Foundations of Software Science and Computation Structures : 25th International Conference, FOSSACS 2022, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2-7, 2022, Proceedings.

Bibliographic Details
Main Author: Bouyer, Patricia.
Other Authors: Schröder, Lutz.
Format: eBook
Language:English
Published: Cham : Springer International Publishing AG, 2022.
Edition:1st ed.
Series:Lecture Notes in Computer Science Series
Subjects:
Online Access:Click to View
LEADER 11299nam a22004693i 4500
001 EBC6942704
003 MiAaPQ
005 20231204023222.0
006 m o d |
007 cr cnu||||||||
008 231204s2022 xx o ||||0 eng d
020 |a 9783030992538  |q (electronic bk.) 
020 |z 9783030992521 
035 |a (MiAaPQ)EBC6942704 
035 |a (Au-PeEL)EBL6942704 
035 |a (OCoLC)1308973551 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a QA75.5-76.95 
100 1 |a Bouyer, Patricia. 
245 1 0 |a Foundations of Software Science and Computation Structures :  |b 25th International Conference, FOSSACS 2022, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2-7, 2022, Proceedings. 
250 |a 1st ed. 
264 1 |a Cham :  |b Springer International Publishing AG,  |c 2022. 
264 4 |c ©2022. 
300 |a 1 online resource (484 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science Series ;  |v v.13242 
505 0 |a Intro -- ETAPS Foreword -- Preface -- Organization -- Parameterized Verification to the Rescue of Distributed Algorithms (Abstract of Invited Talk) -- Contents -- Representing Regular Languages of Infinite Words Using Mod 2 Multiplicity Automata -- 1 Introduction -- 2 Preliminaries -- 2.1 NFAs, UFAs, DFAs, NBAs, UBAs, SUBAs, and DBAs -- 2.2 LTL formulas -- 2.3 M2MAs -- 2.4 Size lower bounds for DFAs, M2MAs and NFAs -- 3 M2MAs as representations of regular languages -- 3.1 M2MAs: procedures for operations and properties -- 3.2 Conciseness comparisons for regular languages -- 4 Representing regular omega-languages using regularlanguages -- 5 Conciseness comparisons for regular omega-languages -- 5.1 Size increases for LTL formulas -- 5.2 Size increases for DBAs, NBAs, SUBAs -- 6 Empirical results -- 6.1 SUBAs to minimized M2MAs and DFAs -- 6.2 NBAs and DBAs to minimized M2MAs -- 6.3 LTL formulas to minimized M2MAs -- 7 Summary and conclusions -- References -- Limits and difficulties in the design of under-approximation abstract domains -- 1 Introduction -- 2 Background -- 3 Integer Domains -- 3.1 Infinite Integer Domain -- 3.2 Finite Integer Domain -- 4 Arbitrary domains -- 4.1 Local Requirements for Impossibility -- 4.2 Global Requirements for Impossibility -- 5 On the necessity of high surjectivity hypothesis -- 6 Conclusions and Future Works -- References -- On probability-raising causality in Markov decision processes -- 1 Introduction -- 2 Preliminaries -- 3 Strict and global probability-raising causes -- 3.1 Examples and simple properties of probability-raising causes -- 3.2 Related work -- 4 Checking the existence of PR causes and the PR conditions -- 4.1 Checking the strict probability-raising condition and the existence of causes -- 4.2 Checking the global probability-raising condition -- 5 Quality and optimality of causes. 
