[{"publisher":"Elsevier","quality_controlled":0,"month":"11","date_created":"2018-12-11T12:03:23Z","date_published":"2001-11-14T00:00:00Z","year":"2001","publication_status":"published","day":"14","conference":{"name":"CIT: Conference on Information Technology"},"type":"conference","status":"public","_id":"3447","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Krishnendu Chatterjee","orcid":"0000-0002-4561-241X"},{"full_name":"Dasgupta, Pallab","last_name":"Dasgupta","first_name":"Pallab"},{"first_name":"Partha","last_name":"Chakrabarti","full_name":"Chakrabarti, Partha P"}],"publist_id":"2940","title":"Weighted quantified computation tree logic","date_updated":"2021-01-12T07:43:31Z","citation":{"ista":"Chatterjee K, Dasgupta P, Chakrabarti P. 2001. Weighted quantified computation tree logic. CIT: Conference on Information Technology.","chicago":"Chatterjee, Krishnendu, Pallab Dasgupta, and Partha Chakrabarti. “Weighted Quantified Computation Tree Logic.” Elsevier, 2001.","ieee":"K. Chatterjee, P. Dasgupta, and P. Chakrabarti, “Weighted quantified computation tree logic,” presented at the CIT: Conference on Information Technology, 2001.","short":"K. Chatterjee, P. Dasgupta, P. Chakrabarti, in:, Elsevier, 2001.","apa":"Chatterjee, K., Dasgupta, P., & Chakrabarti, P. (2001). Weighted quantified computation tree logic. Presented at the CIT: Conference on Information Technology, Elsevier.","ama":"Chatterjee K, Dasgupta P, Chakrabarti P. Weighted quantified computation tree logic. In: Elsevier; 2001.","mla":"Chatterjee, Krishnendu, et al. Weighted Quantified Computation Tree Logic. Elsevier, 2001."},"extern":1},{"abstract":[{"text":"For diffeomorphisms of smooth compact manifolds, we consider the problem of how fast the number of periodic points with period $n$grows as a function of $n$. In many familiar cases (e.g., Anosov systems) the growth is exponential, but arbitrarily fast growth is possible; in fact, the first author has shown that arbitrarily fast growth is topologically (Baire) generic for $C^2$ or smoother diffeomorphisms. In the present work we show that, by contrast, for a measure-theoretic notion of genericity we call ``prevalence'', the growth is not much faster than exponential. Specifically, we show that for each $\\delta > 0$, there is a prevalent set of ( $C^{1+\\rho}$ or smoother) diffeomorphisms for which the number of period $n$ points is bounded above by $\\operatorname{exp}(C n^{1+\\delta})$ for some $C$ independent of $n$. We also obtain a related bound on the decay of the hyperbolicity of the periodic points as a function of $n$. The contrast between topologically generic and measure-theoretically generic behavior for the growth of the number of periodic points and the decay of their hyperbolicity shows this to be a subtle and complex phenomenon, reminiscent of KAM theory.","lang":"eng"}],"oa_version":"None","publisher":"American Mathematical Society","quality_controlled":"1","month":"04","intvolume":" 7","publication_identifier":{"issn":["1079-6762"]},"year":"2001","publication_status":"published","day":"18","language":[{"iso":"eng"}],"publication":"Electronic Research Announcements of the American Mathematical Society","page":"17-27","issue":"4","doi":"10.1090/s1079-6762-01-00090-7","volume":7,"date_published":"2001-04-18T00:00:00Z","date_created":"2020-09-18T10:49:56Z","_id":"8522","article_type":"original","type":"journal_article","status":"public","keyword":["General Mathematics"],"citation":{"ista":"Kaloshin V, Hunt BR. 2001. A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms I. Electronic Research Announcements of the American Mathematical Society. 7(4), 17–27.","chicago":"Kaloshin, Vadim, and Brian R. Hunt. “A Stretched Exponential Bound on the Rate of Growth of the Number of Periodic Points for Prevalent Diffeomorphisms I.” Electronic Research Announcements of the American Mathematical Society. American Mathematical Society, 2001. https://doi.org/10.1090/s1079-6762-01-00090-7.","short":"V. Kaloshin, B.R. Hunt, Electronic Research Announcements of the American Mathematical Society 7 (2001) 17–27.","ieee":"V. Kaloshin and B. R. Hunt, “A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms I,” Electronic Research Announcements of the American Mathematical Society, vol. 7, no. 4. American Mathematical Society, pp. 17–27, 2001.","apa":"Kaloshin, V., & Hunt, B. R. (2001). A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms I. Electronic Research Announcements of the American Mathematical Society. American Mathematical Society. https://doi.org/10.1090/s1079-6762-01-00090-7","ama":"Kaloshin V, Hunt BR. A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms I. Electronic Research Announcements of the American Mathematical Society. 2001;7(4):17-27. doi:10.1090/s1079-6762-01-00090-7","mla":"Kaloshin, Vadim, and Brian R. Hunt. “A Stretched Exponential Bound on the Rate of Growth of the Number of Periodic Points for Prevalent Diffeomorphisms I.” Electronic Research Announcements of the American Mathematical Society, vol. 7, no. 4, American Mathematical Society, 2001, pp. 17–27, doi:10.1090/s1079-6762-01-00090-7."},"date_updated":"2021-01-12T08:19:51Z","extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"last_name":"Kaloshin","orcid":"0000-0002-6051-2628","full_name":"Kaloshin, Vadim","first_name":"Vadim","id":"FE553552-CDE8-11E9-B324-C0EBE5697425"},{"first_name":"Brian R.","last_name":"Hunt","full_name":"Hunt, Brian R."}],"article_processing_charge":"No","title":"A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms I"},{"publisher":"American Mathematical Society","quality_controlled":"1","month":"04","intvolume":" 7","abstract":[{"text":"We continue the previous article's discussion of bounds, for prevalent diffeomorphisms of smooth compact manifolds, on the growth of the number of periodic points and the decay of their hyperbolicity as a function of their period $n$. In that article we reduced the main results to a problem, for certain families of diffeomorphisms, of bounding the measure of parameter values for which the diffeomorphism has (for a given period $n$) an almost periodic point that is almost nonhyperbolic. We also formulated our results for $1$-dimensional endomorphisms on a compact interval. In this article we describe some of the main techniques involved and outline the rest of the proof. To simplify notation, we concentrate primarily on the $1$-dimensional case.","lang":"eng"}],"oa_version":"None","page":"28-36","doi":"10.1090/s1079-6762-01-00091-9","date_published":"2001-04-24T00:00:00Z","volume":7,"issue":"5","date_created":"2020-09-18T10:49:43Z","publication_identifier":{"issn":["1079-6762"]},"year":"2001","publication_status":"published","day":"24","publication":"Electronic Research Announcements of the American Mathematical Society","language":[{"iso":"eng"}],"type":"journal_article","article_type":"original","status":"public","keyword":["General Mathematics"],"_id":"8521","author":[{"id":"FE553552-CDE8-11E9-B324-C0EBE5697425","first_name":"Vadim","last_name":"Kaloshin","orcid":"0000-0002-6051-2628","full_name":"Kaloshin, Vadim"},{"full_name":"Hunt, Brian R.","last_name":"Hunt","first_name":"Brian R."}],"article_processing_charge":"No","title":"A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms II","date_updated":"2021-01-12T08:19:51Z","citation":{"ista":"Kaloshin V, Hunt BR. 2001. A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms II. Electronic Research Announcements of the American Mathematical Society. 7(5), 28–36.","chicago":"Kaloshin, Vadim, and Brian R. Hunt. “A Stretched Exponential Bound on the Rate of Growth of the Number of Periodic Points for Prevalent Diffeomorphisms II.” Electronic Research Announcements of the American Mathematical Society. American Mathematical Society, 2001. https://doi.org/10.1090/s1079-6762-01-00091-9.","short":"V. Kaloshin, B.R. Hunt, Electronic Research Announcements of the American Mathematical Society 7 (2001) 28–36.","ieee":"V. Kaloshin and B. R. Hunt, “A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms II,” Electronic Research Announcements of the American Mathematical Society, vol. 7, no. 5. American Mathematical Society, pp. 28–36, 2001.","ama":"Kaloshin V, Hunt BR. A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms II. Electronic Research Announcements of the American Mathematical Society. 2001;7(5):28-36. doi:10.1090/s1079-6762-01-00091-9","apa":"Kaloshin, V., & Hunt, B. R. (2001). A stretched exponential bound on the rate of growth of the number of periodic points for prevalent diffeomorphisms II. Electronic Research Announcements of the American Mathematical Society. American Mathematical Society. https://doi.org/10.1090/s1079-6762-01-00091-9","mla":"Kaloshin, Vadim, and Brian R. Hunt. “A Stretched Exponential Bound on the Rate of Growth of the Number of Periodic Points for Prevalent Diffeomorphisms II.” Electronic Research Announcements of the American Mathematical Society, vol. 7, no. 5, American Mathematical Society, 2001, pp. 28–36, doi:10.1090/s1079-6762-01-00091-9."