Proceedings 16th Annual IEEE Symposium on Logic in Computer Science最新文献

筛选
英文 中文
A symbolic labelled transition system for coinductive subtyping of F/sub /spl mu//spl les// types F/sub /spl mu//spl les//型共归纳亚型的符号标记过渡系统
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932508
A. Jeffrey, DePaul
{"title":"A symbolic labelled transition system for coinductive subtyping of F/sub /spl mu//spl les// types","authors":"A. Jeffrey, DePaul","doi":"10.1109/LICS.2001.932508","DOIUrl":"https://doi.org/10.1109/LICS.2001.932508","url":null,"abstract":"F/sub /spl les// is a typed /spl lambda/-calculus with subtyping and bounded polymorphism. Type checking for F/sub /spl les// is known to be undecidable, because the subtyping relation on types is undecidable. F/sub /spl mu//spl les// is an extension of F/sub /spl les// with recursive types. In this paper, we show how symbolic labelled transition system techniques from concurrency theory can be used to reason about subtyping for F/sub /spl mu//spl les//. We provide a symbolic labelled transition system for F/sub /spl mu//spl les// types, together with an appropriate notion of simulation, which coincides with the existing co-inductive definition of subtyping. We then provide a 'simulation up to' technique for proving subtyping, for which there is a simple model-checking algorithm. The algorithm is more powerful than the usual one for F/sub /spl les//, e.g. it terminates on G. Ghelli's (1995) canonical example of non-termination.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On definability of order in logic with choice 论有选择逻辑中顺序的可定义性
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932493
T. Huuskonen, Tapani Hyttinen
{"title":"On definability of order in logic with choice","authors":"T. Huuskonen, Tapani Hyttinen","doi":"10.1109/LICS.2001.932493","DOIUrl":"https://doi.org/10.1109/LICS.2001.932493","url":null,"abstract":"We will answer questions due to Blass and Gurevich (2000) on definability of order in the first-order logic with Hilbert's epsilon operation. We show that a linear ordering is almost surely definable in models with random choice.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety and liveness in branching time 安全活在枝桠年华
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932512
P. Manolios, Richard J. Trefler
{"title":"Safety and liveness in branching time","authors":"P. Manolios, Richard J. Trefler","doi":"10.1109/LICS.2001.932512","DOIUrl":"https://doi.org/10.1109/LICS.2001.932512","url":null,"abstract":"Extends B. Alpern & F.B. Schneider's linear time characterization of safety and liveness properties to branching time, where properties are sets of trees. We define two closure operators that give rise to the following four extremal types of properties: universally safe, existentially safe, universally live and existentially live. The distinction between universal and existential properties captures the difference between the CTL (computation tree logic) path quantifiers /spl forall/ (for all paths) and /spl exist/ (there is a path). We show that every branching time property is the intersection of an existentially safe property and an existentially live property, a universally safe property and a universally live property, and an existentially safe property and a universally live property. We also examine how our closure operators behave on linear-time properties. We then focus on sets of finitely branching trees and show that our closure operators agree on linear-time safety properties. Furthermore, if a set of trees is given implicitly as a Rabin tree automaton /spl Bscr/, we show that it is possible to compute the Rabin automata corresponding to the closures of the language of /spl Bscr/. This allows us to effectively compute /spl Bscr//sub safe/ and /spl Bscr//sub live/ such that the language of /spl Bscr/ is the intersection of the languages of /spl Bscr//sub safe/ and /spl Bscr//sub live/. As above, /spl Bscr//sub safe/ and /spl Bscr//sub live/ can be chosen so that their languages are existentially safe and existentially live, universally safe and universally live, or existentially safe and universally live.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Probabilistic polynomial-time process calculus and security protocol analysis 概率多项式时间过程演算与安全协议分析
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932477
John C. Mitchell, A. Ramanathan, A. Scedrov, Vanessa Teague
{"title":"Probabilistic polynomial-time process calculus and security protocol analysis","authors":"John C. Mitchell, A. Ramanathan, A. Scedrov, Vanessa Teague","doi":"10.1109/LICS.2001.932477","DOIUrl":"https://doi.org/10.1109/LICS.2001.932477","url":null,"abstract":"Abstract: We describe properties of a process calculus that has been developed for the purpose of analyzing security protocols. The process calculus is a restricted form of p-calculus, with bounded replication and probabilistic polynomial-time expressions allowed in messages and boolean tests. To avoid problems expressing security in the presence of nondeterminism, messages are scheduled probabilistically instead of nondeterministically. We prove that evaluation may be completed in probabilistic polynomial time and develop properties of a form of asymptotic protocol equivalence that allows security to be speci£ed using observational equivalence, a standard relation from programming language theory that involves quantifying over possible environments that might interact with the protocol. We also relate process equivalence to cryptographic concepts such as pseudorandom number generators and polynomial-time statistical tests.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123693729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Perturbed Turing machines and hybrid systems 扰动图灵机和混合系统
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932503
E. Asarin, A. Bouajjani
