[{"type":"technical_report","status":"public","keyword":["run-time verification","software engineering","implicit specification"],"_id":"9946","department":[{"_id":"ToHe"}],"file_date_updated":"2021-09-03T12:34:28Z","date_updated":"2023-08-14T07:20:29Z","ddc":["005"],"alternative_title":["IST Austria Technical Report"],"month":"09","abstract":[{"text":"We argue that the time is ripe to investigate differential monitoring, in which the specification of a program's behavior is implicitly given by a second program implementing the same informal specification. Similar ideas have been proposed before, and are currently implemented in restricted form for testing and specialized run-time analyses, aspects of which we combine. We discuss the challenges of implementing differential monitoring as a general-purpose, black-box run-time monitoring framework, and present promising results of a preliminary implementation, showing low monitoring overheads for diverse programs.","lang":"eng"}],"oa_version":"Published Version","related_material":{"record":[{"id":"9281","status":"public","relation":"other"},{"relation":"shorter_version","status":"public","id":"10108"}]},"publication_identifier":{"issn":["2664-1690"]},"publication_status":"published","file":[{"file_id":"9948","checksum":"0f9aafd59444cb6bdca6925d163ab946","relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_name":"differentialmonitoring-techreport.pdf","date_created":"2021-08-20T19:59:44Z","creator":"fmuehlbo","file_size":"320453","date_updated":"2021-09-03T12:34:28Z"}],"language":[{"iso":"eng"}],"project":[{"call_identifier":"FWF","_id":"25F42A32-B435-11E9-9278-68D0E5697425","name":"The Wittgenstein Prize","grant_number":"Z211"}],"author":[{"full_name":"Mühlböck, Fabian","orcid":"0000-0003-1548-0177","last_name":"Mühlböck","id":"6395C5F6-89DF-11E9-9C97-6BDFE5697425","first_name":"Fabian"},{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-2985-7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger"}],"article_processing_charge":"No","title":"Differential monitoring","citation":{"ista":"Mühlböck F, Henzinger TA. 2021. Differential monitoring, IST Austria, 17p.","chicago":"Mühlböck, Fabian, and Thomas A Henzinger. Differential Monitoring. IST Austria, 2021. https://doi.org/10.15479/AT:ISTA:9946.","apa":"Mühlböck, F., & Henzinger, T. A. (2021). Differential monitoring. IST Austria. https://doi.org/10.15479/AT:ISTA:9946","ama":"Mühlböck F, Henzinger TA. Differential Monitoring. IST Austria; 2021. doi:10.15479/AT:ISTA:9946","ieee":"F. Mühlböck and T. A. Henzinger, Differential monitoring. IST Austria, 2021.","short":"F. Mühlböck, T.A. Henzinger, Differential Monitoring, IST Austria, 2021.","mla":"Mühlböck, Fabian, and Thomas A. Henzinger. Differential Monitoring. IST Austria, 2021, doi:10.15479/AT:ISTA:9946."},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","publisher":"IST Austria","oa":1,"acknowledgement":"The authors would like to thank Borzoo Bonakdarpour, Derek Dreyer, Adrian Francalanza, Owolabi Legunsen, Matthew Milano, Manuel Rigger, Cesar Sanchez, and the members of the IST Verification Seminar for their helpful comments and insights on various stages of this work, as well as the reviewers of RV’21 for their helpful suggestions on the actual paper.","page":"17","doi":"10.15479/AT:ISTA:9946","date_published":"2021-09-01T00:00:00Z","date_created":"2021-08-20T20:00:37Z","has_accepted_license":"1","year":"2021","day":"01"},{"type":"technical_report","status":"public","keyword":["Battery","Lithium metal","Lithium-sulphur","Lithium-air","All-solid-state"],"_id":"8067","file_date_updated":"2020-07-14T12:48:08Z","department":[{"_id":"StFr"}],"date_updated":"2023-08-22T09:20:36Z","ddc":["540"],"alternative_title":["IST Austria Technical Report"],"month":"07","abstract":[{"lang":"eng","text":"With the lithium-ion technology approaching its intrinsic limit with graphite-based anodes, lithium metal is recently receiving renewed interest from the battery community as potential high capacity anode for next-generation rechargeable batteries. In this focus paper, we review the main advances in this field since the first attempts in the\r\nmid-1970s. Strategies for enabling reversible cycling and avoiding dendrite growth are thoroughly discussed, including specific applications in all-solid-state (polymeric and inorganic), Lithium-sulphur and Li-O2 (air) batteries. A particular attention is paid to review recent developments in regard of prototype manufacturing and current state-ofthe-art of these battery technologies with respect to the 2030 targets of the EU Integrated Strategic Energy Technology Plan (SET-Plan) Action 7."}],"oa_version":"Published Version","related_material":{"record":[{"status":"public","id":"8361","relation":"later_version"}]},"publication_identifier":{"issn":["2664-1690"]},"publication_status":"submitted","file":[{"date_created":"2020-07-02T07:36:04Z","file_name":"20200612_JPS_review_Li_metal_submitted.pdf","creator":"dernst","date_updated":"2020-07-14T12:48:08Z","file_size":2612498,"file_id":"8076","checksum":"d183ca1465a1cbb4f8db27875cd156f7","access_level":"open_access","relation":"main_file","content_type":"application/pdf"}],"language":[{"iso":"eng"}],"author":[{"first_name":"Alberto","last_name":"Varzi","full_name":"Varzi, Alberto"},{"last_name":"Thanner","full_name":"Thanner, Katharina","first_name":"Katharina"},{"first_name":"Roberto","full_name":"Scipioni, Roberto","last_name":"Scipioni"},{"full_name":"Di Lecce, Daniele","last_name":"Di Lecce","first_name":"Daniele"},{"last_name":"Hassoun","full_name":"Hassoun, Jusef","first_name":"Jusef"},{"first_name":"Susanne","full_name":"Dörfler, Susanne","last_name":"Dörfler"},{"full_name":"Altheus, Holger","last_name":"Altheus","first_name":"Holger"},{"first_name":"Stefan","full_name":"Kaskel, Stefan","last_name":"Kaskel"},{"first_name":"Christian","full_name":"Prehal, Christian","last_name":"Prehal"},{"orcid":"0000-0003-2902-5319","full_name":"Freunberger, Stefan Alexander","last_name":"Freunberger","id":"A8CA28E6-CE23-11E9-AD2D-EC27E6697425","first_name":"Stefan Alexander"}],"article_processing_charge":"No","title":"Current status and future perspectives of Lithium metal batteries","citation":{"mla":"Varzi, Alberto, et al. Current Status and Future Perspectives of Lithium Metal Batteries. IST Austria, doi:10.15479/AT:ISTA:8067.","ieee":"A. Varzi et al., Current status and future perspectives of Lithium metal batteries. IST Austria.","short":"A. Varzi, K. Thanner, R. Scipioni, D. Di Lecce, J. Hassoun, S. Dörfler, H. Altheus, S. Kaskel, C. Prehal, S.A. Freunberger, Current Status and Future Perspectives of Lithium Metal Batteries, IST Austria, n.d.","ama":"Varzi A, Thanner K, Scipioni R, et al. Current Status and Future Perspectives of Lithium Metal Batteries. IST Austria doi:10.15479/AT:ISTA:8067","apa":"Varzi, A., Thanner, K., Scipioni, R., Di Lecce, D., Hassoun, J., Dörfler, S., … Freunberger, S. A. (n.d.). Current status and future perspectives of Lithium metal batteries. IST Austria. https://doi.org/10.15479/AT:ISTA:8067","chicago":"Varzi, Alberto, Katharina Thanner, Roberto Scipioni, Daniele Di Lecce, Jusef Hassoun, Susanne Dörfler, Holger Altheus, Stefan Kaskel, Christian Prehal, and Stefan Alexander Freunberger. Current Status and Future Perspectives of Lithium Metal Batteries. IST Austria, n.d. https://doi.org/10.15479/AT:ISTA:8067.","ista":"Varzi A, Thanner K, Scipioni R, Di Lecce D, Hassoun J, Dörfler S, Altheus H, Kaskel S, Prehal C, Freunberger SA. Current status and future perspectives of Lithium metal batteries, IST Austria, 63p."},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","publisher":"IST Austria","oa":1,"page":"63","date_published":"2020-07-01T00:00:00Z","doi":"10.15479/AT:ISTA:8067","date_created":"2020-06-30T07:37:39Z","has_accepted_license":"1","year":"2020","day":"01"},{"pubrep_id":"1066","status":"public","type":"technical_report","_id":"5457","file_date_updated":"2020-07-14T12:47:00Z","title":"Cost analysis of nondeterministic probabilistic programs","author":[{"first_name":"1","last_name":"Anonymous","full_name":"Anonymous, 1"},{"first_name":"2","full_name":"Anonymous, 2","last_name":"Anonymous"},{"full_name":"Anonymous, 3","last_name":"Anonymous","first_name":"3"},{"first_name":"4","full_name":"Anonymous, 4","last_name":"Anonymous"},{"full_name":"Anonymous, 5","last_name":"Anonymous","first_name":"5"},{"first_name":"6","last_name":"Anonymous","full_name":"Anonymous, 6"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"date_updated":"2023-08-25T08:07:48Z","citation":{"ieee":"1 Anonymous, 2 Anonymous, 3 Anonymous, 4 Anonymous, 5 Anonymous, and 6 Anonymous, Cost analysis of nondeterministic probabilistic programs. IST Austria, 2018.","short":"1 Anonymous, 2 Anonymous, 3 Anonymous, 4 Anonymous, 5 Anonymous, 6 Anonymous, Cost Analysis of Nondeterministic Probabilistic Programs, IST Austria, 2018.","ama":"Anonymous 1, Anonymous 2, Anonymous 3, Anonymous 4, Anonymous 5, Anonymous 6. Cost Analysis of Nondeterministic Probabilistic Programs. IST Austria; 2018.","apa":"Anonymous, 1, Anonymous, 2, Anonymous, 3, Anonymous, 4, Anonymous, 5, & Anonymous, 6. (2018). Cost analysis of nondeterministic probabilistic programs. IST Austria.","mla":"Anonymous, 1, et al. Cost Analysis of Nondeterministic Probabilistic Programs. IST Austria, 2018.","ista":"Anonymous 1, Anonymous 2, Anonymous 3, Anonymous 4, Anonymous 5, Anonymous 6. 2018. Cost analysis of nondeterministic probabilistic programs, IST Austria, 27p.","chicago":"Anonymous, 1, 2 Anonymous, 3 Anonymous, 4 Anonymous, 5 Anonymous, and 6 Anonymous. Cost Analysis of Nondeterministic Probabilistic Programs. IST Austria, 2018."