},"extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"page":"953-970","issue":"5","doi":"10.1007/s00039-001-8222-8","volume":11,"date_published":"2001-12-01T00:00:00Z","date_created":"2020-09-18T10:50:11Z","publication_identifier":{"issn":["1016-443X","1420-8970"]},"year":"2001","publication_status":"published","day":"01","language":[{"iso":"eng"}],"publication":"Geometric And Functional Analysis","publisher":"Springer Nature","quality_controlled":"1","month":"12","intvolume":" 11","abstract":[{"lang":"eng","text":"A number α∈R is diophantine if it is not well approximable by rationals, i.e. for some C,ε>0 and any relatively prime p,q∈Z we have |αq−p|>Cq−1−ε. It is well-known and is easy to prove that almost every α in R is diophantine. In this paper we address a noncommutative version of the diophantine properties. Consider a pair A,B∈SO(3) and for each n∈Z+ take all possible words in A, A -1, B, and B - 1 of length n, i.e. for a multiindex I=(i1,i1,…,im,jm) define |I|=∑mk=1(|ik|+|jk|)=n and \\( W_n(A,B ) = \\{W_{\\cal I}(A,B) = A^{i_1} B^{j_1} \\dots A^{i_m} B^{j_m}\\}_{|{\\cal I|}=n \\).¶Gamburd—Jakobson—Sarnak [GJS] raised the problem: prove that for Haar almost every pair A,B∈SO(3) the closest distance of words of length n to the identity, i.e. sA,B(n)=min|I|=n∥WI(A,B)−E∥, is bounded from below by an exponential function in n. This is the analog of the diophantine property for elements of SO(3). In this paper we prove that s A,B (n) is bounded from below by an exponential function in n 2. We also exhibit obstructions to a “simple” proof of the exponential estimate in n."}],"oa_version":"None","author":[{"full_name":"Kaloshin, Vadim","orcid":"0000-0002-6051-2628","last_name":"Kaloshin","first_name":"Vadim","id":"FE553552-CDE8-11E9-B324-C0EBE5697425"},{"first_name":"I.","last_name":"Rodnianski","full_name":"Rodnianski, I."}],"article_processing_charge":"No","title":"Diophantine properties of elements of SO(3)","date_updated":"2021-01-12T08:19:52Z","citation":{"mla":"Kaloshin, Vadim, and I. Rodnianski. “Diophantine Properties of Elements of SO(3).” Geometric And Functional Analysis, vol. 11, no. 5, Springer Nature, 2001, pp. 953–70, doi:10.1007/s00039-001-8222-8.","apa":"Kaloshin, V., & Rodnianski, I. (2001). Diophantine properties of elements of SO(3). Geometric And Functional Analysis. Springer Nature. https://doi.org/10.1007/s00039-001-8222-8","ama":"Kaloshin V, Rodnianski I. Diophantine properties of elements of SO(3). Geometric And Functional Analysis. 2001;11(5):953-970. doi:10.1007/s00039-001-8222-8","ieee":"V. Kaloshin and I. Rodnianski, “Diophantine properties of elements of SO(3),” Geometric And Functional Analysis, vol. 11, no. 5. Springer Nature, pp. 953–970, 2001.","short":"V. Kaloshin, I. Rodnianski, Geometric And Functional Analysis 11 (2001) 953–970.","chicago":"Kaloshin, Vadim, and I. Rodnianski. “Diophantine Properties of Elements of SO(3).” Geometric And Functional Analysis. Springer Nature, 2001. https://doi.org/10.1007/s00039-001-8222-8.","ista":"Kaloshin V, Rodnianski I. 2001. Diophantine properties of elements of SO(3). Geometric And Functional Analysis. 11(5), 953–970."},"extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_type":"original","type":"journal_article","status":"public","_id":"8524"},{"volume":292,"issue":"5524","language":[{"iso":"eng"}],"publication_identifier":{"eissn":["1095-9203"],"issn":["0036-8075"]},"publication_status":"published","month":"06","intvolume":" 292","scopus_import":"1","pmid":1,"oa_version":"None","abstract":[{"lang":"eng","text":"Epigenetic silenced alleles of the Arabidopsis SUPERMANlocus (the clark kent alleles) are associated with dense hypermethylation at noncanonical cytosines (CpXpG and asymmetric sites, where X = A, T, C, or G). A genetic screen for suppressors of a hypermethylated clark kent mutant identified nine loss-of-function alleles of CHROMOMETHYLASE3(CMT3), a novel cytosine methyltransferase homolog. These cmt3 mutants display a wild-type morphology but exhibit decreased CpXpG methylation of the SUP gene and of other sequences throughout the genome. They also show reactivated expression of endogenous retrotransposon sequences. These results show that a non-CpG DNA methyltransferase is responsible for maintaining epigenetic gene silencing."}],"department":[{"_id":"DaZi"}],"extern":"1","date_updated":"2021-12-14T08:40:32Z","status":"public","keyword":["Multidisciplinary"],"type":"journal_article","article_type":"original","_id":"9444","date_published":"2001-06-15T00:00:00Z","doi":"10.1126/science.1059745","date_created":"2021-06-02T13:35:16Z","page":"2077-2080","day":"15","publication":"Science","year":"2001","publisher":"American Association for the Advancement of Science","quality_controlled":"1","title":"Requirement of CHROMOMETHYLASE3 for maintenance of CpXpG methylation","author":[{"last_name":"Lindroth","full_name":"Lindroth, A. M.","first_name":"A. M."},{"last_name":"Cao","full_name":"Cao, Xiaofeng","first_name":"Xiaofeng"},{"first_name":"James P.","last_name":"Jackson","full_name":"Jackson, James P."},{"full_name":"Zilberman, Daniel","orcid":"0000-0002-0123-8649","last_name":"Zilberman","id":"6973db13-dd5f-11ea-814e-b3e5455e9ed1","first_name":"Daniel"},{"first_name":"Claire M.","full_name":"McCallum, Claire M.","last_name":"McCallum"},{"first_name":"Steven","full_name":"Henikoff, Steven","last_name":"Henikoff"},{"first_name":"Steven E.","last_name":"Jacobsen","full_name":"Jacobsen, Steven E."}],"article_processing_charge":"No","external_id":{"pmid":["11349138"]},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","citation":{"mla":"Lindroth, A. M., et al. “Requirement of CHROMOMETHYLASE3 for Maintenance of CpXpG Methylation.” Science, vol. 292, no. 5524, American Association for the Advancement of Science, 2001, pp. 2077–80, doi:10.1126/science.1059745.","ieee":"A. M. Lindroth et al., “Requirement of CHROMOMETHYLASE3 for maintenance of CpXpG methylation,” Science, vol. 292, no. 5524. American Association for the Advancement of Science, pp. 2077–2080, 2001.","short":"A.M. Lindroth, X. Cao, J.P. Jackson, D. Zilberman, C.M. McCallum, S. Henikoff, S.E. Jacobsen, Science 292 (2001) 2077–2080.","ama":"Lindroth AM, Cao X, Jackson JP, et al. Requirement of CHROMOMETHYLASE3 for maintenance of CpXpG methylation. Science. 2001;292(5524):2077-2080. doi:10.1126/science.1059745","apa":"Lindroth, A. M., Cao, X., Jackson, J. P., Zilberman, D., McCallum, C. M., Henikoff, S., & Jacobsen, S. E. (2001). Requirement of CHROMOMETHYLASE3 for maintenance of CpXpG methylation. Science. American Association for the Advancement of Science. https://doi.org/10.1126/science.1059745","chicago":"Lindroth, A. M., Xiaofeng Cao, James P. Jackson, Daniel Zilberman, Claire M. McCallum, Steven Henikoff, and Steven E. Jacobsen. “Requirement of CHROMOMETHYLASE3 for Maintenance of CpXpG Methylation.” Science. American Association for the Advancement of Science, 2001. https://doi.org/10.1126/science.1059745.","ista":"Lindroth AM, Cao X, Jackson JP, Zilberman D, McCallum CM, Henikoff S, Jacobsen SE. 2001. Requirement of CHROMOMETHYLASE3 for maintenance of CpXpG methylation. Science. 292(5524), 2077–2080."}},{"_id":"4634","status":"public","type":"conference","conference":{"name":"CONCUR: Concurrency Theory","location":"Aalborg, Denmark","end_date":"2001-08-25","start_date":"2001-08-20"},"extern":"1","date_updated":"2023-05-08T10:20:19Z","oa_version":"None","abstract":[{"lang":"eng","text":"A controller is an environment for a system that achieves a particular control objective by providing inputs to the system without constraining the choices of the system. For synchronous systems, where system and controller make simultaneous and interdependent choices, the notion that a controller must not constrain the choices of the system can be formalized by type systems for composability. In a previous paper, we solved the control problem for static and dynamic types: a static type is a dependency relation between inputs and outputs, and composition is well-typed if it does not introduce cyclic dependencies; a dynamic type is a set of static types, one for each state. Static and dynamic types, however, cannot capture many important digital circuits, such as gated clocks, bidirectional buses, and random-access memory. We therefore introduce more general type systems, so-called dependent and bidirectional types, for modeling these situations, and we solve the corresponding control problems.\r\nIn a system with a dependent type, the dependencies between inputs and outputs are determined gradually through a game of the system against the controller. In a system with a bidirectional type, also the distinction between inputs and outputs is resolved dynamically by such a game. The game proceeds in several rounds. In each round the system and the controller choose to update some variables dependent on variables that have already been updated. The solution of the control problem for dependent and bidirectional types is based on algorithms for solving these games."}],"month":"08","intvolume":" 2154","scopus_import":"1","alternative_title":["LNCS"],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9783540424970"]},"publication_status":"published","volume":2154,"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","citation":{"mla":"De Alfaro, Luca, et al. “The Control of Synchronous Systems, Part II.” Proceedings of the 12th International Conference on on Concurrency Theory, vol. 2154, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001, pp. 566–81, doi:10.1007/3-540-44685-0_38.","ieee":"L. De Alfaro, T. A. Henzinger, and F. Mang, “The control of synchronous systems, Part II,” in Proceedings of the 12th International Conference on on Concurrency Theory, Aalborg, Denmark, 2001, vol. 2154, pp. 566–581.","short":"L. De Alfaro, T.A. Henzinger, F. Mang, in:, Proceedings of the 12th International Conference on on Concurrency Theory, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001, pp. 566–581.","ama":"De Alfaro L, Henzinger TA, Mang F. The control of synchronous systems, Part II. In: Proceedings of the 12th International Conference on on Concurrency Theory. Vol 2154. