>Scheduling Large Jobs by Abstraction Refinement</i>.
    ACM, 2011, pp. 329–42, doi:<a href="https://doi.org/10.1145/1966445.1966476">10.1145/1966445.1966476</a>.
  short: T.A. Henzinger, V. Singh, T. Wies, D. Zufferey, in:, ACM, 2011, pp. 329–342.
conference:
  end_date: 2011-04-13
  location: Salzburg, Austria
  name: EuroSys
  start_date: 2011-04-10
corr_author: '1'
date_created: 2018-12-11T12:02:53Z
date_published: 2011-04-10T00:00:00Z
date_updated: 2024-10-09T20:54:26Z
day: '10'
department:
- _id: ToHe
doi: 10.1145/1966445.1966476
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://cs.nyu.edu/wies/publ/scheduling_large_jobs_by_abstraction_refinement.pdf
month: '04'
oa: 1
oa_version: Published Version
page: 329 - 342
publication_status: published
publisher: ACM
publist_id: '3257'
quality_controlled: '1'
scopus_import: 1
status: public
title: Scheduling large jobs by abstraction refinement
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '3359'
abstract:
- lang: eng
  text: "Motivated by improvements in constraint-solving technology and by the increase
    of routinely available computational power, partial-program synthesis is emerging
    as an effective approach for increasing programmer productivity. The goal of the
    approach is to allow the programmer to specify a part of her intent imperatively
    (that is, give a partial program) and a part of her intent declaratively, by specifying
    which conditions need to be achieved or maintained. The task of the synthesizer
    is to construct a program that satisfies the specification. As an example, consider
    a partial program where threads access shared data without using any synchronization
    mechanism, and a declarative specification that excludes data races and deadlocks.
    The task of the synthesizer is then to place locks into the program code in order
    for the program to meet the specification.\r\n\r\nIn this paper, we argue that
    quantitative objectives are needed in partial-program synthesis in order to produce
    higher-quality programs, while enabling simpler specifications. Returning to the
    example, the synthesizer could construct a naive solution that uses one global
    lock for shared data. This can be prevented either by constraining the solution
    space further (which is error-prone and partly defeats the point of synthesis),
    or by optimizing a quantitative objective that models performance. Other quantitative
    notions useful in synthesis include fault tolerance, robustness, resource (memory,
    power) consumption, and information flow."
acknowledgement: This work was partially supported by the ERC Advanced Grant QUAREM,
  the FWF NFN Grant S11402-N23 (RiSE), and the EU NOE Grant ArtistDesign.
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Cerny P, Henzinger TA. From boolean to quantitative synthesis. In: ACM; 2011:149-154.
    doi:<a href="https://doi.org/10.1145/2038642.2038666">10.1145/2038642.2038666</a>'
  apa: 'Cerny, P., &#38; Henzinger, T. A. (2011). From boolean to quantitative synthesis
    (pp. 149–154). Presented at the EMSOFT: Embedded Software , Taipei; Taiwan: ACM.
    <a href="https://doi.org/10.1145/2038642.2038666">https://doi.org/10.1145/2038642.2038666</a>'
  chicago: Cerny, Pavol, and Thomas A Henzinger. “From Boolean to Quantitative Synthesis,”
    149–54. ACM, 2011. <a href="https://doi.org/10.1145/2038642.2038666">https://doi.org/10.1145/2038642.2038666</a>.
  ieee: 'P. Cerny and T. A. Henzinger, “From boolean to quantitative synthesis,” presented
    at the EMSOFT: Embedded Software , Taipei; Taiwan, 2011, pp. 149–154.'
  ista: 'Cerny P, Henzinger TA. 2011. From boolean to quantitative synthesis. EMSOFT:
    Embedded Software , 149–154.'
  mla: Cerny, Pavol, and Thomas A. Henzinger. <i>From Boolean to Quantitative Synthesis</i>.
    ACM, 2011, pp. 149–54, doi:<a href="https://doi.org/10.1145/2038642.2038666">10.1145/2038642.2038666</a>.
  short: P. Cerny, T.A. Henzinger, in:, ACM, 2011, pp. 149–154.
conference:
  end_date: 2011-10-14
  location: Taipei; Taiwan
  name: 'EMSOFT: Embedded Software '
  start_date: 2011-10-09
corr_author: '1'
date_created: 2018-12-11T12:02:53Z
date_published: 2011-10-09T00:00:00Z
date_updated: 2024-10-21T06:03:04Z
day: '09'
department:
- _id: ToHe
doi: 10.1145/2038642.2038666
ec_funded: 1
language:
- iso: eng
month: '10'
oa_version: None
page: 149 - 154
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
publication_status: published
publisher: ACM
publist_id: '3256'
quality_controlled: '1'
scopus_import: '1'
status: public
title: From boolean to quantitative synthesis
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '3360'
abstract:
- lang: eng
  text: 'A discounted-sum automaton (NDA) is a nondeterministic finite automaton with
    edge weights, which values a run by the discounted sum of visited edge weights.
    More precisely, the weight in the i-th position of the run is divided by lambda^i,
    where the discount factor lambda is a fixed rational number greater than 1. Discounted
    summation is a common and useful measuring scheme, especially for infinite sequences,
    which reflects the assumption that earlier weights are more important than later
    weights. Determinizing automata is often essential, for example, in formal verification,
    where there are polynomial algorithms for comparing two deterministic NDAs, while
    the equivalence problem for NDAs is not known to be decidable. Unfortunately,
    however, discounted-sum automata are, in general, not determinizable: it is currently
    known that for every rational discount factor 1 &lt; lambda &lt; 2, there is an
    NDA with lambda (denoted lambda-NDA) that cannot be determinized. We provide positive
    news, showing that every NDA with an integral factor is determinizable. We also
    complete the picture by proving that the integers characterize exactly the discount
    factors that guarantee determinizability: we show that for every non-integral
    rational factor lambda, there is a nondeterminizable lambda-NDA. Finally, we prove
    that the class of NDAs with integral discount factors enjoys closure under the
    algebraic operations min, max, addition, and subtraction, which is not the case
    for general NDAs nor for deterministic NDAs. This shows that for integral discount
    factors, the class of NDAs forms an attractive specification formalism in quantitative
    formal verification. All our results hold equally for automata over finite words
    and for automata over infinite words. '
alternative_title:
- LIPIcs
author:
- first_name: Udi
  full_name: Boker, Udi
  id: 31E297B6-F248-11E8-B48F-1D18A9856A87
  last_name: Boker
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Boker U, Henzinger TA. Determinizing discounted-sum automata. In: Vol 12.