},"month":"11","oa":1,"publisher":"IST Austria","scopus_import":1,"alternative_title":["IST Austria Technical Report"],"oa_version":"Published Version","abstract":[{"lang":"eng","text":"We consider the problem of expected cost analysis over nondeterministic probabilistic programs, which aims at automated methods for analyzing the resource-usage of such programs. Previous approaches for this problem could only handle nonnegative bounded costs. However, in many scenarios, such as queuing networks or analysis of cryptocurrency protocols, both positive and negative costs are necessary and the costs are unbounded as well.\r\n\r\nIn this work, we present a sound and efficient approach to obtain polynomial bounds on the expected accumulated cost of nondeterministic probabilistic programs. Our approach can handle (a) general positive and negative costs with bounded updates in variables; and (b) nonnegative costs with general updates to variables. We show that several natural examples which could not be handled by previous approaches are captured in our framework.\r\n\r\nMoreover, our approach leads to an efficient polynomial-time algorithm, while no previous approach for cost analysis of probabilistic programs could guarantee polynomial runtime. Finally, we show the effectiveness of our approach by presenting experimental results on a variety of programs, motivated by real-world applications, for which we efficiently synthesize tight resource-usage bounds."}],"date_created":"2018-12-12T11:39:26Z","related_material":{"record":[{"relation":"later_version","status":"public","id":"6175"}]},"date_published":"2018-11-11T00:00:00Z","page":"27","language":[{"iso":"eng"}],"day":"11","file":[{"access_level":"open_access","relation":"main_file","content_type":"application/pdf","file_id":"5493","checksum":"ba3adafd36fe200385ccda583063b9eb","creator":"system","date_updated":"2020-07-14T12:47:00Z","file_size":4202966,"date_created":"2018-12-12T11:53:32Z","file_name":"IST-2018-1066-v1+1_techreport.pdf"},{"checksum":"6cf3a19164bb8e5048a9c8c84dfd9fa3","file_id":"6402","access_level":"closed","relation":"main_file","content_type":"text/plain","date_created":"2019-05-10T13:22:12Z","file_name":"authors-names.txt","creator":"dernst","date_updated":"2020-07-14T12:47:00Z","file_size":322}],"year":"2018","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]}},{"article_processing_charge":"No","author":[{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu"},{"first_name":"Bhavya","last_name":"Choudhary","full_name":"Choudhary, Bhavya"},{"last_name":"Pavlogiannis","full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722","id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas"}],"title":"Optimal Dyck reachability for data-dependence and alias analysis","citation":{"ista":"Chatterjee K, Choudhary B, Pavlogiannis A. 2017. Optimal Dyck reachability for data-dependence and alias analysis, IST Austria, 37p.","chicago":"Chatterjee, Krishnendu, Bhavya Choudhary, and Andreas Pavlogiannis. Optimal Dyck Reachability for Data-Dependence and Alias Analysis. IST Austria, 2017. https://doi.org/10.15479/AT:IST-2017-870-v1-1.","ieee":"K. Chatterjee, B. Choudhary, and A. Pavlogiannis, Optimal Dyck reachability for data-dependence and alias analysis. IST Austria, 2017.","short":"K. Chatterjee, B. Choudhary, A. Pavlogiannis, Optimal Dyck Reachability for Data-Dependence and Alias Analysis, IST Austria, 2017.","ama":"Chatterjee K, Choudhary B, Pavlogiannis A. Optimal Dyck Reachability for Data-Dependence and Alias Analysis. IST Austria; 2017. doi:10.15479/AT:IST-2017-870-v1-1","apa":"Chatterjee, K., Choudhary, B., & Pavlogiannis, A. (2017). Optimal Dyck reachability for data-dependence and alias analysis. IST Austria. https://doi.org/10.15479/AT:IST-2017-870-v1-1","mla":"Chatterjee, Krishnendu, et al. Optimal Dyck Reachability for Data-Dependence and Alias Analysis. IST Austria, 2017, doi:10.15479/AT:IST-2017-870-v1-1."},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","oa":1,"publisher":"IST Austria","page":"37","date_created":"2018-12-12T11:39:26Z","doi":"10.15479/AT:IST-2017-870-v1-1","date_published":"2017-10-23T00:00:00Z","year":"2017","has_accepted_license":"1","day":"23","type":"technical_report","pubrep_id":"870","status":"public","_id":"5455","department":[{"_id":"KrCh"}],"file_date_updated":"2020-07-14T12:46:59Z","date_updated":"2023-02-21T15:54:10Z","ddc":["000"],"alternative_title":["IST Austria Technical Report"],"month":"10","abstract":[{"lang":"eng","text":"A fundamental algorithmic problem at the heart of static analysis is Dyck reachability. The input is a graphwhere the edges are labeled with different types of opening and closing parentheses, and the reachabilityinformation is computed via paths whose parentheses are properly matched. We present new results for Dyckreachability problems with applications to alias analysis and data-dependence analysis. Our main contributions,that include improved upper bounds as well as lower bounds that establish optimality guarantees, are asfollows:First, we consider Dyck reachability on bidirected graphs, which is the standard way of performing field-sensitive points-to analysis. Given a bidirected graph withnnodes andmedges, we present: (i) an algorithmwith worst-case running timeO(m+n·α(n)), whereα(n)is the inverse Ackermann function, improving thepreviously knownO(n2)time bound; (ii) a matching lower bound that shows that our algorithm is optimalwrt to worst-case complexity; and (iii) an optimal average-case upper bound ofO(m)time, improving thepreviously knownO(m·logn)bound.Second, we consider the problem of context-sensitive data-dependence analysis, where the task is to obtainanalysis summaries of library code in the presence of callbacks. Our algorithm preprocesses libraries in almostlinear time, after which the contribution of the library in the complexity of the client analysis is only linear,and only wrt the number of call sites.Third, we prove that combinatorial algorithms for Dyck reachability on general graphs with truly sub-cubic bounds cannot be obtained without obtaining sub-cubic combinatorial algorithms for Boolean MatrixMultiplication, which is a long-standing open problem. Thus we establish that the existing combinatorialalgorithms for Dyck reachability are (conditionally) optimal for general graphs. We also show that the samehardness holds for graphs of constant treewidth.Finally, we provide a prototype implementation of our algorithms for both alias analysis and data-dependenceanalysis. Our experimental evaluation demonstrates that the new algorithms significantly outperform allexisting methods on the two problems, over real-world benchmarks."}],"oa_version":"Published Version","related_material":{"record":[{"relation":"later_version","id":"10416","status":"public"}]},"publication_status":"published","publication_identifier":{"issn":["2664-1690"]},"language":[{"iso":"eng"}],"file":[{"checksum":"177a84a46e3ac17e87b31534ad16a4c9","file_id":"5524","relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_name":"IST-2017-870-v1+1_main.pdf","date_created":"2018-12-12T11:54:02Z","creator":"system","file_size":960491,"date_updated":"2020-07-14T12:46:59Z"}]},{"ddc":["000"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2023-02-23T12:26:54Z","citation":{"ista":"Chalupa M, Chatterjee K, Pavlogiannis A, Sinha N, Vaidya K. 2017. Data-centric dynamic partial order reduction, IST Austria, 36p.","chicago":"Chalupa, Marek, Krishnendu Chatterjee, Andreas Pavlogiannis, Nishant Sinha, and Kapil Vaidya. Data-Centric Dynamic Partial Order Reduction. IST Austria, 2017. https://doi.org/10.15479/AT:IST-2017-872-v1-1.","short":"M. Chalupa, K. Chatterjee, A. Pavlogiannis, N. Sinha, K. Vaidya, Data-Centric Dynamic Partial Order Reduction, IST Austria, 2017.","ieee":"M. Chalupa, K. Chatterjee, A. Pavlogiannis, N. Sinha, and K. Vaidya, Data-centric dynamic partial order reduction. IST Austria, 2017.","apa":"Chalupa, M., Chatterjee, K., Pavlogiannis, A., Sinha, N., & Vaidya, K. (2017). Data-centric dynamic partial order reduction. IST Austria. https://doi.org/10.15479/AT:IST-2017-872-v1-1","ama":"Chalupa M, Chatterjee K, Pavlogiannis A, Sinha N, Vaidya K. Data-Centric Dynamic Partial Order Reduction. IST Austria; 2017. doi:10.15479/AT:IST-2017-872-v1-1","mla":"Chalupa, Marek, et al. Data-Centric Dynamic Partial Order Reduction. IST Austria, 2017, doi:10.15479/AT:IST-2017-872-v1-1."},"department":[{"_id":"KrCh"}],"file_date_updated":"2020-07-14T12:46:59Z","title":"Data-centric dynamic partial order reduction","author":[{"last_name":"Chalupa","full_name":"Chalupa, Marek","first_name":"Marek"},{"orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722","last_name":"Pavlogiannis","first_name":"Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Sinha, Nishant","last_name":"Sinha","first_name":"Nishant"},{"first_name":"Kapil","last_name":"Vaidya","full_name":"Vaidya, Kapil"}],"_id":"5456","status":"public","pubrep_id":"872","type":"technical_report","day":"23","file":[{"relation":"main_file","access_level":"open_access","content_type":"application/pdf","checksum":"d2635c4cf013000f0a1b09e80f9e4ab7","file_id":"5487","creator":"system","file_size":910347,"date_updated":"2020-07-14T12:46:59Z","file_name":"IST-2017-872-v1+1_main.pdf","date_created":"2018-12-12T11:53:26Z"}],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","year":"2017","publication_status":"published","doi":"10.15479/AT:IST-2017-872-v1-1","date_published":"2017-10-23T00:00:00Z","related_material":{"record":[{"relation":"later_version","status":"public","id":"10417"},{"status":"public","id":"5448","relation":"earlier_version"}]},"date_created":"2018-12-12T11:39:26Z","page":"36","oa_version":"Published Version","abstract":[{"lang":"eng","text":"We present a new dynamic partial-order reduction method for stateless model checking of concurrent programs. A common approach for exploring program behaviors relies on enumerating the traces of the program, without storing the visited states (aka stateless exploration). As the number of distinct traces grows exponentially, dynamic partial-order reduction (DPOR) techniques have been successfully used to partition the space of traces into equivalence classes (Mazurkiewicz partitioning), with the goal of exploring only few representative traces from each class.