首页 > 最新文献

18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.最新文献

英文 中文
Formal verification at Intel 英特尔的正式验证
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210044
J. Harrison
As designs become more complex, formal verification techniques are becoming increasingly important in the hardware industry. Many different methods are used, ranging from propositional tautology checking up to use of interactive higher-order theorem provers. Our own work is mainly concerned with the formal verification of floating-point mathematical functions. As this paper illustrates, such applications require a rather general mathematical framework and the ability to automate special-purpose proof algorithms in a reliable way. Our work uses the public-domain interactive theorem prover HOL Light, and we claim that this and similar 'LCF-style' theorem provers are a good choice for such applications.
随着设计变得越来越复杂,形式化验证技术在硬件工业中变得越来越重要。使用了许多不同的方法,从命题重言式检查到使用交互式高阶定理证明。我们自己的工作主要是关于浮点数学函数的形式化验证。正如本文所说明的,这样的应用需要一个相当通用的数学框架和以可靠的方式自动化特殊目的证明算法的能力。我们的工作使用了公共领域的交互式定理证明器HOL Light,我们声称这个和类似的“lcf风格”定理证明器是这种应用的一个很好的选择。
{"title":"Formal verification at Intel","authors":"J. Harrison","doi":"10.1109/LICS.2003.1210044","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210044","url":null,"abstract":"As designs become more complex, formal verification techniques are becoming increasingly important in the hardware industry. Many different methods are used, ranging from propositional tautology checking up to use of interactive higher-order theorem provers. Our own work is mainly concerned with the formal verification of floating-point mathematical functions. As this paper illustrates, such applications require a rather general mathematical framework and the ability to automate special-purpose proof algorithms in a reliable way. Our work uses the public-domain interactive theorem prover HOL Light, and we claim that this and similar 'LCF-style' theorem provers are a good choice for such applications.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116144612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Query evaluation on compressed trees 压缩树的查询求值
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210058
Markus Frick, Martin Grohe, Christoph E. Koch
This paper studies the problem of evaluating unary (or node-selecting) queries on unranked trees compressed in a natural structure-preserving way, by the sharing of common subtrees. The motivation to study unary queries on unranked trees comes from the database field, where querying XML (Extensible Markup Language) documents, which can be considered as unranked labeled trees, is an important task. We give algorithms and complexity results for the evaluation of XPath and monadic datalog queries. Furthermore, we propose a new automata-theoretic formalism for querying trees and give algorithms for evaluating queries defined by such automata.
本文研究了利用公共子树的共享,以自然保持结构的方式对未排序树进行一元(或节点选择)查询的求值问题。研究未排序树上的一元查询的动机来自数据库领域,其中查询XML(可扩展标记语言)文档(可被视为未排序的标记树)是一项重要任务。我们给出了计算XPath和一元数据查询的算法和复杂度结果。此外,我们提出了一种新的查询树的自动机理论形式,并给出了由这种自动机定义的查询的求值算法。
{"title":"Query evaluation on compressed trees","authors":"Markus Frick, Martin Grohe, Christoph E. Koch","doi":"10.1109/LICS.2003.1210058","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210058","url":null,"abstract":"This paper studies the problem of evaluating unary (or node-selecting) queries on unranked trees compressed in a natural structure-preserving way, by the sharing of common subtrees. The motivation to study unary queries on unranked trees comes from the database field, where querying XML (Extensible Markup Language) documents, which can be considered as unranked labeled trees, is an important task. We give algorithms and complexity results for the evaluation of XPath and monadic datalog queries. Furthermore, we propose a new automata-theoretic formalism for querying trees and give algorithms for evaluating queries defined by such automata.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123484251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
An NP decision procedure for protocol insecurity with XOR 带异或的协议不安全性的NP决策过程
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210066
Yannick Chevalier, Ralf Küsters, M. Rusinowitch, Mathieu Turuani
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-called oracle rules, i.e., deduction rules that satisfy certain conditions. As an instance of this general framework, we ascertain that protocol insecurity is in NP for an intruder that can exploit the properties of the XOR operator. This operator is frequently used in cryptographic protocols but cannot be handled in most protocol models. An immediate consequence of our proof is that checking whether a message can be derived by an intruder (using XOR) is in P. We also apply our framework to an intruder that exploits properties of certain encryption modes such as cipher block chaining (CBC).
