Foundations of Software Science and Computation Structures : 25th International Conference, FOSSACS 2022, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2-7, 2022, Proceedings.
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing AG,
2022.
|
Edition: | 1st ed. |
Series: | Lecture Notes in Computer Science Series
|
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- ETAPS Foreword
- Preface
- Organization
- Parameterized Verification to the Rescue of Distributed Algorithms (Abstract of Invited Talk)
- Contents
- Representing Regular Languages of Infinite Words Using Mod 2 Multiplicity Automata
- 1 Introduction
- 2 Preliminaries
- 2.1 NFAs, UFAs, DFAs, NBAs, UBAs, SUBAs, and DBAs
- 2.2 LTL formulas
- 2.3 M2MAs
- 2.4 Size lower bounds for DFAs, M2MAs and NFAs
- 3 M2MAs as representations of regular languages
- 3.1 M2MAs: procedures for operations and properties
- 3.2 Conciseness comparisons for regular languages
- 4 Representing regular omega-languages using regularlanguages
- 5 Conciseness comparisons for regular omega-languages
- 5.1 Size increases for LTL formulas
- 5.2 Size increases for DBAs, NBAs, SUBAs
- 6 Empirical results
- 6.1 SUBAs to minimized M2MAs and DFAs
- 6.2 NBAs and DBAs to minimized M2MAs
- 6.3 LTL formulas to minimized M2MAs
- 7 Summary and conclusions
- References
- Limits and difficulties in the design of under-approximation abstract domains
- 1 Introduction
- 2 Background
- 3 Integer Domains
- 3.1 Infinite Integer Domain
- 3.2 Finite Integer Domain
- 4 Arbitrary domains
- 4.1 Local Requirements for Impossibility
- 4.2 Global Requirements for Impossibility
- 5 On the necessity of high surjectivity hypothesis
- 6 Conclusions and Future Works
- References
- On probability-raising causality in Markov decision processes
- 1 Introduction
- 2 Preliminaries
- 3 Strict and global probability-raising causes
- 3.1 Examples and simple properties of probability-raising causes
- 3.2 Related work
- 4 Checking the existence of PR causes and the PR conditions
- 4.1 Checking the strict probability-raising condition and the existence of causes
- 4.2 Checking the global probability-raising condition
- 5 Quality and optimality of causes.
- 5.1 Quality measures for causes
- 5.2 Computation schemes for the quality measures for fixed cause set
- 5.3 Quality-optimal probability-raising causes
- 6 Conclusion
- References
- Parameterized Analysis of Reconfigurable Broadcast Networks
- 1 Introduction
- 2 Preliminaries
- 2.1 Multisets
- 2.2 Reconfigurable Broadcast Networks
- 2.3 Cubes and Counting Sets
- 3 Reachability sets of counting sets
- 3.1 Symbolic graph
- 3.2 Properties of the symbolic graph
- 4 The PSPACE Theorem
- 5 Application 1: Almost-sure coverability
- 5.1 The almost-sure coverability problem
- 5.2 A characterization of almost-sure coverability
- 5.3 PSPACE-completeness of the almost-sure coverability problem
- 6 Application 2: Computation by RBN
- 6.1 RBN Protocols
- 6.2 Expressivity
- References
- Separators in Continuous Petri Nets
- 1 Introduction
- 2 Preliminaries
- 2.1 Separators and bi-separators
- 3 A characterization of unreachability
- 4 Separators as certificates
- 4.1 Locally closed bi-separators
- 5 Constructing locally closed bi-separators
- 6 Checking locally closed bi-separators is in NC
- 7 Bi-separators for set-to-set unreachability
- 8 Conclusion
- References
- Graphical Piecewise-Linear Algebra
- 1 Introduction
- 2 Preliminaries
- 2.1 Props and Symmetric Monoidal Theories
- 2.2 Ordered Props and Symmetric Monoidal Inequality Theories
- 2.3 Graphical Polyhedral Algebra
- 3 Symmetric Monoidal Semi-Lattice Theories
- 4 The Theory of Piecewise-Linear Relations
- 4.1 Syntax and Semantics
- 4.2 Equational Theory
- 4.3 Completeness Theorem
- 5 Generating Piecewise-Linear Relations
- 5.1 The n-Fold Union Generators
- 5.2 The Simplest Non-Convex Diagram
- 5.3 The Semantics of a Diode
- 5.4 Alternative generators: max, ReLu and abs
- 5.5 Conclusion
- 6 Case Study: Electronic Circuits
- References.