\r\nWe introduce a new equivalence on traces under sequential consistency semantics, which we call the observation equivalence. Two traces are observationally equivalent if every read event observes the same write event in both traces. While the traditional Mazurkiewicz equivalence is control-centric, our new definition is data-centric. We show that our observation equivalence is coarser than the Mazurkiewicz equivalence, and in many cases even exponentially coarser. We devise a DPOR exploration of the trace space, called data-centric DPOR, based on the observation equivalence.\r\n1. For acyclic architectures, our algorithm is guaranteed to explore exactly one representative trace from each observation class, while spending polynomial time per class. Hence, our algorithm is optimal wrt the observation equivalence, and in several cases explores exponentially fewer traces than any enumerative method based on the Mazurkiewicz equivalence.\r\n2. For cyclic architectures, we consider an equivalence between traces which is finer than the observation equivalence; but coarser than the Mazurkiewicz equivalence, and in some cases is exponentially coarser. Our data-centric DPOR algorithm remains optimal under this trace equivalence. \r\nFinally, we perform a basic experimental comparison between the existing Mazurkiewicz-based DPOR and our data-centric DPOR on a set of academic benchmarks. Our results show a significant reduction in both running time and the number of explored equivalence classes."}],"month":"10","publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"oa":1},{"_id":"6426","type":"technical_report","status":"public","citation":{"ista":"Henzinger TA, Kragl B, Qadeer S. 2017. Synchronizing the asynchronous, IST Austria, 28p.","chicago":"Henzinger, Thomas A, Bernhard Kragl, and Shaz Qadeer. Synchronizing the Asynchronous. IST Austria, 2017. https://doi.org/10.15479/AT:IST-2018-853-v2-2.","short":"T.A. Henzinger, B. Kragl, S. Qadeer, Synchronizing the Asynchronous, IST Austria, 2017.","ieee":"T. A. Henzinger, B. Kragl, and S. Qadeer, Synchronizing the asynchronous. IST Austria, 2017.","apa":"Henzinger, T. A., Kragl, B., & Qadeer, S. (2017). Synchronizing the asynchronous. IST Austria. https://doi.org/10.15479/AT:IST-2018-853-v2-2","ama":"Henzinger TA, Kragl B, Qadeer S. Synchronizing the Asynchronous. IST Austria; 2017. doi:10.15479/AT:IST-2018-853-v2-2","mla":"Henzinger, Thomas A., et al. Synchronizing the Asynchronous. IST Austria, 2017, doi:10.15479/AT:IST-2018-853-v2-2."},"date_updated":"2023-02-21T16:59:21Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"author":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger"},{"first_name":"Bernhard","id":"320FC952-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-7745-9117","full_name":"Kragl, Bernhard","last_name":"Kragl"},{"last_name":"Qadeer","full_name":"Qadeer, Shaz","first_name":"Shaz"}],"file_date_updated":"2020-07-14T12:47:30Z","title":"Synchronizing the asynchronous","department":[{"_id":"ToHe"}],"abstract":[{"text":"Synchronous programs are easy to specify because the side effects of an operation are finished by the time the invocation of the operation returns to the caller. Asynchronous programs, on the other hand, are difficult to specify because there are side effects due to pending computation scheduled as a result of the invocation of an operation. They are also difficult to verify because of the large number of possible interleavings of concurrent asynchronous computation threads. We show that specifications and correctness proofs for asynchronous programs can be structured by introducing the fiction, for proof purposes, that intermediate, non-quiescent states of asynchronous operations can be ignored. Then, the task of specification becomes relatively simple and the task of verification can be naturally decomposed into smaller sub-tasks. The sub-tasks iteratively summarize, guided by the structure of an asynchronous program, the atomic effect of non-atomic operations and the synchronous effect of asynchronous operations. This structuring of specifications and proofs corresponds to the introduction of multiple layers of stepwise refinement for asynchronous programs. We present the first proof rule, called synchronization, to reduce asynchronous invocations on a lower layer to synchronous invocations on a higher layer. We implemented our proof method in CIVL and evaluated it on a collection of benchmark programs.","lang":"eng"}],"oa_version":"Published Version","oa":1,"alternative_title":["IST Austria Technical Report"],"publisher":"IST Austria","month":"08","year":"2017","publication_status":"published","publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","language":[{"iso":"eng"}],"day":"04","file":[{"checksum":"b48d42725182d7ca10107a118815f4cf","file_id":"6431","content_type":"application/pdf","access_level":"open_access","relation":"main_file","date_created":"2019-05-13T08:14:44Z","file_name":"main(1).pdf","date_updated":"2020-07-14T12:47:30Z","file_size":971347,"creator":"dernst"}],"page":"28","date_created":"2019-05-13T08:15:55Z","doi":"10.15479/AT:IST-2018-853-v2-2","related_material":{"record":[{"id":"133","status":"public","relation":"later_version"}]},"date_published":"2017-08-04T00:00:00Z"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["005"],"date_updated":"2023-02-23T10:06:22Z","citation":{"ama":"Chatterjee K, Pavlogiannis A, Velner Y. Quantitative Interprocedural Analysis. IST Austria; 2016. doi:10.15479/AT:IST-2016-523-v1-1","apa":"Chatterjee, K., Pavlogiannis, A., & Velner, Y. (2016). Quantitative interprocedural analysis. IST Austria. https://doi.org/10.15479/AT:IST-2016-523-v1-1","short":"K. Chatterjee, A. Pavlogiannis, Y. Velner, Quantitative Interprocedural Analysis, IST Austria, 2016.","ieee":"K. Chatterjee, A. Pavlogiannis, and Y. Velner, Quantitative interprocedural analysis. IST Austria, 2016.","mla":"Chatterjee, Krishnendu, et al. Quantitative Interprocedural Analysis. IST Austria, 2016, doi:10.15479/AT:IST-2016-523-v1-1.","ista":"Chatterjee K, Pavlogiannis A, Velner Y. 2016. Quantitative interprocedural analysis, IST Austria, 33p.","chicago":"Chatterjee, Krishnendu, Andreas Pavlogiannis, and Yaron Velner. Quantitative Interprocedural Analysis. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2016-523-v1-1."},"title":"Quantitative interprocedural analysis","file_date_updated":"2020-07-14T12:46:58Z","department":[{"_id":"KrCh"}],"author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X"},{"id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas","last_name":"Pavlogiannis","full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722"},{"first_name":"Yaron","full_name":"Velner, Yaron","last_name":"Velner"}],"_id":"5445","status":"public","pubrep_id":"523","type":"technical_report","day":"31","file":[{"date_updated":"2020-07-14T12:46:58Z","file_size":1012204,"creator":"system","date_created":"2018-12-12T11:53:52Z","file_name":"IST-2016-523-v1+1_main.pdf","content_type":"application/pdf","access_level":"open_access","relation":"main_file","checksum":"cef516fa091925b5868813e355268fb4","file_id":"5513"}],"language":[{"iso":"eng"}],"has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"publication_status":"published","year":"2016","doi":"10.15479/AT:IST-2016-523-v1-1","related_material":{"record":[{"relation":"later_version","status":"public","id":"1604"}]},"date_published":"2016-03-31T00:00:00Z","date_created":"2018-12-12T11:39:22Z","page":"33","oa_version":"Published Version","abstract":[{"text":"We consider the quantitative analysis problem for interprocedural control-flow graphs (ICFGs). The input consists of an ICFG, a positive weight function that assigns every transition a positive integer-valued number, and a labelling of the transitions (events) as good, bad, and neutral events. The weight function assigns to each transition a numerical value that represents ameasure of how good or bad an event is. The quantitative analysis problem asks whether there is a run of the ICFG where the ratio of the sum of the numerical weights of good events versus the sum of weights of bad events in the long-run is at least a given threshold (or equivalently, to compute the maximal ratio among all valid paths in the ICFG). The quantitative analysis problem for ICFGs can be solved in polynomial time, and we present an efficient and practical algorithm for the problem. We show that several problems relevant for static program analysis, such as estimating the worst-case execution time of a program or the average energy consumption of a mobile application, can be modeled in our framework. We have implemented our algorithm as a tool in the Java Soot framework. We demonstrate the effectiveness of our approach with two case studies. First, we show that our framework provides a sound approach (no false positives) for the analysis of inefficiently-used containers. Second, we show that our approach can also be used for static profiling of programs which reasons about methods that are frequently invoked. Our experimental results show that our tool scales to relatively large benchmarks, and discovers relevant and useful information that can be used to optimize performance of the programs. ","lang":"eng"}],"month":"03","alternative_title":["IST Austria Technical Report"],"publisher":"IST Austria","oa":1},{"date_published":"2016-11-09T00:00:00Z","doi":"10.15479/AT:IST-2016-648-v1-1","related_material":{"record":[{"id":"512","status":"public","relation":"later_version"}]},"date_created":"2018-12-12T11:39:24Z","page":"22","day":"09","file":[{"creator":"system","file_size":1264221,"date_updated":"2020-07-14T12:46:58Z","file_name":"IST-2016-648-v1+1_tr.pdf","date_created":"2018-12-12T11:54:07Z","relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_id":"5529","checksum":"8345a8c1e7d7f0cd92516d182b7fc59e"}],"language":[{"iso":"eng"}],"has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"publication_status":"published","year":"2016","month":"11","publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"oa":1,"oa_version":"Updated Version","abstract":[{"lang":"eng","text":"The fixation probability is the probability that a new mutant introduced in a homogeneous population eventually takes over the entire population.