    Springer; 2011:82-96. doi:<a href="https://doi.org/10.4230/LIPIcs.CSL.2011.82">10.4230/LIPIcs.CSL.2011.82</a>'
  apa: 'Boker, U., &#38; Henzinger, T. A. (2011). Determinizing discounted-sum automata
    (Vol. 12, pp. 82–96). Presented at the CSL: Computer Science Logic, Bergen, Norway:
    Springer. <a href="https://doi.org/10.4230/LIPIcs.CSL.2011.82">https://doi.org/10.4230/LIPIcs.CSL.2011.82</a>'
  chicago: Boker, Udi, and Thomas A Henzinger. “Determinizing Discounted-Sum Automata,”
    12:82–96. Springer, 2011. <a href="https://doi.org/10.4230/LIPIcs.CSL.2011.82">https://doi.org/10.4230/LIPIcs.CSL.2011.82</a>.
  ieee: 'U. Boker and T. A. Henzinger, “Determinizing discounted-sum automata,” presented
    at the CSL: Computer Science Logic, Bergen, Norway, 2011, vol. 12, pp. 82–96.'
  ista: 'Boker U, Henzinger TA. 2011. Determinizing discounted-sum automata. CSL:
    Computer Science Logic, LIPIcs, vol. 12, 82–96.'
  mla: Boker, Udi, and Thomas A. Henzinger. <i>Determinizing Discounted-Sum Automata</i>.
    Vol. 12, Springer, 2011, pp. 82–96, doi:<a href="https://doi.org/10.4230/LIPIcs.CSL.2011.82">10.4230/LIPIcs.CSL.2011.82</a>.
  short: U. Boker, T.A. Henzinger, in:, Springer, 2011, pp. 82–96.
conference:
  end_date: 2011-09-15
  location: Bergen, Norway
  name: 'CSL: Computer Science Logic'
  start_date: 2011-09-12
date_created: 2018-12-11T12:02:53Z
date_published: 2011-08-31T00:00:00Z
date_updated: 2021-01-12T07:42:56Z
day: '31'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.4230/LIPIcs.CSL.2011.82
ec_funded: 1
file:
- access_level: open_access
  checksum: 250603c6be8ccad4fbd4d7b24221f0ee
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:10:17Z
  date_updated: 2020-07-14T12:46:10Z
  file_id: '4803'
  file_name: IST-2012-82-v1+1_Determinizing_discounted-sum_automata.pdf
  file_size: 504270
  relation: main_file
file_date_updated: 2020-07-14T12:46:10Z
has_accepted_license: '1'
intvolume: '        12'
language:
- iso: eng
license: https://creativecommons.org/licenses/by-nc-nd/4.0/
month: '08'
oa: 1
oa_version: Published Version
page: 82 - 96
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EFB36C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '215543'
  name: COMponent-Based Embedded Systems design Techniques
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
publication_status: published
publisher: Springer
publist_id: '3255'
pubrep_id: '82'
quality_controlled: '1'
scopus_import: 1
status: public
title: Determinizing discounted-sum automata
tmp:
  image: /images/cc_by_nc_nd.png
  legal_code_url: https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
  name: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
    (CC BY-NC-ND 4.0)
  short: CC BY-NC-ND (4.0)
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 12
year: '2011'
...
---
_id: '3361'
abstract:
- lang: eng
  text: In this paper, we investigate the computational complexity of quantitative
    information flow (QIF) problems. Information-theoretic quantitative relaxations
    of noninterference (based on Shannon entropy)have been introduced to enable more
    fine-grained reasoning about programs in situations where limited information
    flow is acceptable. The QIF bounding problem asks whether the information flow
    in a given program is bounded by a constant $d$. Our first result is that the
    QIF bounding problem is PSPACE-complete. The QIF memoryless synthesis problem
    asks whether it is possible to resolve nondeterministic choices in a given partial
    program in such a way that in the resulting deterministic program, the quantitative
    information flow is bounded by a given constant $d$. Our second result is that
    the QIF memoryless synthesis problem is also EXPTIME-complete. The QIF memoryless
    synthesis problem generalizes to QIF general synthesis problem which does not
    impose the memoryless requirement (that is, by allowing the synthesized program
    to have more variables then the original partial program). Our third result is
    that the QIF general synthesis problem is EXPTIME-hard.
article_processing_charge: No
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Cerny P, Chatterjee K, Henzinger TA. The complexity of quantitative information
    flow problems. In: IEEE; 2011:205-217. doi:<a href="https://doi.org/10.1109/CSF.2011.21">10.1109/CSF.2011.21</a>'
  apa: 'Cerny, P., Chatterjee, K., &#38; Henzinger, T. A. (2011). The complexity of
    quantitative information flow problems (pp. 205–217). Presented at the CSF: Computer
    Security Foundations, Cernay-la-Ville, France: IEEE. <a href="https://doi.org/10.1109/CSF.2011.21">https://doi.org/10.1109/CSF.2011.21</a>'
  chicago: Cerny, Pavol, Krishnendu Chatterjee, and Thomas A Henzinger. “The Complexity
    of Quantitative Information Flow Problems,” 205–17. IEEE, 2011. <a href="https://doi.org/10.1109/CSF.2011.21">https://doi.org/10.1109/CSF.2011.21</a>.
  ieee: 'P. Cerny, K. Chatterjee, and T. A. Henzinger, “The complexity of quantitative
    information flow problems,” presented at the CSF: Computer Security Foundations,
    Cernay-la-Ville, France, 2011, pp. 205–217.'
  ista: 'Cerny P, Chatterjee K, Henzinger TA. 2011. The complexity of quantitative
    information flow problems. CSF: Computer Security Foundations, 205–217.'
  mla: Cerny, Pavol, et al. <i>The Complexity of Quantitative Information Flow Problems</i>.