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2001:566-581. doi:10.1007/3-540-44685-0_38","apa":"De Alfaro, L., Henzinger, T. A., & Mang, F. (2001). The control of synchronous systems, Part II. In Proceedings of the 12th International Conference on on Concurrency Theory (Vol. 2154, pp. 566–581). Aalborg, Denmark: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.1007/3-540-44685-0_38","chicago":"De Alfaro, Luca, Thomas A Henzinger, and Freddy Mang. “The Control of Synchronous Systems, Part II.” In Proceedings of the 12th International Conference on on Concurrency Theory, 2154:566–81. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001. https://doi.org/10.1007/3-540-44685-0_38.","ista":"De Alfaro L, Henzinger TA, Mang F. 2001. The control of synchronous systems, Part II. Proceedings of the 12th International Conference on on Concurrency Theory. CONCUR: Concurrency Theory, LNCS, vol. 2154, 566–581."},"title":"The control of synchronous systems, Part II","author":[{"full_name":"De Alfaro, Luca","last_name":"De Alfaro","first_name":"Luca"},{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"last_name":"Mang","full_name":"Mang, Freddy","first_name":"Freddy"}],"publist_id":"74","article_processing_charge":"No","acknowledgement":"This research was supported in part by the SRC contract 99-TJ-683.003, the DARPA SEC grant F33615-C-98-3614, the MARCO GSRC grant 98-DT-660, the AFOSR MURI grant F49620-00-1-0327, and the NSF Theory grant CCR-9988172.","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","quality_controlled":"1","day":"13","publication":"Proceedings of the 12th International Conference on on Concurrency Theory","year":"2001","doi":"10.1007/3-540-44685-0_38","date_published":"2001-08-13T00:00:00Z","date_created":"2018-12-11T12:09:52Z","page":"566 - 581"},{"year":"2001","day":"13","publication":"Proceedings of the 12th International Conference on on Concurrency Theory","page":"536 - 550","doi":"10.1007/3-540-44685-0_36","date_published":"2001-08-13T00:00:00Z","date_created":"2018-12-11T12:09:52Z","acknowledgement":"This research was supported in part by the AFOSR MURI grant F49620-00-1-0327, the DARPA SEC grant F33615-C-98-3614, the MARCO GSRC grant 98-DT-660, the NSF Theory grant CCR-9988172, and the NSF ITR grant CCR-0085949.","quality_controlled":"1","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","citation":{"chicago":"De Alfaro, Luca, Thomas A Henzinger, and Ritankar Majumdar. “Symbolic Algorithms for Infinite-State Games.” In Proceedings of the 12th International Conference on on Concurrency Theory, 2154:536–50. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001. https://doi.org/10.1007/3-540-44685-0_36.","ista":"De Alfaro L, Henzinger TA, Majumdar R. 2001. Symbolic algorithms for infinite-state games. Proceedings of the 12th International Conference on on Concurrency Theory. CONCUR: Concurrency Theory, LNCS, vol. 2154, 536–550.","mla":"De Alfaro, Luca, et al. “Symbolic Algorithms for Infinite-State Games.” Proceedings of the 12th International Conference on on Concurrency Theory, vol. 2154, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001, pp. 536–50, doi:10.1007/3-540-44685-0_36.","ieee":"L. De Alfaro, T. A. Henzinger, and R. Majumdar, “Symbolic algorithms for infinite-state games,” in Proceedings of the 12th International Conference on on Concurrency Theory, Aalborg, Denmark, 2001, vol. 2154, pp. 536–550.","short":"L. De Alfaro, T.A. Henzinger, R. Majumdar, in:, Proceedings of the 12th International Conference on on Concurrency Theory, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001, pp. 536–550.","ama":"De Alfaro L, Henzinger TA, Majumdar R. Symbolic algorithms for infinite-state games. In: Proceedings of the 12th International Conference on on Concurrency Theory. Vol 2154. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2001:536-550. doi:10.1007/3-540-44685-0_36","apa":"De Alfaro, L., Henzinger, T. A., & Majumdar, R. (2001). Symbolic algorithms for infinite-state games. In Proceedings of the 12th International Conference on on Concurrency Theory (Vol. 2154, pp. 536–550). Aalborg, Denmark: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.1007/3-540-44685-0_36"},"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","author":[{"full_name":"De Alfaro, Luca","last_name":"De Alfaro","first_name":"Luca"},{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Majumdar, Ritankar","last_name":"Majumdar","first_name":"Ritankar"}],"publist_id":"73","article_processing_charge":"No","title":"Symbolic algorithms for infinite-state games","publication_identifier":{"isbn":["9783540424970"]},"publication_status":"published","language":[{"iso":"eng"}],"volume":2154,"abstract":[{"text":"A procedure for the analysis of state spaces is called symbolic if it manipulates not individual states, but sets of states that are represented by constraints. Such a procedure can be used for the analysis of infinite state spaces, provided termination is guaranteed. We present symbolic procedures, and corresponding termination criteria, for the solution of infinite-state games, which occur in the control and modular verification of infinite-state systems. To characterize the termination of symbolic procedures for solving infinite-state games, we classify these game structures into four increasingly restrictive categories:\r\n1 \tClass 1 consists of infinite-state structures for which all safety and reachability games can be solved.\r\n2 \tClass 2 consists of infinite-state structures for which all ω-regular games can be solved.\r\n3 \tClass 3 consists of infinite-state structures for which all nested positive boolean combinations of ω-regular games can be solved.\r\n4 \tClass 4 consists of infinite-state structures for which all nested boolean combinations of ω-regular games can be solved.\r\nWe give a structural characterization for each class, using equivalence relations on the state spaces of games which range from game versions of trace equivalence to a game version of bisimilarity. We provide infinite-state examples for all four classes of games from control problems for hybrid systems. We conclude by presenting symbolic algorithms for the synthesis of winning strategies (“controller synthesis”) for infinitestate games with arbitrary ω-regular objectives, and prove termination over all class-2 structures. This settles, in particular, the symbolic controller synthesis problem for rectangular hybrid systems.","lang":"eng"}],"oa_version":"None","scopus_import":"1","alternative_title":["LNCS"],"month":"08","intvolume":" 2154","date_updated":"2023-05-08T09:57:31Z","extern":"1","_id":"4633","type":"conference","conference":{"name":"CONCUR: Concurrency Theory","start_date":"2001-08-20","location":"Aalborg, Denmark","end_date":"2001-08-25"},"status":"public"},{"_id":"4636","status":"public","conference":{"start_date":"2001-06-16","location":"Boston, MA, USA","end_date":"2001-06-19","name":"LICS: Logic in Computer Science"},"type":"conference","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","date_updated":"2023-05-08T09:48:06Z","citation":{"short":"L. De Alfaro, T.A. Henzinger, R. Majumdar, in:, Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, IEEE, 2001, pp. 279–290.","ieee":"L. De Alfaro, T. A. Henzinger, and R. Majumdar, “From verification to control: dynamic programs for omega-regular objectives,” in Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, Boston, MA, USA, 2001, pp. 279–290.","apa":"De Alfaro, L., Henzinger, T. A., & Majumdar, R. (2001). From verification to control: dynamic programs for omega-regular objectives. In Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science (pp. 279–290). Boston, MA, USA: IEEE. https://doi.org/10.1109/LICS.2001.932504","ama":"De Alfaro L, Henzinger TA, Majumdar R. From verification to control: dynamic programs for omega-regular objectives. In: Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science. IEEE; 2001:279-290. doi:10.1109/LICS.2001.932504","mla":"De Alfaro, Luca, et al. “From Verification to Control: Dynamic Programs for Omega-Regular Objectives.” Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, IEEE, 2001, pp. 279–90, doi:10.1109/LICS.2001.932504.","ista":"De Alfaro L, Henzinger TA, Majumdar R. 2001. From verification to control: dynamic programs for omega-regular objectives. Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science. LICS: Logic in Computer Science, 279–290.","chicago":"De Alfaro, Luca, Thomas A Henzinger, and Ritankar Majumdar. “From Verification to Control: Dynamic Programs for Omega-Regular Objectives.” In Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 279–90. IEEE, 2001. https://doi.org/10.1109/LICS.2001.932504."