\r\nThe fixation probability is a fundamental quantity of natural selection, and known to depend on the population structure.\r\nAmplifiers of natural selection are population structures which increase the fixation probability of advantageous mutants, as compared to the baseline case of well-mixed populations. In this work we focus on symmetric population structures represented as undirected graphs. In the regime of undirected graphs, the strongest amplifier known has been the Star graph, and the existence of undirected graphs with stronger amplification properties has remained open for over a decade.\r\nIn this work we present the Comet and Comet-swarm families of undirected graphs. We show that for a range of fitness values of the mutants, the Comet and Comet-swarm graphs have fixation probability strictly larger than the fixation probability of the Star graph, for fixed population size and at the limit of large populations, respectively."}],"file_date_updated":"2020-07-14T12:46:58Z","department":[{"_id":"KrCh"}],"title":"Amplification on undirected population structures: Comets beat stars","author":[{"first_name":"Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8943-0722","full_name":"Pavlogiannis, Andreas","last_name":"Pavlogiannis"},{"id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","first_name":"Josef","full_name":"Tkadlec, Josef","orcid":"0000-0002-1097-9684","last_name":"Tkadlec"},{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee"},{"full_name":"Nowak, Martin","last_name":"Nowak","first_name":"Martin"}],"ddc":["519"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"mla":"Pavlogiannis, Andreas, et al. Amplification on Undirected Population Structures: Comets Beat Stars. IST Austria, 2016, doi:10.15479/AT:IST-2016-648-v1-1.","short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Amplification on Undirected Population Structures: Comets Beat Stars, IST Austria, 2016.","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Amplification on undirected population structures: Comets beat stars. IST Austria, 2016.","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Amplification on undirected population structures: Comets beat stars. IST Austria. https://doi.org/10.15479/AT:IST-2016-648-v1-1","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Amplification on Undirected Population Structures: Comets Beat Stars. IST Austria; 2016. doi:10.15479/AT:IST-2016-648-v1-1","chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Amplification on Undirected Population Structures: Comets Beat Stars. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2016-648-v1-1.","ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Amplification on undirected population structures: Comets beat stars, IST Austria, 22p."},"date_updated":"2023-02-23T12:22:21Z","status":"public","pubrep_id":"648","type":"technical_report","_id":"5449"},{"citation":{"chicago":"Anonymous, 1, 2 Anonymous, and 3 Anonymous. Termination and Worst-Case Analysis of Recursive Programs. IST Austria, 2016.","ista":"Anonymous 1, Anonymous 2, Anonymous 3. 2016. Termination and worst-case analysis of recursive programs, IST Austria, 26p.","mla":"Anonymous, 1, et al. Termination and Worst-Case Analysis of Recursive Programs. IST Austria, 2016.","ama":"Anonymous 1, Anonymous 2, Anonymous 3. Termination and Worst-Case Analysis of Recursive Programs. IST Austria; 2016.","apa":"Anonymous, 1, Anonymous, 2, & Anonymous, 3. (2016). Termination and worst-case analysis of recursive programs. IST Austria.","short":"1 Anonymous, 2 Anonymous, 3 Anonymous, Termination and Worst-Case Analysis of Recursive Programs, IST Austria, 2016.","ieee":"1 Anonymous, 2 Anonymous, and 3 Anonymous, Termination and worst-case analysis of recursive programs. IST Austria, 2016."},"date_updated":"2020-07-14T23:05:05Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"author":[{"last_name":"Anonymous","full_name":"Anonymous, 1","first_name":"1"},{"full_name":"Anonymous, 2","last_name":"Anonymous","first_name":"2"},{"full_name":"Anonymous, 3","last_name":"Anonymous","first_name":"3"}],"title":"Termination and worst-case analysis of recursive programs","file_date_updated":"2020-07-14T12:46:58Z","_id":"5446","type":"technical_report","status":"public","pubrep_id":"618","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"year":"2016","publication_status":"published","day":"15","file":[{"file_id":"6403","checksum":"689069a7abbb34b21516164cbee9e0df","relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_name":"popl2017a.pdf","date_created":"2019-05-10T13:27:24Z","creator":"dernst","file_size":686241,"date_updated":"2020-07-14T12:46:58Z"},{"file_id":"6404","checksum":"fc08022bfbaac07bac047a9407c0bbb3","relation":"main_file","access_level":"closed","content_type":"text/plain","file_name":"author_names.txt","date_created":"2019-05-10T13:27:31Z","creator":"dernst","file_size":258,"date_updated":"2020-07-14T12:46:58Z"}],"language":[{"iso":"eng"}],"page":"26","date_published":"2016-07-15T00:00:00Z","date_created":"2018-12-12T11:39:23Z","abstract":[{"text":"We study the problem of developing efficient approaches for proving termination of recursive programs with one-dimensional arrays. Ranking functions serve as a sound and complete approach for proving termination of non-recursive programs without array operations. First, we generalize ranking functions to the notion of measure functions, and prove that measure functions (i) provide a sound method to prove termination of recursive programs (with one-dimensional arrays), and (ii) is both sound and complete over recursive programs without array operations. Our second contribution is the synthesis of measure functions of specific forms in polynomial time. More precisely, we prove that (i) polynomial measure functions over recursive programs can be synthesized in polynomial time through Farkas’ Lemma and Handelman’s Theorem, and (ii) measure functions involving logarithm and exponentiation can be synthesized in polynomial time through abstraction of logarithmic or exponential terms and Handelman’s Theorem. A key application of our method is the worst-case analysis of recursive programs. While previous methods obtain worst-case polynomial bounds of the form O(n^k), where k is an integer, our polynomial time methods can synthesize bounds of the form O(n log n), as well as O(n^x), where x is not an integer. We show the applicability of our automated technique to obtain worst-case complexity of classical recursive algorithms such as (i) Merge-Sort, the divideand-\r\nconquer algorithm for the Closest-Pair problem, where we obtain O(n log n) worst-case bound, and (ii) Karatsuba’s algorithm for polynomial multiplication and Strassen’s algorithm for matrix multiplication, where we obtain O(n^x) bound, where x is not an integer and close to the best-known bounds for the respective algorithms. Finally, we present experimental results to demonstrate the\r\neffectiveness of our approach.","lang":"eng"}],"oa_version":"Published Version","publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"oa":1,"month":"07"},{"date_published":"2016-07-15T00:00:00Z","date_created":"2018-12-12T11:39:23Z","page":"20","day":"15","file":[{"file_name":"listofauthors.txt","date_created":"2019-05-10T13:32:16Z","file_size":281,"date_updated":"2020-07-14T12:46:58Z","creator":"dernst","checksum":"cf53cdb6d092e68db0b4a0a1506ef8fb","file_id":"6406","content_type":"text/plain","relation":"main_file","access_level":"closed"},{"creator":"dernst","date_updated":"2020-07-14T12:46:58Z","file_size":563642,"date_created":"2019-05-10T13:32:16Z","file_name":"popl2017b.pdf","access_level":"open_access","relation":"main_file","content_type":"application/pdf","file_id":"6407","checksum":"7bdd94ba13aa0dec9c46887fcf13870b"}],"language":[{"iso":"eng"}],"has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"publication_status":"published","year":"2016","month":"07","alternative_title":["IST Austria Technical Report"],"publisher":"IST Austria","oa":1,"oa_version":"Published Version","abstract":[{"text":"We consider the problem of developing automated techniques to aid the average-case complexity analysis of programs. Several classical textbook algorithms have quite