    IEEE, 2011, pp. 205–17, doi:<a href="https://doi.org/10.1109/CSF.2011.21">10.1109/CSF.2011.21</a>.
  short: P. Cerny, K. Chatterjee, T.A. Henzinger, in:, IEEE, 2011, pp. 205–217.
conference:
  end_date: 2011-06-29
  location: Cernay-la-Ville, France
  name: 'CSF: Computer Security Foundations'
  start_date: 2011-06-27
corr_author: '1'
date_created: 2018-12-11T12:02:54Z
date_published: 2011-06-27T00:00:00Z
date_updated: 2025-09-30T09:04:15Z
day: '27'
ddc:
- '000'
- '005'
department:
- _id: ToHe
- _id: KrCh
doi: 10.1109/CSF.2011.21
ec_funded: 1
external_id:
  isi:
  - '000300766400014'
file:
- access_level: open_access
  checksum: 1a25be0c62459fc7640db88af08ff63a
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:10:07Z
  date_updated: 2020-07-14T12:46:10Z
  file_id: '4792'
  file_name: IST-2012-81-v1+1_The_complexity_of_quantitative_information_flow_problems.pdf
  file_size: 299069
  relation: main_file
file_date_updated: 2020-07-14T12:46:10Z
has_accepted_license: '1'
isi: 1
language:
- iso: eng
month: '06'
oa: 1
oa_version: Submitted Version
page: 205 - 217
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: IEEE
publist_id: '3254'
pubrep_id: '81'
quality_controlled: '1'
scopus_import: '1'
status: public
title: The complexity of quantitative information flow problems
type: conference
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
year: '2011'
...
---
_id: '3362'
abstract:
- lang: eng
  text: State-transition systems communicating by shared variables have been the underlying
    model of choice for applications of model checking. Such formalisms, however,
    have difficulty with modeling process creation or death and communication reconfigurability.
    Here, we introduce “dynamic reactive modules” (DRM), a state-transition modeling
    formalism that supports dynamic reconfiguration and creation/death of processes.
    The resulting formalism supports two types of variables, data variables and reference
    variables. Reference variables enable changing the connectivity between processes
    and referring to instances of processes. We show how this new formalism supports
    parallel composition and refinement through trace containment. DRM provide a natural
    language for modeling (and ultimately reasoning about) biological systems and
    multiple threads communicating through shared variables.
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Jasmin
  full_name: Fisher, Jasmin
  last_name: Fisher
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Dejan
  full_name: Nickovic, Dejan
  id: 41BCEE5C-F248-11E8-B48F-1D18A9856A87
  last_name: Nickovic
- first_name: Nir
  full_name: Piterman, Nir
  last_name: Piterman
- first_name: Anmol
  full_name: Singh, Anmol
  last_name: Singh
- first_name: Moshe
  full_name: Vardi, Moshe
  last_name: Vardi
citation:
  ama: 'Fisher J, Henzinger TA, Nickovic D, Piterman N, Singh A, Vardi M. Dynamic
    reactive modules. In: Vol 6901. Schloss Dagstuhl - Leibniz-Zentrum für Informatik;
    2011:404-418. doi:<a href="https://doi.org/10.1007/978-3-642-23217-6_27">10.1007/978-3-642-23217-6_27</a>'
  apa: 'Fisher, J., Henzinger, T. A., Nickovic, D., Piterman, N., Singh, A., &#38;
    Vardi, M. (2011). Dynamic reactive modules (Vol. 6901, pp. 404–418). Presented
    at the CONCUR: Concurrency Theory, Aachen, Germany: Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik. <a href="https://doi.org/10.1007/978-3-642-23217-6_27">https://doi.org/10.1007/978-3-642-23217-6_27</a>'
  chicago: Fisher, Jasmin, Thomas A Henzinger, Dejan Nickovic, Nir Piterman, Anmol
    Singh, and Moshe Vardi. “Dynamic Reactive Modules,” 6901:404–18. Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik, 2011. <a href="https://doi.org/10.1007/978-3-642-23217-6_27">https://doi.org/10.1007/978-3-642-23217-6_27</a>.
  ieee: 'J. Fisher, T. A. Henzinger, D. Nickovic, N. Piterman, A. Singh, and M. Vardi,
    “Dynamic reactive modules,” presented at the CONCUR: Concurrency Theory, Aachen,
    Germany, 2011, vol. 6901, pp. 404–418.'
  ista: 'Fisher J, Henzinger TA, Nickovic D, Piterman N, Singh A, Vardi M. 2011. Dynamic
    reactive modules. CONCUR: Concurrency Theory, LNCS, vol. 6901, 404–418.'
  mla: Fisher, Jasmin, et al. <i>Dynamic Reactive Modules</i>. Vol. 6901, Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik, 2011, pp. 404–18, doi:<a href="https://doi.org/10.1007/978-3-642-23217-6_27">10.1007/978-3-642-23217-6_27</a>.
  short: J. Fisher, T.A. Henzinger, D. Nickovic, N. Piterman, A. Singh, M. Vardi,
    in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011, pp. 404–418.
conference:
  end_date: 2011-09-09
  location: Aachen, Germany
  name: 'CONCUR: Concurrency Theory'
  start_date: 2011-09-06
date_created: 2018-12-11T12:02:54Z
date_published: 2011-01-01T00:00:00Z
date_updated: 2021-01-12T07:42:57Z
day: '01'
ddc:
- '000'
department:
- _id: ToHe
doi: 10.1007/978-3-642-23217-6_27
ec_funded: 1
file:
- access_level: open_access
  checksum: 6bf2453d8e52e979ddb58d17325bad26
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-19T16:17:48Z
  date_updated: 2020-07-14T12:46:10Z
  file_id: '7870'
  file_name: 2011_CONCUR_Fisher.pdf
  file_size: 337125
  relation: main_file
file_date_updated: 2020-07-14T12:46:10Z
has_accepted_license: '1'
intvolume: '      6901'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 404 - 418
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '3253'
quality_controlled: '1'
scopus_import: 1
status: public
title: Dynamic reactive modules
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 6901
year: '2011'
...