},"title":"From verification to control: dynamic programs for omega-regular objectives","article_processing_charge":"No","publist_id":"72","author":[{"first_name":"Luca","last_name":"De Alfaro","full_name":"De Alfaro, Luca"},{"full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"last_name":"Majumdar","full_name":"Majumdar, Ritankar","first_name":"Ritankar"}],"oa_version":"None","abstract":[{"lang":"eng","text":"Abstract. Dynamic programs, or fixpoint iteration schemes, are useful for solving many problems on state spaces, including model checking on Kripke structures (“verification”), computing shortest paths on weighted graphs (“optimization”), computing the value of games played on game graphs (“control”). For Kripke structures, a rich fixpoint theory is available in the form of the µ-calculus. Yet few connections have been made between different interpretations of fixpoint algorithms. We study the question of when a particular fixpoint iteration scheme ϕ for verifying an ω-regular property Ψ on a Kripke structure can be used also for solving a two-player game on a game graph with winning objective Ψ. We provide a sufficient and necessary criterion for the answer to be affirmative in the form of an extremal-model theorem for games: under a game interpretation, the dynamic program ϕ solves the game with objective Ψ if and only if both (1) under an existential interpretation on Kripke structures, ϕ is equivalent to ∃Ψ, and (2) under a universal interpretation on Kripke structures, ϕ is equivalent to ∀Ψ. In other words, ϕ is correct on all two-player game graphs iff it is correct on all extremal game graphs, where one or the other player has no choice of moves. The theorem generalizes to quantitative interpretations, where it connects two-player games with costs to weighted graphs. While the standard translations from ω-regular properties to the µ-calculus violate (1) or (2), we give a translation that satisfies both conditions. Our construction, therefore, yields fixpoint iteration schemes that can be uniformly applied on Kripke structures, weighted graphs, game graphs, and game graphs with costs, in order to meet or optimize a given ω-regular objective."}],"month":"08","publisher":"IEEE","quality_controlled":"1","language":[{"iso":"eng"}],"publication":"Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science","day":"07","publication_status":"published","year":"2001","publication_identifier":{"isbn":["076951281X"]},"date_created":"2018-12-11T12:09:52Z","doi":"10.1109/LICS.2001.932504","date_published":"2001-08-07T00:00:00Z","page":"279 - 290"},{"abstract":[{"text":"We show how model checking techniques can be applied to the analysis of connectivity and cost-of-traversal properties of Web sites.","lang":"eng"}],"oa_version":"None","main_file_link":[{"url":"https://ir.webis.de/anthology/2001.wwwconf_conference-2001p.57/"}],"publisher":"ACM","quality_controlled":"1","month":"05","year":"2001","publication_status":"published","publication_identifier":{"isbn":["9781581133486"]},"publication":"Proceedings of the 10th international conference on World Wide Web","language":[{"iso":"eng"}],"day":"01","page":"86 - 87","date_created":"2018-12-11T12:09:52Z","date_published":"2001-05-01T00:00:00Z","_id":"4635","conference":{"name":"WWW: World Wide Web Conference","end_date":"2000-05-05","location":"Hong Kong, Hong Kong","start_date":"2001-05-01"},"type":"conference","status":"public","citation":{"mla":"De Alfaro, Luca, et al. “MCWEB: A Model-Checking Tool for Web-Site Debugging.” Proceedings of the 10th International Conference on World Wide Web, ACM, 2001, pp. 86–87.","ama":"De Alfaro L, Henzinger TA, Mang F. MCWEB: A model-checking tool for web-site debugging. In: Proceedings of the 10th International Conference on World Wide Web. ACM; 2001:86-87.","apa":"De Alfaro, L., Henzinger, T. A., & Mang, F. (2001). MCWEB: A model-checking tool for web-site debugging. In Proceedings of the 10th international conference on World Wide Web (pp. 86–87). Hong Kong, Hong Kong: ACM.","short":"L. De Alfaro, T.A. Henzinger, F. Mang, in:, Proceedings of the 10th International Conference on World Wide Web, ACM, 2001, pp. 86–87.","ieee":"L. De Alfaro, T. A. Henzinger, and F. Mang, “MCWEB: A model-checking tool for web-site debugging,” in Proceedings of the 10th international conference on World Wide Web, Hong Kong, Hong Kong, 2001, pp. 86–87.","chicago":"De Alfaro, Luca, Thomas A Henzinger, and Freddy Mang. “MCWEB: A Model-Checking Tool for Web-Site Debugging.” In Proceedings of the 10th International Conference on World Wide Web, 86–87. ACM, 2001.","ista":"De Alfaro L, Henzinger TA, Mang F. 2001. MCWEB: A model-checking tool for web-site debugging. Proceedings of the 10th international conference on World Wide Web. WWW: World Wide Web Conference, 86–87."},"date_updated":"2023-05-08T09:39:02Z","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","article_processing_charge":"No","publist_id":"71","author":[{"first_name":"Luca","full_name":"De Alfaro, Luca","last_name":"De Alfaro"},{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Freddy","full_name":"Mang, Freddy","last_name":"Mang"}],"title":"MCWEB: A model-checking tool for web-site debugging"},{"volume":2154,"publication_identifier":{"isbn":["9783540424970"]},"publication_status":"published","language":[{"iso":"eng"}],"scopus_import":"1","alternative_title":["LNCS"],"month":"08","intvolume":" 2154","abstract":[{"text":"We present a compositional trace-based model for probabilistic systems. The behavior of a system with probabilistic choice is a stochastic process, namely, a probability distribution on traces, or “bundle.” Consequently, the semantics of a system with both nondeterministic and probabilistic choice is a set of bundles. The bundles of a composite system can be obtained by combining the bundles of the components in a simple mathematical way. Refinement between systems is bundle containment. We achieve assume-guarantee compositionality for bundle semantics by introducing two scoping mechanisms. The first mechanism, which is standard in compositional modeling, distinguishes inputs from outputs and hidden state. The second mechanism, which arises in probabilistic systems, partitions the state into probabilistically independent regions.","lang":"eng"}],"oa_version":"None","date_updated":"2023-05-08T10:24:59Z","extern":"1","type":"conference","conference":{"name":"CONCUR: Concurrency Theory","start_date":"2001-08-20","location":"Aalborg, Denmark","end_date":"2001-08-25"},"status":"public","_id":"4632","page":"351 - 365","doi":"10.1007/3-540-44685-0_24","date_published":"2001-08-13T00:00:00Z","date_created":"2018-12-11T12:09:51Z","year":"2001","day":"13","publication":"Proceedings of the 12th International Conference on on Concurrency Theory","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","quality_controlled":"1","acknowledgement":"This research was supported in part by the SRC contract 99-TJ-683.003, the AFOSR MURI grant F49620-00-1-0327, the MARCO GSRC grant 98-DT-660, the NSF Theory grant CCR-9988172, and the DARPA SEC grant F33615-C-98-3614.","publist_id":"75","author":[{"first_name":"Luca","last_name":"De Alfaro","full_name":"De Alfaro, Luca"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"},{"last_name":"Jhala","full_name":"Jhala, Ranjit","first_name":"Ranjit"}],"article_processing_charge":"No","title":"Compositional methods for probabilistic systems","citation":{"chicago":"De Alfaro, Luca, Thomas A Henzinger, and Ranjit Jhala. “Compositional Methods for Probabilistic Systems.” In Proceedings of the 12th International Conference on on Concurrency Theory, 2154:351–65. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001. https://doi.org/10.1007/3-540-44685-0_24.","ista":"De Alfaro L, Henzinger TA, Jhala R. 2001. Compositional methods for probabilistic systems. Proceedings of the 12th International Conference on on Concurrency Theory. CONCUR: Concurrency Theory, LNCS, vol. 2154, 351–365.","mla":"De Alfaro, Luca, et al. “Compositional Methods for Probabilistic Systems.” Proceedings of the 12th International Conference on on Concurrency Theory, vol. 2154, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001, pp. 351–65, doi:10.1007/3-540-44685-0_24.","ieee":"L. De Alfaro, T. A. Henzinger, and R. Jhala, “Compositional methods for probabilistic systems,” in Proceedings of the 12th International Conference on on Concurrency Theory, Aalborg, Denmark, 2001, vol. 2154, pp. 351–365.","short":"L. De Alfaro, T.A. Henzinger, R. Jhala, in:, Proceedings of the 12th International Conference on on Concurrency Theory, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2001, pp. 351–365.","apa":"De Alfaro, L., Henzinger, T. A., & Jhala, R. (2001). Compositional methods for probabilistic systems. In Proceedings of the 12th International Conference on on Concurrency Theory (Vol. 2154, pp. 351–365). Aalborg, Denmark: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.1007/3-540-44685-0_24","ama":"De Alfaro L, Henzinger TA, Jhala R. Compositional methods for probabilistic systems. In: Proceedings of the 12th International Conference on on Concurrency Theory. Vol 2154. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2001:351-365. doi:10.1007/3-540-44685-0_24"},"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17"},{"acknowledgement":"We thank Himyanshu Anand, Ben Horowitz, Franjo Ivancic, Michael McDougall, Marius Minea, Oliver Moeller. Shaz Qadeer, Sriram Rajamani, and Jean-Francois Raskin for their assistance in the development of JMOCHA. The MOCHA project is funded in part by the DARPA grant NAG2-1214, the NSF CAREER awards CCR95-01708 and CCR97-34115, the NSF grant CCR99-70925, the NSF ITR grant CCR0085949, the MARC0 grant 98-DT-660, and the SRC contracts 99-TJ-683.003 and 99-TJ-688. ","oa_version":"None","abstract":[{"text":"Model checking is a practical tool for automated debugging of embedded software. In model checking, a high-level description of a system is compared against a logical correctness requirement to discover inconsistencies. Since model checking is based on exhaustive state-space exploration and the size of the state space of a design grows exponentially with the size of the description, scalability remains a challenge. We have thus developed techniques for exploiting modular design structure during model checking, and the model checker jMocha (Java MOdel-CHecking Algorithm) is based on this theme. Instead of manipulating unstructured state-transition graphs, it supports the hierarchical modeling framework of reactive modules. jMocha is a growing interactive software environment for specification, simulation and verification, and is intended as a vehicle for the development of new verification algorithms and approaches. It is written in Java and uses native C-code BDD libraries from VIS. jMocha offers: (1) a GUI that looks familiar to Windows/Java users; (2) a simulator that displays traces in a message sequence chart fashion; (3) requirements verification both by symbolic and enumerative model checking; (4) implementation verification by checking trace containment; (5) a proof manager that aids compositional and assume-guarantee reasoning; and (6) SLANG (Scripting LANGuage) for the rapid and structured development of new verification algorithms. jMocha is available publicly at ; it is a successor and extension of the original Mocha tool that was entirely written in C.","lang":"eng"}],"month":"08","quality_controlled":"1","publisher":"IEEE","publication":"Proceedings of the 23rd International Conference on Software Engineering","language":[{"iso":"eng"}],"day":"07","year":"2001","publication_status":"published","publication_identifier":{"isbn":["0769510507"]},"date_created":"2018-12-11T12:09:41Z","doi":"10.1109/ICSE.2001.919196","date_published":"2001-08-07T00:00:00Z","page":"835 - 836","_id":"4600","status":"public","conference":{"name":"ICSE: Software Engineering"},"type":"conference","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","date_updated":"2023-05-08T14:06:55Z","citation":{"ista":"Alur R, De Alfaro L, Grosu R, Henzinger TA, Kang M, Kirsch C, Majumdar R, Mang F, Wang B. 2001. jMocha: A model-checking tool that exploits design structure. Proceedings of the 23rd International Conference on Software Engineering. ICSE: Software Engineering, 835–836.","chicago":"Alur, Rajeev, Luca De Alfaro, Radu Grosu, Thomas A Henzinger, Myong Kang, Christoph Kirsch, Ritankar Majumdar, Freddy Mang, and Bow Wang. “JMocha: A Model-Checking Tool That Exploits Design Structure.” In Proceedings of the 23rd International Conference on Software Engineering, 835–36. IEEE, 2001. https://doi.org/10.1109/ICSE.2001.919196.","ama":"Alur R, De Alfaro L, Grosu R, et al. jMocha: A model-checking tool that exploits design structure. In: Proceedings of the 23rd International Conference on Software Engineering. IEEE; 2001:835-836. doi:10.1109/ICSE.2001.919196","apa":"Alur, R., De Alfaro, L., Grosu, R., Henzinger, T. A., Kang, M., Kirsch, C., … Wang, B. (2001). jMocha: A model-checking tool that exploits design structure. In Proceedings of the 23rd International Conference on Software Engineering (pp. 835–836). IEEE. https://doi.org/10.1109/ICSE.2001.919196","short":"R. Alur, L. De Alfaro, R. Grosu, T.A. Henzinger, M. Kang, C. Kirsch, R. Majumdar, F. Mang, B. Wang, in:, Proceedings of the 23rd International Conference on Software Engineering, IEEE, 2001, pp. 835–836.","ieee":"R. Alur et al., “jMocha: A model-checking tool that exploits design structure,” in Proceedings of the 23rd International Conference on Software Engineering, 2001, pp. 835–836.","mla":"Alur, Rajeev, et al. “JMocha: A Model-Checking Tool That Exploits Design Structure.” Proceedings of the 23rd International Conference on Software Engineering, IEEE, 2001, pp. 835–36, doi:10.1109/ICSE.2001.919196."},"title":"jMocha: A model-checking tool that exploits design structure","article_processing_charge":"No","publist_id":"109","author":[{"last_name":"Alur","full_name":"Alur, Rajeev","first_name":"Rajeev"},{"full_name":"De Alfaro, Luca","last_name":"De Alfaro","first_name":"Luca"},{"first_name":"Radu","last_name":"Grosu","full_name":"Grosu, Radu"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"},{"last_name":"Kang","full_name":"Kang, Myong","first_name":"Myong"},{"first_name":"Christoph","full_name":"Kirsch, Christoph","last_name":"Kirsch"},{"first_name":"Ritankar","full_name":"Majumdar, Ritankar","last_name":"Majumdar"},{"full_name":"Mang, Freddy","last_name":"Mang","first_name":"Freddy"},{"first_name":"Bow","full_name":"Wang, Bow","last_name":"Wang"}]},{"acknowledgement":"Gerard Holzmann provided us with information on SPIN. Ken McMillan and Doron Peled contributed through discussions. The VIS group at UC Berkeley and Rajeev Ranjan in particular helped with the experiments.","publisher":"Springer","quality_controlled":"1","year":"2001","publication":"Formal Methods in System Design","day":"01","page":"97 - 116","date_created":"2018-12-11T12:09:41Z","doi":"10.1023/A:1008767206905","date_published":"2001-03-01T00:00:00Z","citation":{"ista":"Alur R, Brayton R, Henzinger TA, Qadeer S, Rajamani S. 2001. Partial-order reduction in symbolic state-space exploration. Formal Methods in System Design. 18(2), 97–116.","chicago":"Alur, Rajeev, Robert Brayton, Thomas A Henzinger, Shaz Qadeer, and Sriram Rajamani. “Partial-Order Reduction in Symbolic State-Space Exploration.” Formal Methods in System Design. Springer, 2001. https://doi.org/10.1023/A:1008767206905.","apa":"Alur, R., Brayton, R., Henzinger, T. A., Qadeer, S., & Rajamani, S. (2001). Partial-order reduction in symbolic state-space exploration. Formal Methods in System Design. Springer. https://doi.org/10.1023/A:1008767206905","ama":"Alur R, Brayton R, Henzinger TA, Qadeer S, Rajamani S. Partial-order reduction in symbolic state-space exploration. Formal Methods in System Design. 2001;18(2):97-116. doi:10.1023/A:1008767206905","short":"R. Alur, R. Brayton, T.A. Henzinger, S. Qadeer, S. Rajamani, Formal Methods in System Design 18 (2001) 97–116.","ieee":"R. Alur, R. Brayton, T. A. Henzinger, S. Qadeer, and S. Rajamani, “Partial-order reduction in symbolic state-space exploration,” Formal Methods in System Design, vol. 18, no. 2. Springer, pp. 97–116, 2001.","mla":"Alur, Rajeev, et al. “Partial-Order Reduction in Symbolic State-Space Exploration.” Formal Methods in System Design, vol. 18, no. 2, Springer, 2001, pp. 97–116, doi:10.1023/A:1008767206905."},"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","article_processing_charge":"No","author":[{"last_name":"Alur","full_name":"Alur, Rajeev","first_name":"Rajeev"},{"first_name":"Robert","full_name":"Brayton, Robert","last_name":"Brayton"},{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"full_name":"Qadeer, Shaz","last_name":"Qadeer","first_name":"Shaz"},{"first_name":"Sriram","full_name":"Rajamani, Sriram","last_name":"Rajamani"}],"publist_id":"108","title":"Partial-order reduction in symbolic state-space exploration","abstract":[{"text":"State-space explosion is a fundamental obstacle in the formal verification of designs and protocols. Several techniques for combating this problem have emerged in the past few years, among which two are significant: partial-order reduction and symbolic state-space search. In asynchronous systems, interleavings of independent concurrent events are equivalent, and only a representative interleaving needs to be explored to verify local properties. Partial-order methods exploit this redundancy and visit only a subset of the reachable states. Symbolic techniques, on the other hand, capture the transition relation of a system and the set of reachable states as boolean functions. In many cases, these functions can be represented compactly using binary decision diagrams (BDDs). Traditionally, the two techniques have been practiced by two different schools—partial-order methods with enumerative depth-first search for the analysis of asynchronous network protocols, and symbolic breadth-first search for the analysis of synchronous hardware designs. We combine both approaches and develop a method for using partial-order reduction techniques in symbolic BDD-based invariant checking. We present theoretical results to prove the correctness of the method, and experimental results to demonstrate its efficacy.","lang":"eng"}],"oa_version":"None","scopus_import":"1","intvolume":" 18","month":"03","publication_status":"published","publication_identifier":{"issn":["0925-9856"]},"language":[{"iso":"eng"}],"volume":18,"issue":"2","_id":"4599","article_type":"original","type":"journal_article","status":"public","date_updated":"2023-05-08T12:22:38Z","extern":"1"},{"title":"Interface automata","author":[{"full_name":"De Alfaro, Luca","last_name":"De Alfaro","first_name":"Luca"},{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger"}],"publist_id":"83","article_processing_charge":"No","extern":"1","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","citation":{"mla":"De Alfaro, Luca, and Thomas A. Henzinger. “Interface Automata.” Proceedings of the 8th European Software Engineering Conference, ACM, 2001, pp. 109–20, doi:10.1145/503209.503226.","short":"L. De Alfaro, T.A. Henzinger, in:, Proceedings of the 8th European Software Engineering Conference, ACM, 2001, pp. 109–120.","ieee":"L. De Alfaro and T. A. Henzinger, “Interface automata,” in Proceedings of the 8th European software engineering conference, Vienna, Austria, 2001, pp. 109–120.","apa":"De Alfaro, L., & Henzinger, T. A. (2001). Interface automata. In Proceedings of the 8th European software engineering conference (pp. 109–120). Vienna, Austria: ACM. https://doi.org/10.1145/503209.503226","ama":"De Alfaro L, Henzinger TA. Interface automata. In: Proceedings of the 8th European Software Engineering Conference. ACM; 2001:109-120. doi:10.1145/503209.503226","chicago":"De Alfaro, Luca, and Thomas A Henzinger. “Interface Automata.” In Proceedings of the 8th European Software Engineering Conference, 109–20. ACM, 2001. https://doi.org/10.1145/503209.503226.","ista":"De Alfaro L, Henzinger TA. 2001. Interface automata. Proceedings of the 8th European software engineering conference. FSE: Foundations of Software Engineering, 109–120."