- Token Games and History-Deterministic Quantitative Automata
- 1 Introduction
- 2 Preliminaries
- 3 Token Games
- 4 Deciding History-Determinism via One-Token Games
- 5 Deciding History-Determinism via Two Token Games
- 5.1 G₂ on LimSup and LimInf Automata
- 5.2 G₂ Characterises HDness for LimSup and LimInf Automata
- 6 Conclusions
- Acknowledgments
- References
- On the Translation of Automatato Linear Temporal Logic
- 1 Introduction
- 2 Preliminaries
- 3 Unary Alphabet
- 4 General Alphabet
- 4.1 Cascaded Automata
- 4.2 Encoding Reachability within Reset Cascades by LTL Formulas
- 4.3 Depth and Length Analysis
- 4.4 Translating Deterministic Counter-Free Automata to LTL
- 5 Conclusions
- References
- Categorical composable cryptography
- 1 Introduction
- 1.1 Related work
- 2 Resource theories
- 3 Cryptography as a resource theory
- 4 Computational security
- 5 Applications
- 6 Outlook
- References
- DyNetKAT: An Algebra of Dynamic Networks
- 1 Introduction
- 2 Language Design
- 2.1 Brief Overview of NetKAT
- 2.2 Design Decisions
- 2.3 DyNetKAT Syntax
- 2.4 DyNetKAT Semantics
- 3 Semantic Results
- 4 A Framework for Safety
- 5 Implementation
- 6 Experimental Evaluation
- 7 Conclusions
- References
- A new criterion for M, N-adhesivity, with an application to hierarchical graphs
- 1 Introduction
- 2 M,N-adhesivity via creation of (co)limits
- 2.1 M, N-adhesive categories
- 2.2 A new criterion for M, N-adhesivity
- 2.3 Comma categories
- 3 Some paradigmatic examples
- 3.1 Directed (acyclic) graphs
- 3.2 Tree Orders
- 3.3 Various kinds of hierarchical graphs
- 4 Conclusions
- References
- Quantifier elimination for counting extensions of Presburger arithmetic
- 1 Introduction
- 2 Presburger arithmetic with counting quantifiers
- 3 A quantifier elimination procedure for PAC.
- 4 Discussion, summary of results and roadmap
- 5 The monadically-guarded fragment of PAC
- 6 Eliminating monadically-guarded counting quantifiers
- 7 The monadically-guarded fragment is in doubly exponential space
- 8 A complexity characterisation
- 9 Conclusion
- References
- A first-order logic characterisation of safety and co-safety languages
- 1 Introduction
- 2 Preliminaries
- 3 Safety-FO and coSafety-FO
- 4 Safety-FO captures LTL-definable safety languages
- 5 Conclusions
- References
- First-order separation over countable ordinals
- 1 Introduction
- 2 Preliminaries
- 2.1 Ordinals
- 2.2 Ordinal words
- 2.3 Ordinal monoids
- 2.4 First-order logic
- 3 The algorithm
- 3.1 The saturation construction
- 3.2 The algorithm
- 4 When the algorithm says 'no'
- 5 When the algorithm says 'yes'
- 5.1 Merge operators and FO-approximants
- 5.2 Construction of FO-approximants for words of finite andω-length
- 5.3 Construction of FO-approximants for countable ordinal words
- 6 Related problems
- 7 Conclusion
- References
- A Faithful and Quantitative Notion of Distant Reduction for Generalized Applications
- 1 Introduction
- 2 A Calculus with Generalized Applications
- 2.1 Syntax and Semantics
- 2.2 Towards a Call-by-Name Operational Semantics
- 2.3 Some (Un)typed Properties of λJ
- 3 Inductive Characterization of Strong Normalization
- 3.1 ISN in the λ-Calculus Through Weak-Head Contexts
- 3.2 ISN for dβ
- 4 Quantitative Types Characterize Strong Normalization
- 4.1 The Typing System
- 4.2 The Characterization of dβ-Strong Normalization
- 4.3 Why π Is Not Quantitative
- 5 Faithfulness of the Translation
- 5.1 Explicit Substitutions
- 5.2 Proof of Faithfulness
- 6 Equivalent Notions of Strong Normalization
- 6.1 β-Normalization Is Not Enough
- 6.2 Comparison with β + p2
- 6.3 Comparison with β + π.
- 6.4 Consequences for ΛJ
- 7 Conclusion
- References
- Modal Logics and Local Quantifiers:A Zoo in the Elementary Hierarchy
- 1 Introduction
- 2 Preliminaries
- 3 Lower bounds for ML(9kFO) and ML(9kSO)
- 4 Upper bounds via a small-model property for ML(9kSO)
- 5 Further connections
- References
- Temporal Stream Logic modulo Theories
- 1 Introduction
- 2 Preliminaries
- 3 Temporal Stream Logic modulo Theories
- 3.1 Temporal Stream Logic
- 3.2 Extending TSL with Theories
- 4 TSL modulo TU Satisfiability Checking
- 4.1 Buchi Stream Automata
- 4.2 An Algorithm for TSL modulo TU Satisfiability Checking
- 5 Undecidability of TSL modulo TU Satisfiability
- 6 (Semi-)Decidable Fragments
- 7 Evaluation
- 8 Related Work
- 9 Conclusion
- References
- The Different Shades of Infinite Session Types
- 1 Introduction
- 2 Shades of types
- 3 Types, trees and traces
- 4 From types to automata
- 5 From automata to types
- 6 Related work
- 7 Conclusion
- References
- Complete and tractable machine-independent characterizations of second-order polytime
- 1 Introduction
- 2 A second-order language with imperative procedures
- 3 Type system
- 4 Characterizations of the class of Basic Feasible Functionals
- 5 A completeness-preserving termination criterion
- 6 Conclusion and future work
- References
- Variable binding and substitution for (nameless) dummies
- 1 Introduction
- 2 De Bruijn monads
- 2.1 Definition of De Bruijn monads
- 2.2 Lifting assignments
- 2.3 Binding arities and binding conditions
- 2.4 Binding signatures and algebras
- 3 Initial-algebra semantics of binding signatures in De Bruijn monads
- 3.1 A category of De Bruijn monads
- 3.2 Categories of De Bruijn algebras
- 4 Relation to presheaf-based models
- 4.1 Trimming down presheaf-based models
- 4.2 Trimming down De Bruijn monads.
- 4.3 Bridging the gap.