efficient average-case complexity, whereas the corresponding worst-case bounds are either inefficient (e.g., QUICK-SORT), or completely ineffective (e.g., COUPONCOLLECTOR). Since the main focus of average-case analysis is to obtain efficient bounds, we consider bounds that are either logarithmic,\r\nlinear, or almost-linear (O(log n), O(n), O(n · log n),\r\nrespectively, where n represents the size of the input). Our main contribution is a sound approach for deriving such average-case bounds for randomized recursive programs. Our approach is efficient (a simple linear-time algorithm), and it is based on (a) the analysis of recurrence relations induced by randomized algorithms, and (b) a guess-and-check technique. Our approach can infer the asymptotically optimal average-case bounds for classical randomized algorithms, including RANDOMIZED-SEARCH, QUICKSORT, QUICK-SELECT, COUPON-COLLECTOR, where the worstcase\r\nbounds are either inefficient (such as linear as compared to logarithmic of average-case, or quadratic as compared to linear or almost-linear of average-case), or ineffective. We have implemented our approach, and the experimental results show that we obtain the bounds efficiently for various classical algorithms.","lang":"eng"}],"title":"Average-case analysis of programs: Automated recurrence analysis for almost-linear bounds","file_date_updated":"2020-07-14T12:46:58Z","author":[{"full_name":"Anonymous, 1","last_name":"Anonymous","first_name":"1"},{"first_name":"2","last_name":"Anonymous","full_name":"Anonymous, 2"},{"first_name":"3","full_name":"Anonymous, 3","last_name":"Anonymous"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"date_updated":"2020-07-14T23:05:06Z","citation":{"mla":"Anonymous, 1, et al. Average-Case Analysis of Programs: Automated Recurrence Analysis for Almost-Linear Bounds. IST Austria, 2016.","short":"1 Anonymous, 2 Anonymous, 3 Anonymous, Average-Case Analysis of Programs: Automated Recurrence Analysis for Almost-Linear Bounds, IST Austria, 2016.","ieee":"1 Anonymous, 2 Anonymous, and 3 Anonymous, Average-case analysis of programs: Automated recurrence analysis for almost-linear bounds. IST Austria, 2016.","ama":"Anonymous 1, Anonymous 2, Anonymous 3. Average-Case Analysis of Programs: Automated Recurrence Analysis for Almost-Linear Bounds. IST Austria; 2016.","apa":"Anonymous, 1, Anonymous, 2, & Anonymous, 3. (2016). Average-case analysis of programs: Automated recurrence analysis for almost-linear bounds. IST Austria.","chicago":"Anonymous, 1, 2 Anonymous, and 3 Anonymous. Average-Case Analysis of Programs: Automated Recurrence Analysis for Almost-Linear Bounds. IST Austria, 2016.","ista":"Anonymous 1, Anonymous 2, Anonymous 3. 2016. Average-case analysis of programs: Automated recurrence analysis for almost-linear bounds, IST Austria, 20p."},"status":"public","pubrep_id":"619","type":"technical_report","_id":"5447"},{"_id":"5453","pubrep_id":"755","status":"public","type":"technical_report","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"date_updated":"2023-02-23T12:27:07Z","citation":{"chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2017-749-v3-1.","ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Arbitrarily strong amplifiers of natural selection, IST Austria, 34p.","mla":"Pavlogiannis, Andreas, et al. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria, 2016, doi:10.15479/AT:IST-2017-749-v3-1.","short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Arbitrarily Strong Amplifiers of Natural Selection, IST Austria, 2016.","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Arbitrarily strong amplifiers of natural selection. IST Austria, 2016.","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria; 2016. doi:10.15479/AT:IST-2017-749-v3-1","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Arbitrarily strong amplifiers of natural selection. IST Austria. https://doi.org/10.15479/AT:IST-2017-749-v3-1"},"department":[{"_id":"KrCh"}],"title":"Arbitrarily strong amplifiers of natural selection","file_date_updated":"2020-07-14T12:46:59Z","author":[{"last_name":"Pavlogiannis","orcid":"0000-0002-8943-0722","full_name":"Pavlogiannis, Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas"},{"id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","first_name":"Josef","orcid":"0000-0002-1097-9684","full_name":"Tkadlec, Josef","last_name":"Tkadlec"},{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu"},{"full_name":"Nowak, Martin","last_name":"Nowak","first_name":"Martin"}],"oa_version":"Published Version","month":"12","oa":1,"publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"language":[{"iso":"eng"}],"day":"30","file":[{"checksum":"83b0313dab3bff4bdb6ac38695026fda","file_id":"5474","access_level":"open_access","relation":"main_file","content_type":"application/pdf","date_created":"2018-12-12T11:53:13Z","file_name":"IST-2017-749-v3+1_main.pdf","creator":"system","date_updated":"2020-07-14T12:46:59Z","file_size":1015647}],"publication_status":"published","year":"2016","publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","date_created":"2018-12-12T11:39:25Z","related_material":{"record":[{"id":"5452","status":"public","relation":"earlier_version"}]},"doi":"10.15479/AT:IST-2017-749-v3-1","date_published":"2016-12-30T00:00:00Z","page":"34"},{"_id":"5451","status":"public","pubrep_id":"728","type":"technical_report","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"citation":{"ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Strong amplifiers of natural selection, IST Austria, 34p.","chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Strong Amplifiers of Natural Selection. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2016-728-v1-1.","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Strong Amplifiers of Natural Selection. IST Austria; 2016. doi:10.15479/AT:IST-2016-728-v1-1","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Strong amplifiers of natural selection. IST Austria. https://doi.org/10.15479/AT:IST-2016-728-v1-1","short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Strong Amplifiers of Natural Selection, IST Austria, 2016.","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Strong amplifiers of natural selection. IST Austria, 2016.","mla":"Pavlogiannis, Andreas, et al. Strong Amplifiers of Natural Selection. IST Austria, 2016, doi:10.15479/AT:IST-2016-728-v1-1."},"date_updated":"2023-02-23T12:27:05Z","file_date_updated":"2020-07-14T12:46:59Z","title":"Strong amplifiers of natural selection","department":[{"_id":"KrCh"}],"author":[{"id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas","last_name":"Pavlogiannis","full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722"},{"last_name":"Tkadlec","full_name":"Tkadlec, Josef","orcid":"0000-0002-1097-9684","id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","first_name":"Josef"},{"last_name":"Chatterjee","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Nowak, Martin","last_name":"Nowak","first_name":"Martin"}],"oa_version":"Published Version","month":"12","alternative_title":["IST Austria Technical Report"],"publisher":"IST Austria","oa":1,"file":[{"relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_id":"5465","checksum":"7b8bb17c322c0556acba6ac169fa71c1","creator":"system","file_size":1014732,"date_updated":"2020-07-14T12:46:59Z","file_name":"IST-2016-728-v1+1_main.pdf","date_created":"2018-12-12T11:53:04Z"}],"day":"30","language":[{"iso":"eng"}],"publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","year":"2016","publication_status":"published","date_published":"2016-12-30T00:00:00Z","doi":"10.15479/AT:IST-2016-728-v1-1","date_created":"2018-12-12T11:39:24Z","page":"34"},{"file_date_updated":"2020-07-14T12:46:58Z","title":"Data-centric dynamic partial order reduction","external_id":{"arxiv":["1610.01188"]},"author":[{"full_name":"Anonymous, 1","last_name":"Anonymous","first_name":"1"},{"first_name":"2","last_name":"Anonymous","full_name":"Anonymous, 2"},{"first_name":"3","last_name":"Anonymous","full_name":"Anonymous, 3"},{"first_name":"4","full_name":"Anonymous, 4","last_name":"Anonymous"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"citation":{"ista":"Anonymous 1, Anonymous 2, Anonymous 3, Anonymous 4. 2016. Data-centric dynamic partial order reduction, IST Austria, 20p.","chicago":"Anonymous, 1, 2 Anonymous, 3 Anonymous, and 4 Anonymous. Data-Centric Dynamic Partial Order Reduction. IST Austria, 2016.","apa":"Anonymous, 1, Anonymous, 2, Anonymous, 3, & Anonymous, 4. (2016). Data-centric dynamic partial order reduction. IST Austria.","ama":"Anonymous 1, Anonymous 2, Anonymous 3, Anonymous 4. Data-Centric Dynamic Partial Order Reduction. IST Austria; 2016.","ieee":"1 Anonymous, 2 Anonymous, 3 Anonymous, and 4 Anonymous, Data-centric dynamic partial order reduction. IST Austria, 2016.","short":"1 Anonymous, 2 Anonymous, 3 Anonymous, 4 Anonymous, Data-Centric Dynamic Partial Order Reduction, IST Austria, 2016.","mla":"Anonymous, 1, et al. Data-Centric Dynamic Partial Order Reduction. IST Austria, 2016."