---
_id: '3363'
abstract:
- lang: eng
  text: We consider probabilistic automata on infinite words with acceptance defined
    by safety, reachability, Büchi, coBüchi, and limit-average conditions. We consider
    quantitative and qualitative decision problems. We present extensions and adaptations
    of proofs for probabilistic finite automata and present a complete characterization
    of the decidability and undecidability frontier of the quantitative and qualitative
    decision problems for probabilistic automata on infinite words.
article_number: '1104.0127'
article_processing_charge: No
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Mathieu
  full_name: Tracol, Mathieu
  id: 3F54FA38-F248-11E8-B48F-1D18A9856A87
  last_name: Tracol
citation:
  ama: Chatterjee K, Henzinger TA, Tracol M. The decidability frontier for probabilistic
    automata on infinite words. doi:<a href="https://doi.org/10.48550/arXiv.1104.0127">10.48550/arXiv.1104.0127</a>
  apa: Chatterjee, K., Henzinger, T. A., &#38; Tracol, M. (n.d.). The decidability
    frontier for probabilistic automata on infinite words. ArXiv. <a href="https://doi.org/10.48550/arXiv.1104.0127">https://doi.org/10.48550/arXiv.1104.0127</a>
  chicago: Chatterjee, Krishnendu, Thomas A Henzinger, and Mathieu Tracol. “The Decidability
    Frontier for Probabilistic Automata on Infinite Words.” ArXiv, n.d. <a href="https://doi.org/10.48550/arXiv.1104.0127">https://doi.org/10.48550/arXiv.1104.0127</a>.
  ieee: K. Chatterjee, T. A. Henzinger, and M. Tracol, “The decidability frontier
    for probabilistic automata on infinite words.” ArXiv.
  ista: Chatterjee K, Henzinger TA, Tracol M. The decidability frontier for probabilistic
    automata on infinite words. 1104.0127.
  mla: Chatterjee, Krishnendu, et al. <i>The Decidability Frontier for Probabilistic
    Automata on Infinite Words</i>. 1104.0127, ArXiv, doi:<a href="https://doi.org/10.48550/arXiv.1104.0127">10.48550/arXiv.1104.0127</a>.
  short: K. Chatterjee, T.A. Henzinger, M. Tracol, (n.d.).
corr_author: '1'
date_created: 2018-12-11T12:02:54Z
date_published: 2011-04-01T00:00:00Z
date_updated: 2025-06-26T09:19:59Z
day: '01'
department:
- _id: KrCh
- _id: ToHe
doi: 10.48550/arXiv.1104.0127
ec_funded: 1
external_id:
  arxiv:
  - '1104.0127'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1104.0127
month: '04'
oa: 1
oa_version: Preprint
page: '19'
project:
- _id: 25EFB36C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '215543'
  name: COMponent-Based Embedded Systems design Techniques
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
publication_status: submitted
publisher: ArXiv
publist_id: '3251'
status: public
title: The decidability frontier for probabilistic automata on infinite words
type: preprint
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '3364'
abstract:
- lang: eng
  text: Molecular noise, which arises from the randomness of the discrete events in
    the cell, significantly influences fundamental biological processes. Discrete-state
    continuous-time stochastic models (CTMC) can be used to describe such effects,
    but the calculation of the probabilities of certain events is computationally
    expensive. We present a comparison of two analysis approaches for CTMC. On one
    hand, we estimate the probabilities of interest using repeated Gillespie simulation
    and determine the statistical accuracy that we obtain. On the other hand, we apply
    a numerical reachability analysis that approximates the probability distributions
    of the system at several time instances. We use examples of cellular processes
    to demonstrate the superiority of the reachability analysis if accurate results
    are required.
article_processing_charge: No
author:
- first_name: Frédéric
  full_name: Didier, Frédéric
  last_name: Didier
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Maria
  full_name: Mateescu, Maria
  last_name: Mateescu
- first_name: Verena
  full_name: Wolf, Verena
  last_name: Wolf
citation:
  ama: Didier F, Henzinger TA, Mateescu M, Wolf V. Approximation of event probabilities
    in noisy cellular processes. <i>Theoretical Computer Science</i>. 2011;412(21):2128-2141.
    doi:<a href="https://doi.org/10.1016/j.tcs.2010.10.022">10.1016/j.tcs.2010.10.022</a>
  apa: Didier, F., Henzinger, T. A., Mateescu, M., &#38; Wolf, V. (2011). Approximation
    of event probabilities in noisy cellular processes. <i>Theoretical Computer Science</i>.
    Elsevier. <a href="https://doi.org/10.1016/j.tcs.2010.10.022">https://doi.org/10.1016/j.tcs.2010.10.022</a>
  chicago: Didier, Frédéric, Thomas A Henzinger, Maria Mateescu, and Verena Wolf.
    “Approximation of Event Probabilities in Noisy Cellular Processes.” <i>Theoretical
    Computer Science</i>. Elsevier, 2011. <a href="https://doi.org/10.1016/j.tcs.2010.10.022">https://doi.org/10.1016/j.tcs.2010.10.022</a>.
  ieee: F. Didier, T. A. Henzinger, M. Mateescu, and V. Wolf, “Approximation of event
    probabilities in noisy cellular processes,” <i>Theoretical Computer Science</i>,
    vol. 412, no. 21. Elsevier, pp. 2128–2141, 2011.
  ista: Didier F, Henzinger TA, Mateescu M, Wolf V. 2011. Approximation of event probabilities
    in noisy cellular processes. Theoretical Computer Science. 412(21), 2128–2141.
  mla: Didier, Frédéric, et al. “Approximation of Event Probabilities in Noisy Cellular
    Processes.” <i>Theoretical Computer Science</i>, vol. 412, no. 21, Elsevier, 2011,
    pp. 2128–41, doi:<a href="https://doi.org/10.1016/j.tcs.2010.10.022">10.1016/j.tcs.2010.10.022</a>.
  short: F. Didier, T.A. Henzinger, M. Mateescu, V. Wolf, Theoretical Computer Science
    412 (2011) 2128–2141.
date_created: 2018-12-11T12:02:55Z
date_published: 2011-05-06T00:00:00Z
date_updated: 2025-09-30T09:03:30Z
day: '06'
ddc:
- '000'
- '004'
department:
- _id: ToHe
doi: 10.1016/j.tcs.2010.10.022
external_id:
  isi:
  - '000290078000005'
file:
- access_level: open_access
  checksum: e5503e25ce020d753e06b3431e16841e
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:11:09Z
  date_updated: 2020-07-14T12:46:10Z
  file_id: '4862'
  file_name: IST-2012-79-v1+1_Approximation_of_event_probabilities_in_noisy_cellular_processes.pdf
  file_size: 230503
  relation: main_file
file_date_updated: 2020-07-14T12:46:10Z
has_accepted_license: '1'
intvolume: '       412'
isi: 1
issue: '21'
language:
- iso: eng
month: '05'
oa: 1
oa_version: Submitted Version
page: 2128 - 2141
publication: Theoretical Computer Science
publication_status: published
publisher: Elsevier
publist_id: '3249'
pubrep_id: '79'
quality_controlled: '1'
related_material:
  record:
  - id: '4535'
    relation: earlier_version
    status: public
scopus_import: '1'
status: public
title: Approximation of event probabilities in noisy cellular processes
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 412
year: '2011'
...