我们提供了一种在标准Dolev-Yao入侵者(具有有限会话数)存在的情况下确定加密协议不安全性的方法,该入侵者扩展了所谓的oracle规则,即满足某些条件的演绎规则。作为这个通用框架的一个实例,我们确定了协议的不安全性在NP中对于一个可以利用异或运算符的属性的入侵者。该运算符在加密协议中经常使用,但在大多数协议模型中无法处理。我们证明的一个直接结果是,检查消息是否可以由入侵者(使用XOR)派生是在p中。我们还将我们的框架应用于利用某些加密模式(如密码块链(CBC))属性的入侵者。
{"title":"An NP decision procedure for protocol insecurity with XOR","authors":"Yannick Chevalier, Ralf Küsters, M. Rusinowitch, Mathieu Turuani","doi":"10.1109/LICS.2003.1210066","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210066","url":null,"abstract":"We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-called oracle rules, i.e., deduction rules that satisfy certain conditions. As an instance of this general framework, we ascertain that protocol insecurity is in NP for an intruder that can exploit the properties of the XOR operator. This operator is frequently used in cryptographic protocols but cannot be handled in most protocol models. An immediate consequence of our proof is that checking whether a message can be derived by an intruder (using XOR) is in P. We also apply our framework to an intruder that exploits properties of certain encryption modes such as cipher block chaining (CBC).","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 199
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or 排除或存在下的入侵者演绎、约束求解和不安全决策
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210067
Hubert Comon-Lundh, Vitaly Shmatikov
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We show that the ground reachability problem in NP for the extended intruder theories in the cases of xor and Abelian groups. This result follows from a normal proof theorem. Then, we show how to lift this result in the xor case: we consider a symbolic constraint system expressing the reachability (e.g., secrecy) problem for a finite number of sessions. We prove that such a constraint system is decidable, relying in particular on an extension of combination algorithms for unification procedures. As a corollary, this enables automatic symbolic verification of cryptographic protocols employing xor for a fixed number of sessions.
在对应于xor群和阿贝尔群的等式理论存在下,给出了验证密码协议的可判定性结果。由于完美的密码学假设对于具有可见代数属性(如xor)的密码学原语是不现实的,因此我们通过允许入侵者利用这些属性来扩展传统的Dolev-Yao模型。在xor和Abelian群的情况下,给出了扩展入侵者理论在NP中的地面可达性问题。这个结果是由一个普通的证明定理得出的。然后,我们展示了如何在xor情况下提升这个结果:我们考虑一个符号约束系统,表示有限数量会话的可达性(例如,保密性)问题。我们证明了这种约束系统是可决定的,特别依赖于统一过程的组合算法的扩展。作为一个必然结果,这允许对固定数量的会话使用xor的加密协议进行自动符号验证。
{"title":"Intruder deductions, constraint solving and insecurity decision in presence of exclusive or","authors":"Hubert Comon-Lundh, Vitaly Shmatikov","doi":"10.1109/LICS.2003.1210067","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210067","url":null,"abstract":"We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We show that the ground reachability problem in NP for the extended intruder theories in the cases of xor and Abelian groups. This result follows from a normal proof theorem. Then, we show how to lift this result in the xor case: we consider a symbolic constraint system expressing the reachability (e.g., secrecy) problem for a finite number of sessions. We prove that such a constraint system is decidable, relying in particular on an extension of combination algorithms for unification procedures. As a corollary, this enables automatic symbolic verification of cryptographic protocols employing xor for a fixed number of sessions.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 193
Structural subtyping of non-recursive types is decidable 非递归类型的结构子类型是可确定的
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210049
Viktor Kunčak, M. Rinard
We show that the first-order theory of structural subtyping of non-recursive types is decidable, as a consequence of a more general result on the decidability of term powers of decidable theories. Let /spl Sigma/ be a language consisting of function symbol and let /spl Cscr/; (with a finite or infinite domain C) be an L-structure where L is a language consisting of relation symbols. We introduce the notion of /spl Sigma/-term-power of the structure /spl Cscr/; denoted /spl Pscr/;/sub /spl Sigma//(/spl Cscr/;). The domain of /spl Pscr/;/sub /spl Sigma//(/spl Cscr/;) is the set of /spl Sigma/-terms over the set C. /spl Pscr/;/sub /spl Sigma//(/spl Cscr/;) has one term algebra operation for each f /spl isin/ /spl Sigma/, and one relation for each r /spl isin/ L defined by lifting operations of /spl Cscr/; to terms over C. We extend quantifier for term algebras and apply the Feferman-Vaught technique for quantifier elimination in products to obtain the following result. Let K be a family of L-structures and K/sub P/ the family of their /spl Sigma/-term-powers. Then the validity of any closed formula F on K/sub P/ can be effectively reduced to the validity of some closed formula q(F) on K. Our result implies the decidability of the first-order theory of structural subtyping of non-recursive types with covariant constructors, and the construction generalizes to contravariant constructors as well.