505 8 |a 5.1 Quality measures for causes -- 5.2 Computation schemes for the quality measures for fixed cause set -- 5.3 Quality-optimal probability-raising causes -- 6 Conclusion -- References -- Parameterized Analysis of Reconfigurable Broadcast Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Multisets -- 2.2 Reconfigurable Broadcast Networks -- 2.3 Cubes and Counting Sets -- 3 Reachability sets of counting sets -- 3.1 Symbolic graph -- 3.2 Properties of the symbolic graph -- 4 The PSPACE Theorem -- 5 Application 1: Almost-sure coverability -- 5.1 The almost-sure coverability problem -- 5.2 A characterization of almost-sure coverability -- 5.3 PSPACE-completeness of the almost-sure coverability problem -- 6 Application 2: Computation by RBN -- 6.1 RBN Protocols -- 6.2 Expressivity -- References -- Separators in Continuous Petri Nets -- 1 Introduction -- 2 Preliminaries -- 2.1 Separators and bi-separators -- 3 A characterization of unreachability -- 4 Separators as certificates -- 4.1 Locally closed bi-separators -- 5 Constructing locally closed bi-separators -- 6 Checking locally closed bi-separators is in NC -- 7 Bi-separators for set-to-set unreachability -- 8 Conclusion -- References -- Graphical Piecewise-Linear Algebra -- 1 Introduction -- 2 Preliminaries -- 2.1 Props and Symmetric Monoidal Theories -- 2.2 Ordered Props and Symmetric Monoidal Inequality Theories -- 2.3 Graphical Polyhedral Algebra -- 3 Symmetric Monoidal Semi-Lattice Theories -- 4 The Theory of Piecewise-Linear Relations -- 4.1 Syntax and Semantics -- 4.2 Equational Theory -- 4.3 Completeness Theorem -- 5 Generating Piecewise-Linear Relations -- 5.1 The n-Fold Union Generators -- 5.2 The Simplest Non-Convex Diagram -- 5.3 The Semantics of a Diode -- 5.4 Alternative generators: max, ReLu and abs -- 5.5 Conclusion -- 6 Case Study: Electronic Circuits -- References. 
505 8 |a Token Games and History-Deterministic Quantitative Automata -- 1 Introduction -- 2 Preliminaries -- 3 Token Games -- 4 Deciding History-Determinism via One-Token Games -- 5 Deciding History-Determinism via Two Token Games -- 5.1 G₂ on LimSup and LimInf Automata -- 5.2 G₂ Characterises HDness for LimSup and LimInf Automata -- 6 Conclusions -- Acknowledgments -- References -- On the Translation of Automatato Linear Temporal Logic -- 1 Introduction -- 2 Preliminaries -- 3 Unary Alphabet -- 4 General Alphabet -- 4.1 Cascaded Automata -- 4.2 Encoding Reachability within Reset Cascades by LTL Formulas -- 4.3 Depth and Length Analysis -- 4.4 Translating Deterministic Counter-Free Automata to LTL -- 5 Conclusions -- References -- Categorical composable cryptography -- 1 Introduction -- 1.1 Related work -- 2 Resource theories -- 3 Cryptography as a resource theory -- 4 Computational security -- 5 Applications -- 6 Outlook -- References -- DyNetKAT: An Algebra of Dynamic Networks -- 1 Introduction -- 2 Language Design -- 2.1 Brief Overview of NetKAT -- 2.2 Design Decisions -- 2.3 DyNetKAT Syntax -- 2.4 DyNetKAT Semantics -- 3 Semantic Results -- 4 A Framework for Safety -- 5 Implementation -- 6 Experimental Evaluation -- 7 Conclusions -- References -- A new criterion for M, N-adhesivity, with an application to hierarchical graphs -- 1 Introduction -- 2 M,N-adhesivity via creation of (co)limits -- 2.1 M, N-adhesive categories -- 2.2 A new criterion for M, N-adhesivity -- 2.3 Comma categories -- 3 Some paradigmatic examples -- 3.1 Directed (acyclic) graphs -- 3.2 Tree Orders -- 3.3 Various kinds of hierarchical graphs -- 4 Conclusions -- References -- Quantifier elimination for counting extensions of Presburger arithmetic -- 1 Introduction -- 2 Presburger arithmetic with counting quantifiers -- 3 A quantifier elimination procedure for PAC. 