},"date_updated":"2023-02-23T12:27:16Z","pubrep_id":"620","status":"public","type":"technical_report","_id":"5448","date_created":"2018-12-12T11:39:23Z","related_material":{"record":[{"status":"public","id":"10417","relation":"later_version"},{"relation":"later_version","id":"5456","status":"public"}]},"date_published":"2016-07-15T00:00:00Z","page":"20","language":[{"iso":"eng"}],"day":"15","file":[{"date_created":"2018-12-12T11:53:45Z","file_name":"IST-2016-620-v1+1_main.pdf","creator":"system","date_updated":"2020-07-14T12:46:58Z","file_size":538881,"checksum":"1d69252d66bcdf782615ddfb911d2957","file_id":"5506","access_level":"open_access","relation":"main_file","content_type":"application/pdf"},{"relation":"main_file","access_level":"closed","content_type":"text/plain","checksum":"deabb0eb8f237cae4f9542b28b0b6eb2","file_id":"6405","creator":"dernst","file_size":121,"date_updated":"2020-07-14T12:46:58Z","file_name":"authornames.txt","date_created":"2019-05-10T13:30:40Z"}],"year":"2016","publication_status":"published","publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","month":"07","oa":1,"publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"oa_version":"Published Version","abstract":[{"lang":"eng","text":"We present a new dynamic partial-order reduction method for stateless model checking of concurrent programs. A common approach for exploring program behaviors relies on enumerating the traces of the program, without storing the visited states (aka stateless exploration). As the number of distinct traces grows exponentially, dynamic partial-order reduction (DPOR) techniques have been successfully used to partition the space of traces into equivalence classes (Mazurkiewicz partitioning), with the goal of exploring only few representative traces from each class.\r\nWe introduce a new equivalence on traces under sequential consistency semantics, which we call the observation equivalence. Two traces are observationally equivalent if every read event observes the same write event in both traces. While the traditional Mazurkiewicz equivalence is control-centric, our new definition is data-centric. We show that our observation equivalence is coarser than the Mazurkiewicz equivalence, and in many cases even exponentially coarser. We devise a DPOR exploration of the trace space, called data-centric DPOR, based on the observation equivalence.\r\n1. For acyclic architectures, our algorithm is guaranteed to explore exactly one representative trace from each observation class, while spending polynomial time per class. Hence, our algorithm is optimal wrt the observation equivalence, and in several cases explores exponentially fewer traces than any enumerative method based on the Mazurkiewicz equivalence.\r\n2. For cyclic architectures, we consider an equivalence between traces which is finer than the observation equivalence; but coarser than the Mazurkiewicz equivalence, and in some cases is exponentially coarser. Our data-centric DPOR algorithm remains optimal under this trace equivalence. \r\nFinally, we perform a basic experimental comparison between the existing Mazurkiewicz-based DPOR and our data-centric DPOR on a set of academic benchmarks. Our results show a significant reduction in both running time and the number of explored equivalence classes."}]},{"date_published":"2016-12-30T00:00:00Z","doi":"10.15479/AT:IST-2017-728-v2-1","date_created":"2018-12-12T11:39:25Z","page":"32","day":"30","has_accepted_license":"1","year":"2016","publisher":"IST Austria","oa":1,"title":"Arbitrarily strong amplifiers of natural selection","author":[{"last_name":"Pavlogiannis","full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722","id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas"},{"last_name":"Tkadlec","full_name":"Tkadlec, Josef","orcid":"0000-0002-1097-9684","id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","first_name":"Josef"},{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee"},{"last_name":"Nowak","full_name":"Nowak, Martin","first_name":"Martin"}],"article_processing_charge":"No","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"mla":"Pavlogiannis, Andreas, et al. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria, 2016, doi:10.15479/AT:IST-2017-728-v2-1.","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Arbitrarily strong amplifiers of natural selection. IST Austria, 2016.","short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Arbitrarily Strong Amplifiers of Natural Selection, IST Austria, 2016.","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Arbitrarily strong amplifiers of natural selection. IST Austria. https://doi.org/10.15479/AT:IST-2017-728-v2-1","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria; 2016. doi:10.15479/AT:IST-2017-728-v2-1","chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2017-728-v2-1.","ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Arbitrarily strong amplifiers of natural selection, IST Austria, 32p."},"project":[{"call_identifier":"FP7","_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications"}],"related_material":{"record":[{"status":"public","id":"5453","relation":"later_version"},{"relation":"popular_science","status":"public","id":"5559"}]},"ec_funded":1,"file":[{"file_name":"IST-2017-728-v2+1_main.pdf","date_created":"2018-12-12T11:52:59Z","creator":"system","file_size":811558,"date_updated":"2020-07-14T12:46:59Z","file_id":"5460","checksum":"58e895f26c82f560c0f0989bf8b08599","relation":"main_file","access_level":"open_access","content_type":"application/pdf"}],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["2664-1690"]},"publication_status":"published","month":"12","alternative_title":["IST Austria Technical Report"],"oa_version":"Published Version","department":[{"_id":"KrCh"}],"file_date_updated":"2020-07-14T12:46:59Z","ddc":["000"],"date_updated":"2024-02-21T13:48:42Z","status":"public","pubrep_id":"750","type":"technical_report","_id":"5452"},{"date_created":"2018-12-12T11:39:17Z","doi":"10.15479/AT:IST-2015-322-v1-1","date_published":"2015-02-19T00:00:00Z","page":"25","language":[{"iso":"eng"}],"file":[{"date_created":"2018-12-12T11:53:31Z","file_name":"IST-2015-322-v1+1_safetygames.pdf","date_updated":"2020-07-14T12:46:53Z","file_size":661015,"creator":"system","checksum":"bfb858262c30445b8e472c40069178a2","file_id":"5491","content_type":"application/pdf","access_level":"open_access","relation":"main_file"}],"day":"19","year":"2015","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"month":"02","oa":1,"publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"oa_version":"Published Version","abstract":[{"lang":"eng","text":"We consider finite-state concurrent stochastic games, played by k>=2 players for an infinite number of rounds, where in every round, each player simultaneously and independently of the other players chooses an action, whereafter the successor state is determined by a probability distribution given by the current state and the chosen actions. We consider reachability objectives that given a target set of states require that some state in the target set is visited, and the dual safety objectives that given a target set require that only states in the target set are visited. We are interested in the complexity of stationary strategies measured by their patience, which is defined as the inverse of the smallest non-zero probability employed.\r\n\r\n Our main results are as follows: We show that in two-player zero-sum concurrent stochastic games (with reachability objective for one player and the complementary safety objective for the other player): (i) the optimal bound on the patience of optimal and epsilon-optimal strategies, for both players is doubly exponential; and (ii) even in games with a single non-absorbing state exponential (in the number of actions) patience is necessary. In general we study the class of non-zero-sum games admitting epsilon-Nash equilibria. We show that if there is at least one player with reachability objective, then doubly-exponential patience is needed in general for epsilon-Nash equilibrium strategies, whereas in contrast if all players have safety objectives, then the optimal bound on patience for epsilon-Nash equilibrium strategies is only exponential."}],"file_date_updated":"2020-07-14T12:46:53Z","department":[{"_id":"KrCh"}],"title":"The patience of concurrent stochastic games with safety and reachability objectives","author":[{"last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0003-4783-0389","full_name":"Ibsen-Jensen, Rasmus","last_name":"Ibsen-Jensen","first_name":"Rasmus","id":"3B699956-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Hansen","full_name":"Hansen, Kristoffer","first_name":"Kristoffer"}],"ddc":["005","519"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"ista":"Chatterjee K, Ibsen-Jensen R, Hansen K. 2015. The patience of concurrent stochastic games with safety and reachability objectives, IST Austria, 25p.","chicago":"Chatterjee, Krishnendu, Rasmus Ibsen-Jensen, and Kristoffer Hansen. The Patience of Concurrent Stochastic Games with Safety and Reachability Objectives. IST Austria, 2015. https://doi.org/10.15479/AT:IST-2015-322-v1-1.","ama":"Chatterjee K, Ibsen-Jensen R, Hansen K. The Patience of Concurrent Stochastic Games with Safety and Reachability Objectives. IST Austria; 2015. doi:10.15479/AT:IST-2015-322-v1-1","apa":"Chatterjee, K., Ibsen-Jensen, R., & Hansen, K. (2015). The patience of concurrent stochastic games with safety and reachability objectives. IST Austria. https://doi.org/10.15479/AT:IST-2015-322-v1-1","ieee":"K. Chatterjee, R. Ibsen-Jensen, and K. Hansen, The patience of concurrent stochastic games with safety and reachability objectives. IST Austria, 2015.","short":"K. Chatterjee, R. Ibsen-Jensen, K. Hansen, The Patience of Concurrent Stochastic Games with Safety and Reachability Objectives, IST Austria, 2015.","mla":"Chatterjee, Krishnendu, et al. The Patience of Concurrent Stochastic Games with Safety and Reachability Objectives. IST Austria, 2015, doi:10.15479/AT:IST-2015-322-v1-1."