---
_id: '3365'
abstract:
- lang: eng
  text: We present the tool Quasy, a quantitative synthesis tool. Quasy takes qualitative
    and quantitative specifications and automatically constructs a system that satisfies
    the qualitative specification and optimizes the quantitative specification, if
    such a system exists. The user can choose between a system that satisfies and
    optimizes the specifications (a) under all possible environment behaviors or (b)
    under the most-likely environment behaviors given as a probability distribution
    on the possible input sequences. Quasy solves these two quantitative synthesis
    problems by reduction to instances of 2-player games and Markov Decision Processes
    (MDPs) with quantitative winning objectives. Quasy can also be seen as a game
    solver for quantitative games. Most notable, it can solve lexicographic mean-payoff
    games with 2 players, MDPs with mean-payoff objectives, and ergodic MDPs with
    mean-payoff parity objectives.
alternative_title:
- LNCS
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Barbara
  full_name: Jobstmann, Barbara
  last_name: Jobstmann
- first_name: Rohit
  full_name: Singh, Rohit
  last_name: Singh
citation:
  ama: 'Chatterjee K, Henzinger TA, Jobstmann B, Singh R. QUASY: quantitative synthesis
    tool. In: Vol 6605. Springer; 2011:267-271. doi:<a href="https://doi.org/10.1007/978-3-642-19835-9_24">10.1007/978-3-642-19835-9_24</a>'
  apa: 'Chatterjee, K., Henzinger, T. A., Jobstmann, B., &#38; Singh, R. (2011). QUASY:
    quantitative synthesis tool (Vol. 6605, pp. 267–271). Presented at the TACAS:
    Tools and Algorithms for the Construction and Analysis of Systems, Saarbrucken,
    Germany: Springer. <a href="https://doi.org/10.1007/978-3-642-19835-9_24">https://doi.org/10.1007/978-3-642-19835-9_24</a>'
  chicago: 'Chatterjee, Krishnendu, Thomas A Henzinger, Barbara Jobstmann, and Rohit
    Singh. “QUASY: Quantitative Synthesis Tool,” 6605:267–71. Springer, 2011. <a href="https://doi.org/10.1007/978-3-642-19835-9_24">https://doi.org/10.1007/978-3-642-19835-9_24</a>.'
  ieee: 'K. Chatterjee, T. A. Henzinger, B. Jobstmann, and R. Singh, “QUASY: quantitative
    synthesis tool,” presented at the TACAS: Tools and Algorithms for the Construction
    and Analysis of Systems, Saarbrucken, Germany, 2011, vol. 6605, pp. 267–271.'
  ista: 'Chatterjee K, Henzinger TA, Jobstmann B, Singh R. 2011. QUASY: quantitative
    synthesis tool. TACAS: Tools and Algorithms for the Construction and Analysis
    of Systems, LNCS, vol. 6605, 267–271.'
  mla: 'Chatterjee, Krishnendu, et al. <i>QUASY: Quantitative Synthesis Tool</i>.
    Vol. 6605, Springer, 2011, pp. 267–71, doi:<a href="https://doi.org/10.1007/978-3-642-19835-9_24">10.1007/978-3-642-19835-9_24</a>.'
  short: K. Chatterjee, T.A. Henzinger, B. Jobstmann, R. Singh, in:, Springer, 2011,
    pp. 267–271.
conference:
  end_date: 2011-04-03
  location: Saarbrucken, Germany
  name: 'TACAS: Tools and Algorithms for the Construction and Analysis of Systems'
  start_date: 2011-03-26
date_created: 2018-12-11T12:02:55Z
date_published: 2011-09-29T00:00:00Z
date_updated: 2021-01-12T07:42:58Z
day: '29'
ddc:
- '000'
- '005'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1007/978-3-642-19835-9_24
file:
- access_level: open_access
  checksum: 762e52eb296f6dbfbf2a75d98b8ebaee
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:13:37Z
  date_updated: 2020-07-14T12:46:10Z
  file_id: '5022'
  file_name: IST-2012-77-v1+1_QUASY-_quantitative_synthesis_tool.pdf
  file_size: 475661
  relation: main_file
file_date_updated: 2020-07-14T12:46:10Z
has_accepted_license: '1'
intvolume: '      6605'
language:
- iso: eng
month: '09'
oa: 1
oa_version: Submitted Version
page: 267 - 271
publication_status: published
publisher: Springer
publist_id: '3248'
pubrep_id: '77'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'QUASY: quantitative synthesis tool'
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 6605
year: '2011'
...
---
_id: '3366'
abstract:
- lang: eng
  text: 'We present an algorithmic method for the quantitative, performance-aware
    synthesis of concurrent programs. The input consists of a nondeterministic partial
    program and of a parametric performance model. The nondeterminism allows the programmer
    to omit which (if any) synchronization construct is used at a particular program
    location. The performance model, specified as a weighted automaton, can capture
    system architectures by assigning different costs to actions such as locking,
    context switching, and memory and cache accesses. The quantitative synthesis problem
    is to automatically resolve the nondeterminism of the partial program so that
    both correctness is guaranteed and performance is optimal. As is standard for
    shared memory concurrency, correctness is formalized &quot;specification free&quot;,
    in particular as race freedom or deadlock freedom. For worst-case (average-case)
    performance, we show that the problem can be reduced to 2-player graph games (with
    probabilistic transitions) with quantitative objectives. While we show, using
    game-theoretic methods, that the synthesis problem is Nexp-complete, we present
    an algorithmic method and an implementation that works efficiently for concurrent
    programs and performance models of practical interest. We have implemented a prototype
    tool and used it to synthesize finite-state concurrent programs that exhibit different
    programming patterns, for several performance models representing different architectures. '
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
- first_name: Rohit
  full_name: Singh, Rohit
  last_name: Singh
citation:
  ama: 'Cerny P, Chatterjee K, Henzinger TA, Radhakrishna A, Singh R. Quantitative
    synthesis for concurrent programs. In: Gopalakrishnan G, Qadeer S, eds. Vol 6806.