我们证明了非递归类型的结构子类型的一阶理论是可决定的,作为可决定理论项幂的可决定性的一个更一般的结果的结果。Let /spl Sigma/是由函数符号和Let /spl Cscr/组成的语言;(具有有限或无限域C)是L结构,其中L是由关系符号组成的语言。我们引入了/spl σ /-结构/spl Cscr/的项功率的概念;表示/spl Pscr/;/sub /spl Sigma//(/spl Cscr/;)/spl Pscr/;/sub /spl Sigma//(/spl Cscr/;)的定义域是集合c上的/spl Sigma/-项的集合。/spl Pscr/;/sub /spl Sigma//(/spl Cscr/;)对每个f /spl isin/ /spl Sigma/有一个项代数运算,对每个r/ spl isin/ L有一个关系,由/spl Cscr/的提升运算定义;我们扩展了项代数的量词,并应用费曼-沃特技术在乘积中消量词,得到以下结果。设K是l结构的一族K/ P/是它们的/spl /项幂一族。那么任意闭式F在K/ P/上的有效性可以有效地化约为某个闭式q(F)在K上的有效性。我们的结果表明具有协变构造子的非递归类型的一阶结构子类型理论的可判定性,并且该构造也推广到逆变构造子。
{"title":"Structural subtyping of non-recursive types is decidable","authors":"Viktor Kunčak, M. Rinard","doi":"10.1109/LICS.2003.1210049","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210049","url":null,"abstract":"We show that the first-order theory of structural subtyping of non-recursive types is decidable, as a consequence of a more general result on the decidability of term powers of decidable theories. Let /spl Sigma/ be a language consisting of function symbol and let /spl Cscr/; (with a finite or infinite domain C) be an L-structure where L is a language consisting of relation symbols. We introduce the notion of /spl Sigma/-term-power of the structure /spl Cscr/; denoted /spl Pscr/;/sub /spl Sigma//(/spl Cscr/;). The domain of /spl Pscr/;/sub /spl Sigma//(/spl Cscr/;) is the set of /spl Sigma/-terms over the set C. /spl Pscr/;/sub /spl Sigma//(/spl Cscr/;) has one term algebra operation for each f /spl isin/ /spl Sigma/, and one relation for each r /spl isin/ L defined by lifting operations of /spl Cscr/; to terms over C. We extend quantifier for term algebras and apply the Feferman-Vaught technique for quantifier elimination in products to obtain the following result. Let K be a family of L-structures and K/sub P/ the family of their /spl Sigma/-term-powers. Then the validity of any closed formula F on K/sub P/ can be effectively reduced to the validity of some closed formula q(F) on K. Our result implies the decidability of the first-order theory of structural subtyping of non-recursive types with covariant constructors, and the construction generalizes to contravariant constructors as well.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Proof nets for unit-free multiplicative-additive linear logic (extended abstract) 无单位乘加线性逻辑的证明网(扩展抽象)
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210039
Dominic J. D. Hughes, R. J. V. Glabbeek
A cornerstone of the theory of proof nets for unit-freemultiplicative linear logic (MLL) is the abstract representation of cut-freeproofs modulo inessential commutations of rules. The only knownextension to additives, based on monomial weights, fails topreserve this key feature: a host of cut-free monomial proof nets cancorrespond to the same cut-free proof. Thus the problem offinding a satisfactory notion of proof net for unit-freemultiplicative-additive linear logic (MALL) has remained open since theincep-tion of linear logic in 1986. We present a new definition of MALLproof net which remains faithful to the cornerstone of the MLLtheory.