},"date_updated":"2023-05-08T12:01:02Z","status":"public","type":"conference","conference":{"end_date":"2001-09-14","location":"Vienna, Austria","start_date":"2001-09-10","name":"FSE: Foundations of Software Engineering"},"_id":"4622","date_published":"2001-06-01T00:00:00Z","doi":"10.1145/503209.503226","date_created":"2018-12-11T12:09:48Z","page":"109 - 120","day":"01","publication":"Proceedings of the 8th European software engineering conference","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9781581133905"]},"publication_status":"published","year":"2001","month":"06","publisher":"ACM","scopus_import":"1","quality_controlled":"1","oa_version":"None","acknowledgement":"We thank Edward A. Lee, Xiaojun Liu, Freddy Mang, and Yuhong Xiong for fruitful discussions. This research was supported in part by the AFOSR MURI grant F49620-00-1-0327, the DARPA MoBIES grant F33615-00-C-1703, the MARCO GSRC grant 98-DT-660, the NSF Theory grant CCR-9988172, and the NSF ITR grant CCR-0085949.","abstract":[{"lang":"eng","text":"Conventional type systems specify interfaces in terms of values and domains. We present a light-weight formalism that captures the temporal aspects of software component interfaces. Specifically, we use an automata-based language to capture both input assumptions about the order in which the methods of a component are called, and output guarantees about the order in which the component calls external methods. The formalism supports automatic compatability checks between interface models, and thus constitutes a type system for component interaction. Unlike traditional uses of automata, our formalism is based on an optimistic approach to composition, and on an alternating approach to design refinement. According to the optimistic approach, two components are compatible if there is some environment that can make them work together. According to the alternating approach, one interface refines another if it has weaker input assumptions, and stronger output guarantees. We show that these notions have game-theoretic foundations that lead to efficient algorithms for checking compatibility and refinement."}]},{"day":"26","publication":"Proceedings of the 1st International Workshop on Embedded Software","year":"2001","date_published":"2001-09-26T00:00:00Z","doi":"10.1007/3-540-45449-7_11","date_created":"2018-12-11T12:09:48Z","page":"148 - 165","acknowledgement":"This research was supported in part by the AFOSR MURI grant F49620-00-1-0327, the DARPA ITO grant F33615-00-C-1693, the MARCO grant 98-DT-660, and the NSF ITR grant CCR-0085949.","quality_controlled":"1","publisher":"ACM","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","citation":{"ista":"De Alfaro L, Henzinger TA. 2001. Interface theories for component-based design. Proceedings of the 1st International Workshop on Embedded Software. EMSOFT: Embedded Software , LNCS, vol. 2211, 148–165.","chicago":"De Alfaro, Luca, and Thomas A Henzinger. “Interface Theories for Component-Based Design.” In Proceedings of the 1st International Workshop on Embedded Software, 2211:148–65. ACM, 2001. https://doi.org/10.1007/3-540-45449-7_11.","apa":"De Alfaro, L., & Henzinger, T. A. (2001). Interface theories for component-based design. In Proceedings of the 1st International Workshop on Embedded Software (Vol. 2211, pp. 148–165). Tahoe City, CA, USA: ACM. https://doi.org/10.1007/3-540-45449-7_11","ama":"De Alfaro L, Henzinger TA. Interface theories for component-based design. In: Proceedings of the 1st International Workshop on Embedded Software. Vol 2211. ACM; 2001:148-165. doi:10.1007/3-540-45449-7_11","ieee":"L. De Alfaro and T. A. Henzinger, “Interface theories for component-based design,” in Proceedings of the 1st International Workshop on Embedded Software, Tahoe City, CA, USA, 2001, vol. 2211, pp. 148–165.","short":"L. De Alfaro, T.A. Henzinger, in:, Proceedings of the 1st International Workshop on Embedded Software, ACM, 2001, pp. 148–165.","mla":"De Alfaro, Luca, and Thomas A. Henzinger. “Interface Theories for Component-Based Design.” Proceedings of the 1st International Workshop on Embedded Software, vol. 2211, ACM, 2001, pp. 148–65, doi:10.1007/3-540-45449-7_11."},"title":"Interface theories for component-based design","author":[{"full_name":"De Alfaro, Luca","last_name":"De Alfaro","first_name":"Luca"},{"orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"publist_id":"84","article_processing_charge":"No","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9783540426738"]},"publication_status":"published","volume":2211,"oa_version":"None","abstract":[{"lang":"eng","text":"We classify component-based models of computation into component models and interface models. A component model specifies for each component howthe component behaves in an arbitrary environment; an interface model specifies for each component what the component expects from the environment. Component models support compositional abstraction, and therefore component-based verification. Interface models support compositional refinement, and therefore componentbased design. Many aspects of interface models, such as compatibility and refinement checking between interfaces, are properly viewed in a gametheoretic setting, where the input and output values of an interface are chosen by different players."}],"month":"09","intvolume":" 2211","alternative_title":["LNCS"],"scopus_import":"1","extern":"1","date_updated":"2023-05-08T12:11:20Z","_id":"4623","status":"public","type":"conference","conference":{"name":"EMSOFT: Embedded Software ","end_date":"2001-10-10","location":"Tahoe City, CA, USA","start_date":"2001-10-08"}},{"status":"public","conference":{"location":"Daytona Beach, FL, USA","end_date":"2001-10-18","start_date":"2001-10-14","name":"DASC: Digital Avionics Systems Conference"},"type":"conference","_id":"4564","title":"A reusable and platform-independent framework for distributed control systems","article_processing_charge":"No","publist_id":"143","author":[{"last_name":"Brown","full_name":"Brown, Timothy","first_name":"Timothy"},{"first_name":"Alessandro","full_name":"Pasetti, Alessandro","last_name":"Pasetti"},{"full_name":"Pree, Wolfgang","last_name":"Pree","first_name":"Wolfgang"},{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"last_name":"Kirsch","full_name":"Kirsch, Christoph","first_name":"Christoph"}],"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","citation":{"mla":"Brown, Timothy, et al. “A Reusable and Platform-Independent Framework for Distributed Control Systems.” Proceedings of the 20th Digital Avionics Systems Conference, IEEE, 2001, pp. 1–11, doi:10.1109/DASC.2001.964169.","ama":"Brown T, Pasetti A, Pree W, Henzinger TA, Kirsch C. A reusable and platform-independent framework for distributed control systems. In: Proceedings of the 20th Digital Avionics Systems Conference. IEEE; 2001:1-11. doi:10.1109/DASC.2001.964169","apa":"Brown, T., Pasetti, A., Pree, W., Henzinger, T. A., & Kirsch, C. (2001). A reusable and platform-independent framework for distributed control systems. In Proceedings of the 20th Digital Avionics Systems Conference (pp. 1–11). Daytona Beach, FL, USA: IEEE. https://doi.org/10.1109/DASC.2001.964169","short":"T. Brown, A. Pasetti, W. Pree, T.A. Henzinger, C. Kirsch, in:, Proceedings of the 20th Digital Avionics Systems Conference, IEEE, 2001, pp. 1–11.","ieee":"T. Brown, A. Pasetti, W. Pree, T. A. Henzinger, and C. Kirsch, “A reusable and platform-independent framework for distributed control systems,” in Proceedings of the 20th Digital Avionics Systems Conference, Daytona Beach, FL, USA, 2001, pp. 1–11.","chicago":"Brown, Timothy, Alessandro Pasetti, Wolfgang Pree, Thomas A Henzinger, and Christoph Kirsch. “A Reusable and Platform-Independent Framework for Distributed Control Systems.” In Proceedings of the 20th Digital Avionics Systems Conference, 1–11. IEEE, 2001. https://doi.org/10.1109/DASC.2001.964169.","ista":"Brown T, Pasetti A, Pree W, Henzinger TA, Kirsch C. 2001. A reusable and platform-independent framework for distributed control systems. Proceedings of the 20th Digital Avionics Systems Conference. DASC: Digital Avionics Systems Conference, 1–11."