    Springer; 2011:243-259. doi:<a href="https://doi.org/10.1007/978-3-642-22110-1_20">10.1007/978-3-642-22110-1_20</a>'
  apa: 'Cerny, P., Chatterjee, K., Henzinger, T. A., Radhakrishna, A., &#38; Singh,
    R. (2011). Quantitative synthesis for concurrent programs. In G. Gopalakrishnan
    &#38; S. Qadeer (Eds.) (Vol. 6806, pp. 243–259). Presented at the CAV: Computer
    Aided Verification, Snowbird, USA: Springer. <a href="https://doi.org/10.1007/978-3-642-22110-1_20">https://doi.org/10.1007/978-3-642-22110-1_20</a>'
  chicago: Cerny, Pavol, Krishnendu Chatterjee, Thomas A Henzinger, Arjun Radhakrishna,
    and Rohit Singh. “Quantitative Synthesis for Concurrent Programs.” edited by Ganesh
    Gopalakrishnan and Shaz Qadeer, 6806:243–59. Springer, 2011. <a href="https://doi.org/10.1007/978-3-642-22110-1_20">https://doi.org/10.1007/978-3-642-22110-1_20</a>.
  ieee: 'P. Cerny, K. Chatterjee, T. A. Henzinger, A. Radhakrishna, and R. Singh,
    “Quantitative synthesis for concurrent programs,” presented at the CAV: Computer
    Aided Verification, Snowbird, USA, 2011, vol. 6806, pp. 243–259.'
  ista: 'Cerny P, Chatterjee K, Henzinger TA, Radhakrishna A, Singh R. 2011. Quantitative
    synthesis for concurrent programs. CAV: Computer Aided Verification, LNCS, vol.
    6806, 243–259.'
  mla: Cerny, Pavol, et al. <i>Quantitative Synthesis for Concurrent Programs</i>.
    Edited by Ganesh Gopalakrishnan and Shaz Qadeer, vol. 6806, Springer, 2011, pp.
    243–59, doi:<a href="https://doi.org/10.1007/978-3-642-22110-1_20">10.1007/978-3-642-22110-1_20</a>.
  short: P. Cerny, K. Chatterjee, T.A. Henzinger, A. Radhakrishna, R. Singh, in:,
    G. Gopalakrishnan, S. Qadeer (Eds.), Springer, 2011, pp. 243–259.
conference:
  end_date: 2011-07-20
  location: Snowbird, USA
  name: 'CAV: Computer Aided Verification'
  start_date: 2011-07-14
corr_author: '1'
date_created: 2018-12-11T12:02:55Z
date_published: 2011-04-21T00:00:00Z
date_updated: 2024-10-21T06:03:04Z
day: '21'
ddc:
- '000'
- '004'
department:
- _id: ToHe
- _id: KrCh
doi: 10.1007/978-3-642-22110-1_20
ec_funded: 1
editor:
- first_name: Ganesh
  full_name: Gopalakrishnan, Ganesh
  last_name: Gopalakrishnan
- first_name: Shaz
  full_name: Qadeer, Shaz
  last_name: Qadeer
file:
- access_level: open_access
  checksum: c033689355f45742dc7c99b5af13ce7a
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:15:51Z
  date_updated: 2020-07-14T12:46:10Z
  file_id: '5174'
  file_name: IST-2012-76-v1+1_Quantitative_synthesis_for_concurrent_programs.pdf
  file_size: 508946
  relation: main_file
file_date_updated: 2020-07-14T12:46:10Z
has_accepted_license: '1'
intvolume: '      6806'
language:
- iso: eng
month: '04'
oa: 1
oa_version: Submitted Version
page: 243 - 259
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
- _id: 25F1337C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '214373'
  name: Design for Embedded Systems
publication_status: published
publisher: Springer
publist_id: '3247'
pubrep_id: '76'
quality_controlled: '1'
related_material:
  record:
  - id: '5388'
    relation: earlier_version
    status: public
scopus_import: '1'
status: public
title: Quantitative synthesis for concurrent programs
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 6806
year: '2011'
...
---
_id: '3367'
abstract:
- lang: eng
  text: In this paper, we present the first output-sensitive algorithm to compute
    the persistence diagram of a filtered simplicial complex. For any Γ&gt;0, it returns
    only those homology classes with persistence at least Γ. Instead of the classical
    reduction via column operations, our algorithm performs rank computations on submatrices
    of the boundary matrix. For an arbitrary constant δ ∈ (0,1), the running time
    is O(C(1-δ)ΓR(n)log n), where C(1-δ)Γ is the number of homology classes with persistence
    at least (1-δ)Γ, n is the total number of simplices, and R(n) is the complexity
    of computing the rank of an n x n matrix with O(n) nonzero entries. Depending
    on the choice of the rank algorithm, this yields a deterministic O(C(1-δ)Γn2.376)
    algorithm, a O(C(1-δ)Γn2.28) Las-Vegas algorithm, or a O(C(1-δ)Γn2+ε) Monte-Carlo
    algorithm for an arbitrary ε&gt;0.
article_processing_charge: No
author:
- first_name: Chao
  full_name: Chen, Chao
  id: 3E92416E-F248-11E8-B48F-1D18A9856A87
  last_name: Chen
- first_name: Michael
  full_name: Kerber, Michael
  id: 36E4574A-F248-11E8-B48F-1D18A9856A87
  last_name: Kerber
  orcid: 0000-0002-8030-9299
citation:
  ama: 'Chen C, Kerber M. An output sensitive algorithm for persistent homology. In:
    ACM; 2011:207-216. doi:<a href="https://doi.org/10.1145/1998196.1998228">10.1145/1998196.1998228</a>'
  apa: 'Chen, C., &#38; Kerber, M. (2011). An output sensitive algorithm for persistent
    homology (pp. 207–216). Presented at the SoCG: Symposium on Computational Geometry,
    Paris, France: ACM. <a href="https://doi.org/10.1145/1998196.1998228">https://doi.org/10.1145/1998196.1998228</a>'
  chicago: Chen, Chao, and Michael Kerber. “An Output Sensitive Algorithm for Persistent
    Homology,” 207–16. ACM, 2011. <a href="https://doi.org/10.1145/1998196.1998228">https://doi.org/10.1145/1998196.1998228</a>.
  ieee: 'C. Chen and M. Kerber, “An output sensitive algorithm for persistent homology,”
    presented at the SoCG: Symposium on Computational Geometry, Paris, France, 2011,
    pp. 207–216.'
  ista: 'Chen C, Kerber M. 2011. An output sensitive algorithm for persistent homology.