无单位乘法线性逻辑证明网理论的一个基石是无切证明模非本质交换规则的抽象表示。唯一已知的扩展到添加剂,基于单项权重,未能保留这一关键特征:大量的无切割单项证明网可以响应相同的无切割证明。因此,自1986年线性逻辑出现以来,为无单位乘加线性逻辑(MALL)寻找一个令人满意的证明网的问题一直是一个悬而未决的问题。我们提出了一个新的定义,它忠实于mll理论的基石。
{"title":"Proof nets for unit-free multiplicative-additive linear logic (extended abstract)","authors":"Dominic J. D. Hughes, R. J. V. Glabbeek","doi":"10.1109/LICS.2003.1210039","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210039","url":null,"abstract":"A cornerstone of the theory of proof nets for unit-freemultiplicative linear logic (MLL) is the abstract representation of cut-freeproofs modulo inessential commutations of rules. The only knownextension to additives, based on monomial weights, fails topreserve this key feature: a host of cut-free monomial proof nets cancorrespond to the same cut-free proof. Thus the problem offinding a satisfactory notion of proof net for unit-freemultiplicative-additive linear logic (MALL) has remained open since theincep-tion of linear logic in 1986. We present a new definition of MALLproof net which remains faithful to the cornerstone of the MLLtheory.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Orienting equalities with the Knuth-Bendix order 用Knuth-Bendix顺序定向等式
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210047
Konstantin Korovin, A. Voronkov
Orientability of systems of equalities is the following problem: given a system of equalities s/sub 1/ /spl sime/ t/sub 1/, . . . , s/sub n/ /spl sime/ t/sub n/, does there exist a simplification ordering > which orients the system, that is for every i /spl isin/ {1, ..., n}, either s/sub i/ > t/sub i/ or t/sub i/ > s/sub i/. This problem can be used in rewriting for finding a canonical rewrite system for a system of equalities and in theorem proving for adjusting simplification orderings during completion. We prove that (rather surprisingly) the problem can be solved in polynomial time when we restrict ourselves to the Knuth-Bendix orderings.
等式系统的可定向性问题是:给定一个等式系统s/下标1/ /spl / sime/ t/下标1/,…, s/sub n/ /spl sime/ t/sub n/,是否存在一个面向系统的简化顺序>,即对于每一个I /spl isin/{1,…, n}, s/下标i/ > t/下标i/或t/下标i/ > s/下标i/。这个问题可以用于为等式系统寻找正则重写系统的重写和在补全过程中调整简化顺序的定理证明。当我们将自己限制在Knuth-Bendix排序时,我们证明了(相当令人惊讶的)这个问题可以在多项式时间内解决。
{"title":"Orienting equalities with the Knuth-Bendix order","authors":"Konstantin Korovin, A. Voronkov","doi":"10.1109/LICS.2003.1210047","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210047","url":null,"abstract":"Orientability of systems of equalities is the following problem: given a system of equalities s/sub 1/ /spl sime/ t/sub 1/, . . . , s/sub n/ /spl sime/ t/sub n/, does there exist a simplification ordering > which orients the system, that is for every i /spl isin/ {1, ..., n}, either s/sub i/ > t/sub i/ or t/sub i/ > s/sub i/. This problem can be used in rewriting for finding a canonical rewrite system for a system of equalities and in theorem proving for adjusting simplification orderings during completion. We prove that (rather surprisingly) the problem can be solved in polynomial time when we restrict ourselves to the Knuth-Bendix orderings.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127916029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Micro-macro stack systems: a new frontier of elementary decidability for sequential systems 微宏叠加系统:序贯系统初等可判定性的新前沿
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210078
Nir Piterman, Moshe Y. Vardi
We define the class of micro-macro stack graphs, a new class of graphs modeling infinite-state sequential systems with a decidable model-checking problem. Micro-macro stack graphs are the configuration graphs of stack automata whose states are partitioned into micro and macro states. Nodes of the graph are configurations of the stack automaton where the state is a macro state. Edges of the graph correspond to the sequence of micro steps that the automaton makes between macro states. We prove that this class strictly contains the class of prefix-recognizable graphs. We give a direct automata-theoretic algorithm for model checking /spl mu/-calculus formulas over micro-macro stack graphs.