505 8 |a 4 Discussion, summary of results and roadmap -- 5 The monadically-guarded fragment of PAC -- 6 Eliminating monadically-guarded counting quantifiers -- 7 The monadically-guarded fragment is in doubly exponential space -- 8 A complexity characterisation -- 9 Conclusion -- References -- A first-order logic characterisation of safety and co-safety languages -- 1 Introduction -- 2 Preliminaries -- 3 Safety-FO and coSafety-FO -- 4 Safety-FO captures LTL-definable safety languages -- 5 Conclusions -- References -- First-order separation over countable ordinals -- 1 Introduction -- 2 Preliminaries -- 2.1 Ordinals -- 2.2 Ordinal words -- 2.3 Ordinal monoids -- 2.4 First-order logic -- 3 The algorithm -- 3.1 The saturation construction -- 3.2 The algorithm -- 4 When the algorithm says 'no' -- 5 When the algorithm says 'yes' -- 5.1 Merge operators and FO-approximants -- 5.2 Construction of FO-approximants for words of finite andω-length -- 5.3 Construction of FO-approximants for countable ordinal words -- 6 Related problems -- 7 Conclusion -- References -- A Faithful and Quantitative Notion of Distant Reduction for Generalized Applications -- 1 Introduction -- 2 A Calculus with Generalized Applications -- 2.1 Syntax and Semantics -- 2.2 Towards a Call-by-Name Operational Semantics -- 2.3 Some (Un)typed Properties of λJ -- 3 Inductive Characterization of Strong Normalization -- 3.1 ISN in the λ-Calculus Through Weak-Head Contexts -- 3.2 ISN for dβ -- 4 Quantitative Types Characterize Strong Normalization -- 4.1 The Typing System -- 4.2 The Characterization of dβ-Strong Normalization -- 4.3 Why π Is Not Quantitative -- 5 Faithfulness of the Translation -- 5.1 Explicit Substitutions -- 5.2 Proof of Faithfulness -- 6 Equivalent Notions of Strong Normalization -- 6.1 β-Normalization Is Not Enough -- 6.2 Comparison with β + p2 -- 6.3 Comparison with β + π. 
505 8 |a 6.4 Consequences for ΛJ -- 7 Conclusion -- References -- Modal Logics and Local Quantifiers:A Zoo in the Elementary Hierarchy -- 1 Introduction -- 2 Preliminaries -- 3 Lower bounds for ML(9kFO) and ML(9kSO) -- 4 Upper bounds via a small-model property for ML(9kSO) -- 5 Further connections -- References -- Temporal Stream Logic modulo Theories -- 1 Introduction -- 2 Preliminaries -- 3 Temporal Stream Logic modulo Theories -- 3.1 Temporal Stream Logic -- 3.2 Extending TSL with Theories -- 4 TSL modulo TU Satisfiability Checking -- 4.1 Buchi Stream Automata -- 4.2 An Algorithm for TSL modulo TU Satisfiability Checking -- 5 Undecidability of TSL modulo TU Satisfiability -- 6 (Semi-)Decidable Fragments -- 7 Evaluation -- 8 Related Work -- 9 Conclusion -- References -- The Different Shades of Infinite Session Types -- 1 Introduction -- 2 Shades of types -- 3 Types, trees and traces -- 4 From types to automata -- 5 From automata to types -- 6 Related work -- 7 Conclusion -- References -- Complete and tractable machine-independent characterizations of second-order polytime -- 1 Introduction -- 2 A second-order language with imperative procedures -- 3 Type system -- 4 Characterizations of the class of Basic Feasible Functionals -- 5 A completeness-preserving termination criterion -- 6 Conclusion and future work -- References -- Variable binding and substitution for (nameless) dummies -- 1 Introduction -- 2 De Bruijn monads -- 2.1 Definition of De Bruijn monads -- 2.2 Lifting assignments -- 2.3 Binding arities and binding conditions -- 2.4 Binding signatures and algebras -- 3 Initial-algebra semantics of binding signatures in De Bruijn monads -- 3.1 A category of De Bruijn monads -- 3.2 Categories of De Bruijn algebras -- 4 Relation to presheaf-based models -- 4.1 Trimming down presheaf-based models -- 4.2 Trimming down De Bruijn monads. 
505 8 |a 4.3 Bridging the gap. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Schröder, Lutz. 
776 0 8 |i Print version:  |a Bouyer, Patricia  |t Foundations of Software Science and Computation Structures  |d Cham : Springer International Publishing AG,c2022  |z 9783030992521 
797 2 |a ProQuest (Firm) 
830 0 |a Lecture Notes in Computer Science Series 
856 4 0 |u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6942704  |z Click to View