    SoCG: Symposium on Computational Geometry, 207–216.'
  mla: Chen, Chao, and Michael Kerber. <i>An Output Sensitive Algorithm for Persistent
    Homology</i>. ACM, 2011, pp. 207–16, doi:<a href="https://doi.org/10.1145/1998196.1998228">10.1145/1998196.1998228</a>.
  short: C. Chen, M. Kerber, in:, ACM, 2011, pp. 207–216.
conference:
  end_date: 2011-06-15
  location: Paris, France
  name: 'SoCG: Symposium on Computational Geometry'
  start_date: 2011-06-13
corr_author: '1'
date_created: 2018-12-11T12:02:56Z
date_published: 2011-06-13T00:00:00Z
date_updated: 2025-09-29T13:26:20Z
day: '13'
department:
- _id: HeEd
doi: 10.1145/1998196.1998228
language:
- iso: eng
month: '06'
oa_version: None
page: 207 - 216
publication_status: published
publisher: ACM
publist_id: '3245'
quality_controlled: '1'
related_material:
  record:
  - id: '2939'
    relation: later_version
    status: public
scopus_import: 1
status: public
title: An output sensitive algorithm for persistent homology
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2011'
...
---
_id: '3368'
abstract:
- lang: eng
  text: Tissue surface tension (TST) is an important mechanical property influencing
    cell sorting and tissue envelopment. The study by Manning et al. (1) reported
    on a mathematical model describing TST on the basis of the balance between adhesive
    and tensile properties of the constituent cells. The model predicts that, in high-adhesion
    cell aggregates, surface cells will be stretched to maintain the same area of
    cell–cell contact as interior bulk cells, resulting in an elongated and flattened
    cell shape. The authors (1) observed flat and elongated cells at the surface of
    high-adhesion zebrafish germ-layer explants, which they argue are undifferentiated
    stretched germ-layer progenitor cells, and they use this observation as a validation
    of their model.
article_processing_charge: No
author:
- first_name: Gabriel
  full_name: Krens, Gabriel
  id: 2B819732-F248-11E8-B48F-1D18A9856A87
  last_name: Krens
  orcid: 0000-0003-4761-5996
- first_name: Stephanie
  full_name: Möllmert, Stephanie
  id: 260FD49C-E911-11E9-B5EA-D9538404589B
  last_name: Möllmert
- first_name: Carl-Philipp J
  full_name: Heisenberg, Carl-Philipp J
  id: 39427864-F248-11E8-B48F-1D18A9856A87
  last_name: Heisenberg
  orcid: 0000-0002-0912-4566
citation:
  ama: Krens G, Möllmert S, Heisenberg C-PJ. Enveloping cell layer differentiation
    at the surface of zebrafish germ layer tissue explants. <i>PNAS</i>. 2011;108(3):E9-E10.
    doi:<a href="https://doi.org/10.1073/pnas.1010767108">10.1073/pnas.1010767108</a>
  apa: Krens, G., Möllmert, S., &#38; Heisenberg, C.-P. J. (2011). Enveloping cell
    layer differentiation at the surface of zebrafish germ layer tissue explants.
    <i>PNAS</i>. National Academy of Sciences. <a href="https://doi.org/10.1073/pnas.1010767108">https://doi.org/10.1073/pnas.1010767108</a>
  chicago: Krens, Gabriel, Stephanie Möllmert, and Carl-Philipp J Heisenberg. “Enveloping
    Cell Layer Differentiation at the Surface of Zebrafish Germ Layer Tissue Explants.”
    <i>PNAS</i>. National Academy of Sciences, 2011. <a href="https://doi.org/10.1073/pnas.1010767108">https://doi.org/10.1073/pnas.1010767108</a>.
  ieee: G. Krens, S. Möllmert, and C.-P. J. Heisenberg, “Enveloping cell layer differentiation
    at the surface of zebrafish germ layer tissue explants,” <i>PNAS</i>, vol. 108,
    no. 3. National Academy of Sciences, pp. E9–E10, 2011.
  ista: Krens G, Möllmert S, Heisenberg C-PJ. 2011. Enveloping cell layer differentiation
    at the surface of zebrafish germ layer tissue explants. PNAS. 108(3), E9–E10.
  mla: Krens, Gabriel, et al. “Enveloping Cell Layer Differentiation at the Surface
    of Zebrafish Germ Layer Tissue Explants.” <i>PNAS</i>, vol. 108, no. 3, National
    Academy of Sciences, 2011, pp. E9–10, doi:<a href="https://doi.org/10.1073/pnas.1010767108">10.1073/pnas.1010767108</a>.
  short: G. Krens, S. Möllmert, C.-P.J. Heisenberg, PNAS 108 (2011) E9–E10.
corr_author: '1'
date_created: 2018-12-11T12:02:56Z
date_published: 2011-01-18T00:00:00Z
date_updated: 2025-09-30T09:02:21Z
day: '18'
department:
- _id: CaHe
doi: 10.1073/pnas.1010767108
external_id:
  isi:
  - '000286310300003'
  pmid:
  - '21212360'
intvolume: '       108'
isi: 1
issue: '3'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3024655
month: '01'
oa: 1
oa_version: Submitted Version
page: E9 - E10
pmid: 1
publication: PNAS
publication_status: published
publisher: National Academy of Sciences
publist_id: '3244'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Enveloping cell layer differentiation at the surface of zebrafish germ layer
  tissue explants
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 108
year: '2011'
...
---
_id: '3369'
abstract:
- lang: eng
  text: Rab3 interacting molecules (RIMs) are highly enriched in the active zones
    of presynaptic terminals. It is generally thought that they operate as effectors
    of the small G protein Rab3. Three recent papers, by Han et al. (this issue of
    Neuron), Deng et al. (this issue of Neuron), and Kaeser et al. (a recent issue
    of Cell), shed new light on the functional role of RIM in presynaptic terminals.