定义了微宏叠加图,这是一类新的具有可判定模型检验问题的无限状态序列系统图。微观-宏观堆栈图是将状态划分为微观状态和宏观状态的堆栈自动机的组态图。图的节点是堆栈自动机的配置,其中状态是宏观状态。图的边对应于自动机在宏观状态之间的微步骤序列。证明了该类严格包含前缀可识别图类。我们给出了一种直接的自动机理论算法,用于微观-宏观堆栈图上的模型检验/spl mu/-微积分公式。
{"title":"Micro-macro stack systems: a new frontier of elementary decidability for sequential systems","authors":"Nir Piterman, Moshe Y. Vardi","doi":"10.1109/LICS.2003.1210078","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210078","url":null,"abstract":"We define the class of micro-macro stack graphs, a new class of graphs modeling infinite-state sequential systems with a decidable model-checking problem. Micro-macro stack graphs are the configuration graphs of stack automata whose states are partitioned into micro and macro states. Nodes of the graph are configurations of the stack automaton where the state is a macro state. Edges of the graph correspond to the sequence of micro steps that the automaton makes between macro states. We prove that this class strictly contains the class of prefix-recognizable graphs. We give a direct automata-theoretic algorithm for model checking /spl mu/-calculus formulas over micro-macro stack graphs.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117120488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On program equivalence in languages with ground-type references 具有基类型引用的语言中的程序等价性
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210050
A. Murawski
Using game semantics we prove that program equivalence is undecidable in finitary Idealized Algol with active expressions as well as in its call-by-value counterpart. It is also shown that strategies corresponding to Idealized Algol terms of respectively second, third and higher orders define exactly regular, context-free and recursively enumerable languages.
利用博弈语义证明了具有活动表达式的有限理想算法及其对应的按值调用算法的程序等价性是不可判定的。本文还证明了二阶、三阶和更高阶的理想Algol项对应的策略精确地定义了正则的、上下文无关的和递归可枚举的语言。
{"title":"On program equivalence in languages with ground-type references","authors":"A. Murawski","doi":"10.1109/LICS.2003.1210050","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210050","url":null,"abstract":"Using game semantics we prove that program equivalence is undecidable in finitary Idealized Algol with active expressions as well as in its call-by-value counterpart. It is also shown that strategies corresponding to Idealized Algol terms of respectively second, third and higher orders define exactly regular, context-free and recursively enumerable languages.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Successor-invariance in the finite 有限情况下的后继不变性
Pub Date : 2003-06-22 DOI: 10.1109/LICS.2003.1210054
Benjamin Rossman
A first-order sentence /spl theta/ of vocabulary /spl sigma/ /spl cup/ {S} is successor-invariant in the finite if for every finite /spl sigma/-structure M and successor relations S/sub 1/ and S/sub 2/ on M, (M, S/sub 1/) /spl vDash/ /spl theta/ /spl hArr/ (M, S/sub 2/) /spl vDash/ /spl theta/. In this paper I give an example of a non-first-order definable class of finite structures, which is, however, defined by a successor-invariant first-order sentence. This strengthens a corresponding result for order-invariant in the finite, due to Y. Gurevich.
词汇/spl sigma/ /spl cup/ {S}的一阶句子/spl theta/对于每一个有限的/spl sigma/-结构M和M上的后继关系S/sub 1/和S/sub 2/, (M, S/sub 1/) /spl vDash/ /spl theta/ /spl hArr/ (M, S/sub 2/) /spl vDash/ /spl theta/ /spl theta/,在有限if中是后继不变的。本文给出了一类有限结构的非一阶可定义的例子,然而,它是由一个后继不变的一阶句子来定义的。这加强了Y. Gurevich在有限条件下的阶不变的相应结果。
{"title":"Successor-invariance in the finite","authors":"Benjamin Rossman","doi":"10.1109/LICS.2003.1210054","DOIUrl":"https://doi.org/10.1109/LICS.2003.1210054","url":null,"abstract":"A first-order sentence /spl theta/ of vocabulary /spl sigma/ /spl cup/ {S} is successor-invariant in the finite if for every finite /spl sigma/-structure M and successor relations S/sub 1/ and S/sub 2/ on M, (M, S/sub 1/) /spl vDash/ /spl theta/ /spl hArr/ (M, S/sub 2/) /spl vDash/ /spl theta/. In this paper I give an example of a non-first-order definable class of finite structures, which is, however, defined by a successor-invariant first-order sentence. This strengthens a corresponding result for order-invariant in the finite, due to Y. Gurevich.","PeriodicalId":280809,"journal":{"name":"18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1