},"date_updated":"2023-05-09T12:23:16Z","month":"08","scopus_import":"1","quality_controlled":"1","publisher":"IEEE","acknowledgement":"This research was supported in part by DARPA under grants F336 15-C-98-36 14, F33615-00-(2-1693, and F33615-00-C-1703, and by MARC0 under grant 98-DT-660. ","oa_version":"None","abstract":[{"text":"This paper presents a concept for integrating the embedded programming methodology Giotto and the object-oriented AOCS Framework to create an environment for the rapid development of distributed software for safety-critical embedded control systems with hard real-time requirements of the kind typically found in aerospace applications.","lang":"eng"}],"date_created":"2018-12-11T12:09:30Z","doi":"10.1109/DASC.2001.964169","date_published":"2001-08-06T00:00:00Z","page":"1 - 11","language":[{"iso":"eng"}],"publication":"Proceedings of the 20th Digital Avionics Systems Conference","day":"06","year":"2001","publication_status":"published","publication_identifier":{"isbn":["0780370341"]}},{"volume":2034,"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783540418665"]},"intvolume":" 2034","month":"03","alternative_title":["LNCS"],"scopus_import":"1","oa_version":"None","abstract":[{"text":"The assume-guarantee paradigm is a powerful divide-and-conquer mechanism for decomposing a verification task about a system into subtasks about the individual components of the system. The key to assume-guarantee reasoning is to consider each component not in isolation, but in conjunction with assumptions about the context of the component. Assume-guarantee principles are known for purely concurrent contexts, which constrain the input data of a component, as well as for purely sequential contexts, which constrain the entry configurations of a component. We present a model for hierarchical system design which permits the arbitrary nesting of parallel as well as serial composition, and which supports an assume-guarantee principle for mixed parallel-serial contexts. Our model also supports both discrete and continuous processes, and is therefore well-suited for the modeling and analysis of embedded software systems which interact with real-world environments. Using an example of two cooperating robots, we show refinement between a high-level model which specifies continuous timing constraints and an implementation which relies on discrete sampling.","lang":"eng"}],"extern":"1","date_updated":"2023-05-09T14:47:37Z","status":"public","conference":{"name":"HSCC: Hybrid Systems - Computation and Control","start_date":"2001-03-28","location":"Rome, Italy","end_date":"2001-03-30"},"type":"conference","_id":"4477","date_created":"2018-12-11T12:09:03Z","date_published":"2001-03-14T00:00:00Z","doi":"10.1007/3-540-45351-2_24","page":"275 - 290","publication":"Proceedings of the 4th International Workshop on Hybrid Systems","day":"14","year":"2001","publisher":"Springer","quality_controlled":"1","acknowledgement":"Support for this research was provided in part by the AFOSR MURI grant F49620- 00-1-0327, and the DARPA SEC grant F33615-C-98-3614, the MARCO GSRC grant 98-DT-660, the NSF ITR grant CCR-0085949.","title":"Assume-guarantee reasoning for hierarchical hybrid systems","article_processing_charge":"No","author":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"},{"full_name":"Minea, Marius","last_name":"Minea","first_name":"Marius"},{"last_name":"Prabhu","full_name":"Prabhu, Vinayak","first_name":"Vinayak"}],"publist_id":"250","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","citation":{"ista":"Henzinger TA, Minea M, Prabhu V. 2001. Assume-guarantee reasoning for hierarchical hybrid systems. Proceedings of the 4th International Workshop on Hybrid Systems. HSCC: Hybrid Systems - Computation and Control, LNCS, vol. 2034, 275–290.","chicago":"Henzinger, Thomas A, Marius Minea, and Vinayak Prabhu. “Assume-Guarantee Reasoning for Hierarchical Hybrid Systems.” In Proceedings of the 4th International Workshop on Hybrid Systems, 2034:275–90. Springer, 2001. https://doi.org/10.1007/3-540-45351-2_24.","short":"T.A. Henzinger, M. Minea, V. Prabhu, in:, Proceedings of the 4th International Workshop on Hybrid Systems, Springer, 2001, pp. 275–290.","ieee":"T. A. Henzinger, M. Minea, and V. Prabhu, “Assume-guarantee reasoning for hierarchical hybrid systems,” in Proceedings of the 4th International Workshop on Hybrid Systems, Rome, Italy, 2001, vol. 2034, pp. 275–290.","ama":"Henzinger TA, Minea M, Prabhu V. Assume-guarantee reasoning for hierarchical hybrid systems. In: Proceedings of the 4th International Workshop on Hybrid Systems. Vol 2034. Springer; 2001:275-290. doi:10.1007/3-540-45351-2_24","apa":"Henzinger, T. A., Minea, M., & Prabhu, V. (2001). Assume-guarantee reasoning for hierarchical hybrid systems. In Proceedings of the 4th International Workshop on Hybrid Systems (Vol. 2034, pp. 275–290). Rome, Italy: Springer. https://doi.org/10.1007/3-540-45351-2_24","mla":"Henzinger, Thomas A., et al. “Assume-Guarantee Reasoning for Hierarchical Hybrid Systems.” Proceedings of the 4th International Workshop on Hybrid Systems, vol. 2034, Springer, 2001, pp. 275–90, doi:10.1007/3-540-45351-2_24."}},{"month":"06","publisher":"ACM","quality_controlled":"1","scopus_import":"1","oa_version":"None","acknowledgement":"We thank Rupak Majumdar for implementing a prototype Giotto compiler for Lego Mindstorms robots. We thank Dmitry Derevyanko and Winthrop Williams for building our Intel x86 robots. We thank Edward Lee and Xiaojun Liu for help with a Ptolemy II [4] implementation of Giotto. This research was supported in part by the DARPA SEC grant F33615-C-98-3614, the DARPA MoBIES grant F33615- 00-C-1703, the MARCO GSRC grant 98-DT-660, the AFOSR MURI grant F49620-00-1-0327, and the NSF ITR grant CCR-0085949.","abstract":[{"text":"Giotto is a principled, tool-supported design methodology for implementing embedded control systems on platforms of possibly distributed sensors, actuators, CPUs, and networks. Giotto is based on the principle that time-triggered task invocations plus time-triggered mode switches can form the abstract essence of programming real-time control systems. Giotto consists of a programming language with a formal semantics, and a retargetable compiler and runtime library. Giotto supports the automation of control system design by strictly separating platform-independent functionality and timing concerns from platform-dependent scheduling and communication issues. The time-triggered predictability of Giotto makes it particularly suitable for safety-critical applications with hard real-time constraints. We illustrate the platform-independence and time-triggered execution of Giotto by coordinating a heterogeneous flock of Intel x86 robots and Lego Mindstorms robots.","lang":"eng"}],"date_published":"2001-06-01T00:00:00Z","doi":"10.1145/384197.384208","date_created":"2018-12-11T12:09:03Z","page":"64 - 72","day":"01","language":[{"iso":"eng"}],"publication":"Proceedings of the 2nd ACM SIGPLAN workshop on Languages, compilers and tools for embedded systems","publication_identifier":{"isbn":["9781581134254"]},"publication_status":"published","year":"2001","status":"public","type":"conference","conference":{"location":"New York, NY, United States","name":"LCTES: Languages, Compilers, and Tools for Embedded Systems"},"_id":"4478","title":"Embedded control systems development with Giotto","author":[{"orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Benjamin","full_name":"Horowitz, Benjamin","last_name":"Horowitz"},{"first_name":"Christoph","full_name":"Kirsch, Christoph","last_name":"Kirsch"}],"publist_id":"251","article_processing_charge":"No","extern":"1","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","date_updated":"2023-05-10T09:37:20Z","citation":{"chicago":"Henzinger, Thomas A, Benjamin Horowitz, and Christoph Kirsch. “Embedded Control Systems Development with Giotto.” In Proceedings of the 2nd ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, 64–72. ACM, 2001. https://doi.org/10.1145/384197.384208.","ista":"Henzinger TA, Horowitz B, Kirsch C. 2001. Embedded control systems development with Giotto. Proceedings of the 2nd ACM SIGPLAN workshop on Languages, compilers and tools for embedded systems. LCTES: Languages, Compilers, and Tools for Embedded Systems, 64–72.","mla":"Henzinger, Thomas A., et al. “Embedded Control Systems Development with Giotto.” Proceedings of the 2nd ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, ACM, 2001, pp. 64–72, doi:10.1145/384197.384208.","ieee":"T. A. Henzinger, B. Horowitz, and C. Kirsch, “Embedded control systems development with Giotto,” in Proceedings of the 2nd ACM SIGPLAN workshop on Languages, compilers and tools for embedded systems, New York, NY, United States, 2001, pp. 64–72.","short":"T.A. Henzinger, B. Horowitz, C. Kirsch, in:, Proceedings of the 2nd ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, ACM, 2001, pp. 64–72.","apa":"Henzinger, T. A., Horowitz, B., & Kirsch, C. (2001). Embedded control systems development with Giotto. In Proceedings of the 2nd ACM SIGPLAN workshop on Languages, compilers and tools for embedded systems (pp. 64–72). New York, NY, United States: ACM. https://doi.org/10.1145/384197.384208","ama":"Henzinger TA, Horowitz B, Kirsch C. Embedded control systems development with Giotto. In: Proceedings of the 2nd ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems. ACM; 2001:64-72. doi:10.1145/384197.384208"}},{"date_updated":"2023-05-10T09:42:10Z","extern":"1","_id":"4479","type":"conference","conference":{"name":"EMSOFT: Embedded Software ","start_date":"2001-10-08","end_date":"2001-10-10","location":"Tahoe City, CA, USA"},"status":"public","publication_identifier":{"isbn":["9783540426738"]},"publication_status":"published","language":[{"iso":"eng"}],"volume":2211,"abstract":[{"lang":"eng","text":"Giotto provides an abstract programmer’s model for the implementation of embedded control systems with hard real-time constraints. A typical control application consists of periodic software tasks together with a mode switching logic for enabling and disabling tasks. Giotto specifies time-triggered sensor readings, task invocations, and mode switches independent of any implementation platform. Giotto can be annotated with platform constraints such as task-to-host mappings, and task and communication schedules. The annotations are directives for the Giotto compiler, but they do not alter the functionality and timing of a Giotto program. By separating the platform-independent from the platform-dependent concerns, Giotto enables a great deal of flexibility in choosing control platforms as well as a great deal of automation in the validation and synthesis of control software. The time-triggered nature of Giotto achieves timing predictability, which makes Giotto particularly suitable for safety-critical applications."