    First, RIM tethers Ca2+ channels to active zones. Second, RIM contributes to priming
    of synaptic vesicles by interacting with another presynaptic protein, Munc13.
article_processing_charge: No
author:
- first_name: Alejandro
  full_name: Pernia-Andrade, Alejandro
  id: 36963E98-F248-11E8-B48F-1D18A9856A87
  last_name: Pernia-Andrade
- first_name: Peter M
  full_name: Jonas, Peter M
  id: 353C1B58-F248-11E8-B48F-1D18A9856A87
  last_name: Jonas
  orcid: 0000-0001-5001-4804
citation:
  ama: Pernia-Andrade A, Jonas PM. The multiple faces of RIM. <i>Neuron</i>. 2011;69(2):185-187.
    doi:<a href="https://doi.org/10.1016/j.neuron.2011.01.010">10.1016/j.neuron.2011.01.010</a>
  apa: Pernia-Andrade, A., &#38; Jonas, P. M. (2011). The multiple faces of RIM. <i>Neuron</i>.
    Elsevier. <a href="https://doi.org/10.1016/j.neuron.2011.01.010">https://doi.org/10.1016/j.neuron.2011.01.010</a>
  chicago: Pernia-Andrade, Alejandro, and Peter M Jonas. “The Multiple Faces of RIM.”
    <i>Neuron</i>. Elsevier, 2011. <a href="https://doi.org/10.1016/j.neuron.2011.01.010">https://doi.org/10.1016/j.neuron.2011.01.010</a>.
  ieee: A. Pernia-Andrade and P. M. Jonas, “The multiple faces of RIM,” <i>Neuron</i>,
    vol. 69, no. 2. Elsevier, pp. 185–187, 2011.
  ista: Pernia-Andrade A, Jonas PM. 2011. The multiple faces of RIM. Neuron. 69(2),
    185–187.
  mla: Pernia-Andrade, Alejandro, and Peter M. Jonas. “The Multiple Faces of RIM.”
    <i>Neuron</i>, vol. 69, no. 2, Elsevier, 2011, pp. 185–87, doi:<a href="https://doi.org/10.1016/j.neuron.2011.01.010">10.1016/j.neuron.2011.01.010</a>.
  short: A. Pernia-Andrade, P.M. Jonas, Neuron 69 (2011) 185–187.
corr_author: '1'
date_created: 2018-12-11T12:02:56Z
date_published: 2011-01-27T00:00:00Z
date_updated: 2025-09-30T09:01:26Z
day: '27'
department:
- _id: PeJo
doi: 10.1016/j.neuron.2011.01.010
external_id:
  isi:
  - '000286792900002'
intvolume: '        69'
isi: 1
issue: '2'
language:
- iso: eng
month: '01'
oa_version: None
page: 185 - 187
publication: Neuron
publication_status: published
publisher: Elsevier
publist_id: '3243'
quality_controlled: '1'
scopus_import: '1'
status: public
title: The multiple faces of RIM
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 69
year: '2011'
...
---
_id: '3370'
abstract:
- lang: eng
  text: Supertree methods are widely applied and give rise to new conclusions about
    phylogenies (e.g., Bininda-Emonds et al. 2007). Although several desiderata for
    supertree methods exist (Wilkinson, Thorley, et al. 2004), only few of them have
    been studied in greater detail, examples include shape bias (Wilkinson et al.
    2005) or pareto properties (Wilkinson et al. 2007). Here I look more closely at
    two matrix representation methods, matrix representation with compatibility (MRC)
    and matrix representation with parsimony (MRP). Different null models of random
    data are studied and the resulting tree shapes are investigated. Thereby I consider
    unrooted trees and a bias in tree shape is determined by a tree balance measure.
    The measure for unrooted trees is a modification of a tree balance measure for
    rooted trees. I observe that depending on the underlying null model of random
    data, the methods may resolve conflict in favor of more balanced tree shapes.
    The analyses refer only to trees with the same taxon set, also known as the consensus
    setting (e.g., Wilkinson et al. 2007), but I will be able to draw conclusions
    on how to deal with missing data.
article_processing_charge: No
author:
- first_name: Anne
  full_name: Kupczok, Anne
  id: 2BB22BC2-F248-11E8-B48F-1D18A9856A87
  last_name: Kupczok
citation:
  ama: Kupczok A. Consequences of different null models on the tree shape bias of
    supertree methods. <i>Systematic Biology</i>. 2011;60(2):218-225. doi:<a href="https://doi.org/10.1093/sysbio/syq086">10.1093/sysbio/syq086</a>
  apa: Kupczok, A. (2011). Consequences of different null models on the tree shape
    bias of supertree methods. <i>Systematic Biology</i>. Oxford University Press.
    <a href="https://doi.org/10.1093/sysbio/syq086">https://doi.org/10.1093/sysbio/syq086</a>
  chicago: Kupczok, Anne. “Consequences of Different Null Models on the Tree Shape
    Bias of Supertree Methods.” <i>Systematic Biology</i>. Oxford University Press,
    2011. <a href="https://doi.org/10.1093/sysbio/syq086">https://doi.org/10.1093/sysbio/syq086</a>.
  ieee: A. Kupczok, “Consequences of different null models on the tree shape bias
    of supertree methods,” <i>Systematic Biology</i>, vol. 60, no. 2. Oxford University
    Press, pp. 218–225, 2011.
  ista: Kupczok A. 2011. Consequences of different null models on the tree shape bias
    of supertree methods. Systematic Biology. 60(2), 218–225.
  mla: Kupczok, Anne. “Consequences of Different Null Models on the Tree Shape Bias
    of Supertree Methods.” <i>Systematic Biology</i>, vol. 60, no. 2, Oxford University
    Press, 2011, pp. 218–25, doi:<a href="https://doi.org/10.1093/sysbio/syq086">10.1093/sysbio/syq086</a>.
  short: A. Kupczok, Systematic Biology 60 (2011) 218–225.
corr_author: '1'
date_created: 2018-12-11T12:02:57Z
date_published: 2011-03-01T00:00:00Z
date_updated: 2025-09-30T08:59:18Z
day: '01'
department:
- _id: JoBo
doi: 10.1093/sysbio/syq086
external_id:
  isi:
  - '000287255100009'
intvolume: '        60'
isi: 1
issue: '2'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://eprints.cs.univie.ac.at/3226/
month: '03'
oa: 1
oa_version: Submitted Version
page: 218 - 225
publication: Systematic Biology
publication_status: published
publisher: Oxford University Press
publist_id: '3241'
quality_controlled: '1'
status: public
title: Consequences of different null models on the tree shape bias of supertree methods
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 60
year: '2011'
...