},"date_updated":"2021-01-12T08:02:13Z","pubrep_id":"322","status":"public","type":"technical_report","_id":"5431"},{"abstract":[{"text":"DEC-POMDPs extend POMDPs to a multi-agent setting, where several agents operate in an uncertain environment independently to achieve a joint objective. DEC-POMDPs have been studied with finite-horizon and infinite-horizon discounted-sum objectives, and there exist solvers both for exact and approximate solutions. In this work we consider Goal-DEC-POMDPs, where given a set of target states, the objective is to ensure that the target set is reached with minimal cost. We consider the indefinite-horizon (infinite-horizon with either discounted-sum, or undiscounted-sum, where absorbing goal states have zero-cost) problem. We present a new method to solve the problem that extends methods for finite-horizon DEC- POMDPs and the RTDP-Bel approach for POMDPs. We present experimental results on several examples, and show our approach presents promising results.","lang":"eng"}],"oa_version":"Published Version","oa":1,"publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"month":"02","year":"2015","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"language":[{"iso":"eng"}],"day":"19","file":[{"date_created":"2018-12-12T11:53:14Z","file_name":"IST-2015-326-v1+1_main.pdf","date_updated":"2020-07-14T12:46:53Z","file_size":378162,"creator":"system","file_id":"5475","checksum":"8542fd0b10aed7811cd41077b8ccb632","content_type":"application/pdf","access_level":"open_access","relation":"main_file"},{"content_type":"text/plain","access_level":"closed","relation":"main_file","checksum":"84c31c537bdaf7a91909f18d25d640ab","file_id":"6317","date_updated":"2020-07-14T12:46:53Z","file_size":64,"creator":"dernst","date_created":"2019-04-16T13:00:33Z","file_name":"IST-2015-326-v1+2_authors.txt"}],"page":"16","date_created":"2018-12-12T11:39:18Z","date_published":"2015-02-19T00:00:00Z","_id":"5434","type":"technical_report","pubrep_id":"326","status":"public","date_updated":"2020-07-14T23:04:59Z","citation":{"mla":"Anonymous, 1, and 2 Anonymous. Optimal Cost Indefinite-Horizon Reachability in Goal DEC-POMDPs. IST Austria, 2015.","apa":"Anonymous, 1, & Anonymous, 2. (2015). Optimal cost indefinite-horizon reachability in goal DEC-POMDPs. IST Austria.","ama":"Anonymous 1, Anonymous 2. Optimal Cost Indefinite-Horizon Reachability in Goal DEC-POMDPs. IST Austria; 2015.","ieee":"1 Anonymous and 2 Anonymous, Optimal cost indefinite-horizon reachability in goal DEC-POMDPs. IST Austria, 2015.","short":"1 Anonymous, 2 Anonymous, Optimal Cost Indefinite-Horizon Reachability in Goal DEC-POMDPs, IST Austria, 2015.","chicago":"Anonymous, 1, and 2 Anonymous. Optimal Cost Indefinite-Horizon Reachability in Goal DEC-POMDPs. IST Austria, 2015.","ista":"Anonymous 1, Anonymous 2. 2015. Optimal cost indefinite-horizon reachability in goal DEC-POMDPs, IST Austria, 16p."},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"author":[{"first_name":"1","full_name":"Anonymous, 1","last_name":"Anonymous"},{"last_name":"Anonymous","full_name":"Anonymous, 2","first_name":"2"}],"file_date_updated":"2020-07-14T12:46:53Z","title":"Optimal cost indefinite-horizon reachability in goal DEC-POMDPs"},{"oa":1,"alternative_title":["IST Austria Technical Report"],"publisher":"IST Austria","month":"01","abstract":[{"lang":"eng","text":"We consider Markov decision processes (MDPs) with multiple limit-average (or mean-payoff) objectives. \r\nThere have been two different views: (i) the expectation semantics, where the goal is to optimize the expected mean-payoff objective, and (ii) the satisfaction semantics, where the goal is to maximize the probability of runs such that the mean-payoff value stays above a given vector. \r\nWe consider the problem where the goal is to optimize the expectation under the constraint that the satisfaction semantics is ensured, and thus consider a generalization that unifies the existing semantics.\r\nOur problem captures the notion of optimization with respect to strategies that are risk-averse (i.e., ensures certain probabilistic guarantee).\r\nOur main results are algorithms for the decision problem which are always polynomial in the size of the MDP. We also show that an approximation of the Pareto-curve can be computed in time polynomial in the size of the MDP, and the approximation factor, but exponential in the number of dimensions.\r\nFinally, we present a complete characterization of the strategy complexity (in terms of memory bounds and randomization) required to solve our problem."}],"oa_version":"Published Version","page":"41","date_created":"2018-12-12T11:39:17Z","doi":"10.15479/AT:IST-2015-318-v1-1","related_material":{"record":[{"relation":"later_version","status":"public","id":"1657"},{"relation":"later_version","status":"public","id":"466"},{"status":"public","id":"5435","relation":"later_version"}]},"date_published":"2015-01-12T00:00:00Z","year":"2015","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","access_level":"open_access","checksum":"e4869a584567c506349abda9c8ec7db3","file_id":"5533","file_size":689863,"date_updated":"2020-07-14T12:46:52Z","creator":"system","file_name":"IST-2015-318-v1+1_main.pdf","date_created":"2018-12-12T11:54:11Z"}],"day":"12","type":"technical_report","pubrep_id":"318","status":"public","_id":"5429","author":[{"orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu"},{"full_name":"Komarkova, Zuzana","last_name":"Komarkova","first_name":"Zuzana"},{"last_name":"Kretinsky","full_name":"Kretinsky, Jan","orcid":"0000-0002-8122-2881","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","first_name":"Jan"}],"title":"Unifying two views on multiple mean-payoff objectives in Markov decision processes","department":[{"_id":"KrCh"}],"file_date_updated":"2020-07-14T12:46:52Z","citation":{"ista":"Chatterjee K, Komarkova Z, Kretinsky J. 2015. Unifying two views on multiple mean-payoff objectives in Markov decision processes, IST Austria, 41p.","chicago":"Chatterjee, Krishnendu, Zuzana Komarkova, and Jan Kretinsky. Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes. IST Austria, 2015. https://doi.org/10.15479/AT:IST-2015-318-v1-1.","ama":"Chatterjee K, Komarkova Z, Kretinsky J. Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes. IST Austria; 2015. doi:10.15479/AT:IST-2015-318-v1-1","apa":"Chatterjee, K., Komarkova, Z., & Kretinsky, J. (2015). Unifying two views on multiple mean-payoff objectives in Markov decision processes. IST Austria. https://doi.org/10.15479/AT:IST-2015-318-v1-1","ieee":"K. Chatterjee, Z. Komarkova, and J. Kretinsky, Unifying two views on multiple mean-payoff objectives in Markov decision processes. IST Austria, 2015.","short":"K. Chatterjee, Z. Komarkova, J. Kretinsky, Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes, IST Austria, 2015.","mla":"Chatterjee, Krishnendu, et al. Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes. IST Austria, 2015, doi:10.15479/AT:IST-2015-318-v1-1."},"date_updated":"2023-02-23T12:26:16Z","ddc":["004"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"file_date_updated":"2020-07-14T12:46:53Z","title":"Unifying two views on multiple mean-payoff objectives in Markov decision processes","department":[{"_id":"KrCh"}],"author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee"},{"last_name":"Komarkova","full_name":"Komarkova, Zuzana","first_name":"Zuzana"},{"id":"44CEF464-F248-11E8-B48F-1D18A9856A87","first_name":"Jan","orcid":"0000-0002-8122-2881","full_name":"Kretinsky, Jan","last_name":"Kretinsky"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["004"],"citation":{"ista":"Chatterjee K, Komarkova Z, Kretinsky J. 2015. Unifying two views on multiple mean-payoff objectives in Markov decision processes, IST Austria, 51p.","chicago":"Chatterjee, Krishnendu, Zuzana Komarkova, and Jan Kretinsky. Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes. IST Austria, 2015. https://doi.org/10.15479/AT:IST-2015-318-v2-1.","short":"K. Chatterjee, Z. Komarkova, J. Kretinsky, Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes, IST Austria, 2015.","ieee":"K. Chatterjee, Z. Komarkova, and J. Kretinsky, Unifying two views on multiple mean-payoff objectives in Markov decision processes. IST Austria, 2015.","ama":"Chatterjee K, Komarkova Z, Kretinsky J. Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes. IST Austria; 2015. doi:10.15479/AT:IST-2015-318-v2-1","apa":"Chatterjee, K., Komarkova, Z., & Kretinsky, J. (2015). Unifying two views on multiple mean-payoff objectives in Markov decision processes. IST Austria. https://doi.org/10.15479/AT:IST-2015-318-v2-1","mla":"Chatterjee, Krishnendu, et al. Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes. IST Austria, 2015, doi:10.15479/AT:IST-2015-318-v2-1."},"date_updated":"2023-02-23T12:26:00Z","pubrep_id":"327","status":"public","type":"technical_report","_id":"5435","date_created":"2018-12-12T11:39:19Z","related_material":{"record":[{"relation":"later_version","id":"1657","status":"public"},{"relation":"later_version","id":"466","status":"public"},{"status":"public","id":"5429","relation":"earlier_version"}]},"doi":"10.15479/AT:IST-2015-318-v2-1","date_published":"2015-02-23T00:00:00Z","page":"51","language":[{"iso":"eng"}],"file":[{"checksum":"75284adec80baabdfe71ff9ebbc27445","file_id":"5525","content_type":"application/pdf","relation":"main_file","access_level":"open_access","file_name":"IST-2015-318-v2+1_main.pdf","date_created":"2018-12-12T11:54:03Z","file_size":717630,"date_updated":"2020-07-14T12:46:53Z","creator":"system"}],"day":"23","publication_status":"published","year":"2015","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"month":"02","oa":1,"publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"oa_version":"Published Version","abstract":[{"text":"We consider Markov decision processes (MDPs) with multiple limit-average (or mean-payoff) objectives. \r\nThere have been two different views: (i) the expectation semantics, where the goal is to optimize the expected mean-payoff objective, and (ii) the satisfaction semantics, where the goal is to maximize the probability of runs such that the mean-payoff value stays above a given vector. \r\nWe consider the problem where the goal is to optimize the expectation under the constraint that the satisfaction semantics is ensured, and thus consider a generalization that unifies the existing semantics. Our problem captures the notion of optimization with respect to strategies that are risk-averse (i.e., ensures certain probabilistic guarantee).