}],"oa_version":"None","scopus_import":"1","alternative_title":["LNCS"],"month":"09","intvolume":" 2211","citation":{"ista":"Henzinger TA, Horowitz B, Kirsch C. 2001. Giotto: A time-triggered language for embedded programming. Proceedings of the 1st International Workshop on Embedded Software. EMSOFT: Embedded Software , LNCS, vol. 2211, 166–184.","chicago":"Henzinger, Thomas A, Benjamin Horowitz, and Christoph Kirsch. “Giotto: A Time-Triggered Language for Embedded Programming.” In Proceedings of the 1st International Workshop on Embedded Software, 2211:166–84. ACM, 2001. https://doi.org/10.1007/3-540-45449-7_12.","apa":"Henzinger, T. A., Horowitz, B., & Kirsch, C. (2001). Giotto: A time-triggered language for embedded programming. In Proceedings of the 1st International Workshop on Embedded Software (Vol. 2211, pp. 166–184). Tahoe City, CA, USA: ACM. https://doi.org/10.1007/3-540-45449-7_12","ama":"Henzinger TA, Horowitz B, Kirsch C. Giotto: A time-triggered language for embedded programming. In: Proceedings of the 1st International Workshop on Embedded Software. Vol 2211. ACM; 2001:166-184. doi:10.1007/3-540-45449-7_12","ieee":"T. A. Henzinger, B. Horowitz, and C. Kirsch, “Giotto: A time-triggered language for embedded programming,” in Proceedings of the 1st International Workshop on Embedded Software, Tahoe City, CA, USA, 2001, vol. 2211, pp. 166–184.","short":"T.A. Henzinger, B. Horowitz, C. Kirsch, in:, Proceedings of the 1st International Workshop on Embedded Software, ACM, 2001, pp. 166–184.","mla":"Henzinger, Thomas A., et al. “Giotto: A Time-Triggered Language for Embedded Programming.” Proceedings of the 1st International Workshop on Embedded Software, vol. 2211, ACM, 2001, pp. 166–84, doi:10.1007/3-540-45449-7_12."},"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","author":[{"orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Benjamin","full_name":"Horowitz, Benjamin","last_name":"Horowitz"},{"first_name":"Christoph","last_name":"Kirsch","full_name":"Kirsch, Christoph"}],"publist_id":"252","article_processing_charge":"No","title":"Giotto: A time-triggered language for embedded programming","year":"2001","day":"26","publication":"Proceedings of the 1st International Workshop on Embedded Software","page":"166 - 184","date_published":"2001-09-26T00:00:00Z","doi":"10.1007/3-540-45449-7_12","date_created":"2018-12-11T12:09:04Z","acknowledgement":"This research was supported in part by the DARPA SEC grant F33615-C-98-3614 and by the MARCO GSRC grant 98-DT-660.","quality_controlled":"1","publisher":"ACM"},{"year":"2001","publication_status":"published","publication_identifier":{"isbn":["0780370619"]},"language":[{"iso":"eng"}],"publication":"Proceedings of the 40th IEEE Conference on Decision and Control","day":"01","page":"2887 - 2892","date_created":"2018-12-11T12:09:02Z","volume":3,"doi":"10.1109/.2001.980714","date_published":"2001-05-01T00:00:00Z","abstract":[{"lang":"eng","text":"We provide an overview of the current status of HYTECH, and reflect on some of the lessons learned from our experiences with the tool. HYTECH is a symbolic model checker for mixed discrete-continuous systems that are modeled as automata with piecewise-constant polyhedral differential inclusions. The use of a formal input language and automated procedures for state-space traversal lay the foundation for formally verifying properties of hybrid dynamical systems. We describe some recent experiences analyzing three hybrid systems. We point out the successes and limitations of the tool. The analysis procedure has been extended in a number of ways to address some of the tool's shortcomings. We evaluate these extensions, and conclude with some desiderata for verification tools for hybrid systems."}],"oa_version":"None","scopus_import":"1","quality_controlled":"1","publisher":"IEEE","intvolume":" 3","month":"05","date_updated":"2023-05-10T09:47:20Z","citation":{"mla":"Henzinger, Thomas A., et al. “Some Lessons from the HYTECH Experience.” Proceedings of the 40th IEEE Conference on Decision and Control, vol. 3, IEEE, 2001, pp. 2887–92, doi:10.1109/.2001.980714.","ieee":"T. A. Henzinger, J. Preussig, and H. Wong Toi, “Some lessons from the HYTECH experience,” in Proceedings of the 40th IEEE Conference on Decision and Control, Orlando, FL, USA, 2001, vol. 3, pp. 2887–2892.","short":"T.A. Henzinger, J. Preussig, H. Wong Toi, in:, Proceedings of the 40th IEEE Conference on Decision and Control, IEEE, 2001, pp. 2887–2892.","ama":"Henzinger TA, Preussig J, Wong Toi H. Some lessons from the HYTECH experience. In: Proceedings of the 40th IEEE Conference on Decision and Control. Vol 3. IEEE; 2001:2887-2892. doi:10.1109/.2001.980714","apa":"Henzinger, T. A., Preussig, J., & Wong Toi, H. (2001). Some lessons from the HYTECH experience. In Proceedings of the 40th IEEE Conference on Decision and Control (Vol. 3, pp. 2887–2892). Orlando, FL, USA: IEEE. https://doi.org/10.1109/.2001.980714","chicago":"Henzinger, Thomas A, Joerg Preussig, and Howard Wong Toi. “Some Lessons from the HYTECH Experience.” In Proceedings of the 40th IEEE Conference on Decision and Control, 3:2887–92. IEEE, 2001. https://doi.org/10.1109/.2001.980714.","ista":"Henzinger TA, Preussig J, Wong Toi H. 2001. Some lessons from the HYTECH experience. Proceedings of the 40th IEEE Conference on Decision and Control. CDC: Decision and Control vol. 3, 2887–2892."},"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","article_processing_charge":"No","author":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A"},{"first_name":"Joerg","last_name":"Preussig","full_name":"Preussig, Joerg"},{"last_name":"Wong Toi","full_name":"Wong Toi, Howard","first_name":"Howard"}],"publist_id":"253","title":"Some lessons from the HYTECH experience","_id":"4475","conference":{"name":"CDC: Decision and Control","start_date":"2001-12-04","location":"Orlando, FL, USA","end_date":"2001-12-07"},"type":"conference","status":"public"},{"editor":[{"last_name":"Henzinger","orcid":"0000-0002-2985-7724","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"title":"EMSOFT: Embedded Software","article_processing_charge":"No","publist_id":"283","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","date_updated":"2023-05-10T09:53:17Z","citation":{"ista":"Henzinger TA ed. 2001. EMSOFT: Embedded Software, ACM,p.","chicago":"Henzinger, Thomas A, ed. EMSOFT: Embedded Software. Vol. 2211. ACM, 2001. https://doi.org/10.1007/3-540-45449-7.","apa":"Henzinger, T. A. (Ed.). (2001). EMSOFT: Embedded Software (Vol. 2211). Presented at the EMSOFT 2001: Embedded Software, Tahoe City, CA, USA: ACM. https://doi.org/10.1007/3-540-45449-7","ama":"Henzinger TA, ed. EMSOFT: Embedded Software. Vol 2211. ACM; 2001. doi:10.1007/3-540-45449-7","short":"T.A. Henzinger, ed., EMSOFT: Embedded Software, ACM, 2001.","ieee":"T. A. Henzinger, Ed., EMSOFT: Embedded Software, vol. 2211. ACM, 2001.","mla":"Henzinger, Thomas A., editor. EMSOFT: Embedded Software. Vol. 2211, ACM, 2001, doi:10.1007/3-540-45449-7."},"status":"public","conference":{"start_date":"2001-10-08","location":"Tahoe City, CA, USA","end_date":"2001-10-10","name":"EMSOFT 2001: Embedded Software"},"type":"conference_editor","_id":"4449","date_created":"2018-12-11T12:08:54Z","date_published":"2001-09-26T00:00:00Z","volume":2211,"doi":"10.1007/3-540-45449-7","language":[{"iso":"eng"}],"day":"26","publication_status":"published","year":"2001","publication_identifier":{"isbn":["9783540426738"]},"intvolume":" 2211","month":"09","publisher":"ACM","alternative_title":["LNCS"],"quality_controlled":"1","oa_version":"None","abstract":[{"lang":"eng","text":"Embedded software is software that interacts with physical processes. As em- bedded systems increasingly permeate our daily lives on all levels, from micros- copic devices to international networks, the cost-efficient development of reliable embedded software is one of the grand challenges in computer science today. The purpose of the workshop is to bring together researchers in all areas of computer science that are traditionally distinct but relevant to embedded software develop- ment, and to incubate a research community in this way. The workshop aims to cover all aspects of the design and implementation of embedded software, inclu- ding operating systems and middleware, programming languages and compilers, modeling and validation, software engineering and programming methodologies, scheduling and execution time analysis, networking and fault tolerance, as well as application areas, such as embedded control, real-time signal processing, and telecommunications."}]}]