\r\nOur main results are algorithms for the decision problem which are always polynomial in the size of the MDP.\r\nWe also show that an approximation of the Pareto-curve can be computed in time polynomial in the size of the MDP, and the approximation factor, but exponential in the number of dimensions. Finally, we present a complete characterization of the strategy complexity (in terms of memory bounds and randomization) required to solve our problem.","lang":"eng"}]},{"page":"29","date_created":"2018-12-12T11:39:19Z","date_published":"2015-04-24T00:00:00Z","doi":"10.15479/AT:IST-2015-170-v2-2","related_material":{"record":[{"relation":"later_version","status":"public","id":"1656"},{"relation":"later_version","status":"public","id":"467"},{"relation":"earlier_version","id":"5415","status":"public"}]},"year":"2015","publication_status":"published","publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","language":[{"iso":"eng"}],"day":"24","file":[{"relation":"main_file","access_level":"open_access","content_type":"application/pdf","checksum":"3c402f47d3669c28d04d1af405a08e3f","file_id":"5541","creator":"system","file_size":569991,"date_updated":"2020-07-14T12:46:54Z","file_name":"IST-2015-170-v2+2_report.pdf","date_created":"2018-12-12T11:54:19Z"}],"oa":1,"publisher":"IST Austria","alternative_title":["IST Austria Technical Report"],"month":"04","abstract":[{"text":"Recently there has been a significant effort to handle quantitative properties in formal verification and synthesis. While weighted automata over finite and infinite words provide a natural and flexible framework to express quantitative properties, perhaps surprisingly, some basic system properties such as average response time cannot be expressed using weighted automata, nor in any other know decidable formalism. In this work, we introduce nested weighted automata as a natural extension of weighted automata which makes it possible to express important quantitative properties such as average response time.\r\nIn nested weighted automata, a master automaton spins off and collects results from weighted slave automata, each of which computes a quantity along a finite portion of an infinite word. Nested weighted automata can be viewed as the quantitative analogue of monitor automata, which are used in run-time verification. We establish an almost complete decidability picture for the basic decision problems about nested weighted automata, and illustrate their applicability in several domains. In particular, nested weighted automata can be used to decide average response time properties.","lang":"eng"}],"oa_version":"Published Version","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee"},{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"},{"last_name":"Otop","full_name":"Otop, Jan","id":"2FC5DA74-F248-11E8-B48F-1D18A9856A87","first_name":"Jan"}],"title":"Nested weighted automata","file_date_updated":"2020-07-14T12:46:54Z","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"citation":{"chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, and Jan Otop. Nested Weighted Automata. IST Austria, 2015. https://doi.org/10.15479/AT:IST-2015-170-v2-2.","ista":"Chatterjee K, Henzinger TA, Otop J. 2015. Nested weighted automata, IST Austria, 29p.","mla":"Chatterjee, Krishnendu, et al. Nested Weighted Automata. IST Austria, 2015, doi:10.15479/AT:IST-2015-170-v2-2.","apa":"Chatterjee, K., Henzinger, T. A., & Otop, J. (2015). Nested weighted automata. IST Austria. https://doi.org/10.15479/AT:IST-2015-170-v2-2","ama":"Chatterjee K, Henzinger TA, Otop J. Nested Weighted Automata. IST Austria; 2015. doi:10.15479/AT:IST-2015-170-v2-2","short":"K. Chatterjee, T.A. Henzinger, J. Otop, Nested Weighted Automata, IST Austria, 2015.","ieee":"K. Chatterjee, T. A. Henzinger, and J. Otop, Nested weighted automata. IST Austria, 2015."},"date_updated":"2023-02-23T12:25:21Z","ddc":["000"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","type":"technical_report","pubrep_id":"331","status":"public","_id":"5436"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"citation":{"chicago":"Chatterjee, Krishnendu, Rasmus Ibsen-Jensen, and Andreas Pavlogiannis. Faster Algorithms for Quantitative Verification in Constant Treewidth Graphs. IST Austria, 2015. https://doi.org/10.15479/AT:IST-2015-330-v2-1.","ista":"Chatterjee K, Ibsen-Jensen R, Pavlogiannis A. 2015. Faster algorithms for quantitative verification in constant treewidth graphs, IST Austria, 27p.","mla":"Chatterjee, Krishnendu, et al. Faster Algorithms for Quantitative Verification in Constant Treewidth Graphs. IST Austria, 2015, doi:10.15479/AT:IST-2015-330-v2-1.","ama":"Chatterjee K, Ibsen-Jensen R, Pavlogiannis A. Faster Algorithms for Quantitative Verification in Constant Treewidth Graphs. IST Austria; 2015. doi:10.15479/AT:IST-2015-330-v2-1","apa":"Chatterjee, K., Ibsen-Jensen, R., & Pavlogiannis, A. (2015). Faster algorithms for quantitative verification in constant treewidth graphs. IST Austria. https://doi.org/10.15479/AT:IST-2015-330-v2-1","short":"K. Chatterjee, R. Ibsen-Jensen, A. Pavlogiannis, Faster Algorithms for Quantitative Verification in Constant Treewidth Graphs, IST Austria, 2015.","ieee":"K. Chatterjee, R. Ibsen-Jensen, and A. Pavlogiannis, Faster algorithms for quantitative verification in constant treewidth graphs. IST Austria, 2015."},"date_updated":"2023-02-23T12:26:05Z","department":[{"_id":"KrCh"}],"file_date_updated":"2020-07-14T12:46:54Z","title":"Faster algorithms for quantitative verification in constant treewidth graphs","author":[{"last_name":"Chatterjee","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Ibsen-Jensen","orcid":"0000-0003-4783-0389","full_name":"Ibsen-Jensen, Rasmus","id":"3B699956-F248-11E8-B48F-1D18A9856A87","first_name":"Rasmus"},{"last_name":"Pavlogiannis","orcid":"0000-0002-8943-0722","full_name":"Pavlogiannis, Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas"}],"_id":"5437","status":"public","pubrep_id":"333","type":"technical_report","file":[{"checksum":"f5917c20f84018b362d385c000a2e123","file_id":"5473","content_type":"application/pdf","relation":"main_file","access_level":"open_access","file_name":"IST-2015-330-v2+1_main.pdf","date_created":"2018-12-12T11:53:12Z","file_size":1072137,"date_updated":"2020-07-14T12:46:54Z","creator":"system"}],"day":"27","language":[{"iso":"eng"}],"publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","year":"2015","publication_status":"published","doi":"10.15479/AT:IST-2015-330-v2-1","date_published":"2015-04-27T00:00:00Z","related_material":{"record":[{"status":"public","id":"1607","relation":"later_version"},{"relation":"earlier_version","id":"5430","status":"public"}]},"date_created":"2018-12-12T11:39:19Z","page":"27","oa_version":"Published Version","abstract":[{"lang":"eng","text":"We consider the core algorithmic problems related to verification of systems with respect to three classical quantitative properties, namely, the mean-payoff property, the ratio property, and the minimum initial credit for energy property. \r\nThe algorithmic problem given a graph and a quantitative property asks to compute the optimal value (the infimum value over all traces) from every node of the graph. We consider graphs with constant treewidth, and it is well-known that the control-flow graphs of most programs have constant treewidth. Let $n$ denote the number of nodes of a graph, $m$ the number of edges (for constant treewidth graphs $m=O(n)$) and $W$ the largest absolute value of the weights.\r\nOur main theoretical results are as follows.\r\nFirst, for constant treewidth graphs we present an algorithm that approximates the mean-payoff value within a multiplicative factor of $\\epsilon$ in time $O(n \\cdot \\log (n/\\epsilon))$ and linear space, as compared to the classical algorithms that require quadratic time. Second, for the ratio property we present an algorithm that for constant treewidth graphs works in time $O(n \\cdot \\log (|a\\cdot b|))=O(n\\cdot\\log (n\\cdot W))$, when the output is $\\frac{a}{b}$, as compared to the previously best known algorithm with running time $O(n^2 \\cdot \\log (n\\cdot W))$. Third, for the minimum initial credit problem we show that (i)~for general graphs the problem can be solved in $O(n^2\\cdot m)$ time and the associated decision problem can be solved in $O(n\\cdot m)$ time, improving the previous known $O(n^3\\cdot m\\cdot \\log (n\\cdot W))$ and $O(n^2 \\cdot m)$ bounds, respectively; and (ii)~for constant treewidth graphs we present an algorithm that requires $O(n\\cdot \\log n)$ time, improving the previous known $O(n^4 \\cdot \\log (n \\cdot W))$ bound.\r\nWe have implemented some of our algorithms and show that they present a significant speedup on standard benchmarks. "}],"month":"04","alternative_title":["IST Austria Technical Report"],"publisher":"IST Austria","oa":1}]