{"title":"Perturbed Turing machines and hybrid systems","authors":"E. Asarin, A. Bouajjani","doi":"10.1109/LICS.2001.932503","DOIUrl":"https://doi.org/10.1109/LICS.2001.932503","url":null,"abstract":"Investigates the computational power of several models of dynamical systems under infinitesimal perturbations of their dynamics. We consider models for both discrete- and continuous-time dynamical systems: Turing machines, piecewise affine maps, linear hybrid automata and piecewise-constant derivative systems (a simple model of hybrid systems). We associate with each of these models a notion of perturbed dynamics by a small /spl epsi/ (w.r.t. to a suitable metric), and define the perturbed reachability relation as the intersection of all reachability relations obtained by /spl epsi/-perturbations, for all possible values of /spl epsi/. We show that, for the four kinds of models we consider, the perturbed reachability relation is co-recursively enumerable (co-r.e.), and that any co-r.e. relation can be defined as the perturbed reachability relation of such models. A corollary of this result is that systems that are robust (i.e. whose reachability relation is stable under infinitesimal perturbation) are decidable.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130998668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
The hierarchy inside closed monadic /spl Sigma//sub 1/ collapses on the infinite binary tree 闭一元/spl Sigma//sub 1/内的层次结构在无限二叉树上崩溃
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932492
A. Arnold, G. Lenzi, J. Marcinkowski
{"title":"The hierarchy inside closed monadic /spl Sigma//sub 1/ collapses on the infinite binary tree","authors":"A. Arnold, G. Lenzi, J. Marcinkowski","doi":"10.1109/LICS.2001.932492","DOIUrl":"https://doi.org/10.1109/LICS.2001.932492","url":null,"abstract":"Closed monadic /spl Sigma//sub 1/, as proposed in (Ajtai et al., 1998), is the existential monadic second order logic where alternation between existential monadic second order quantifiers and first order quantifiers is allowed. Despite some effort very little is known about the expressive power of this logic on finite structures. We construct a tree automaton which exactly characterizes closed monadic /spl Sigma//sub 1/ on the Rabin tree and give a full analysis of the expressive power of closed monadic /spl Sigma//sub 1/ in this context. In particular we prove that the hierarchy inside closed monadic /spl Sigma//sub 1/, defined by the number of alternations between blocks of first order quantifiers and blocks of existential monadic second order quantifiers collapses, on the infinite tree, to the level 2.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Normalization by evaluation for typed lambda calculus with coproducts 带余积的类型化λ演算的归一化求值
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932506
Thorsten Altenkirch, P. Dybjer, M. Hofmann, P. Scott
{"title":"Normalization by evaluation for typed lambda calculus with coproducts","authors":"Thorsten Altenkirch, P. Dybjer, M. Hofmann, P. Scott","doi":"10.1109/LICS.2001.932506","DOIUrl":"https://doi.org/10.1109/LICS.2001.932506","url":null,"abstract":"Solves the decision problem for the simply typed lambda calculus with a strong binary sum, or, equivalently, the word problem for free Cartesian closed categories with binary co-products. Our method is based on the semantic technique known as \"normalization by evaluation\", and involves inverting the interpretation of the syntax in a suitable sheaf model and, from this, extracting an appropriate unique normal form. There is no rewriting theory involved and the proof is completely constructive, allowing program extraction from the proof.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125863303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Intuitionistic linear logic and partial correctness 直觉线性逻辑和部分正确性
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932502
D. Kozen, J. Tiuryn
{"title":"Intuitionistic linear logic and partial correctness","authors":"D. Kozen, J. Tiuryn","doi":"10.1109/LICS.2001.932502","DOIUrl":"https://doi.org/10.1109/LICS.2001.932502","url":null,"abstract":"We formulate a Gentzen-style sequent calculus for partial correctness that subsumes propositional Hoare logic. The system is a noncommutative intuitionistic linear logic. We prove soundness and completeness over relational and trace models. As a corollary, we obtain a complete sequent calculus for the inclusion and equivalence of regular expressions.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125646555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Relating semantic and proof-theoretic concepts for polynomial time decidability of uniform word problems 统一字问题多项式时间可决性的相关语义和证明理论概念
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932485
H. Ganzinger
{"title":"Relating semantic and proof-theoretic concepts for polynomial time decidability of uniform word problems","authors":"H. Ganzinger","doi":"10.1109/LICS.2001.932485","DOIUrl":"https://doi.org/10.1109/LICS.2001.932485","url":null,"abstract":"Compares three approaches to polynomial-time decidability for uniform word problems for quasi-varieties. Two of the approaches, by T. Evans (1951) and S. Burris (1995), respectively, are semantic, referring to certain embeddability and axiomatizability properties. The third approach is more proof-theoretic in nature, inspired by D. McAllester's (1993) concept of local inference. We define two closely related notions of locality for equational Horn theories and show that both of the criteria of Evans and Burris lie in between these two concepts. In particular, the variant we call \"stable locality\" is shown to subsume both Evans' and Burris's methods.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Deterministic generators and games for LTL fragments LTL片段的确定性生成器和游戏
Proceedings 16th Annual IEEE Symposium on Logic in Computer Science Pub Date : 2001-06-16 DOI: 10.1109/LICS.2001.932505
R. Alur, S. L. Torre
{"title":"Deterministic generators and games for LTL fragments","authors":"R. Alur, S. L. Torre","doi":"10.1109/LICS.2001.932505","DOIUrl":"https://doi.org/10.1109/LICS.2001.932505","url":null,"abstract":"Deciding infinite two-player games on finite graphs with the winning condition specified by a linear temporal logic (LTL) formula is known to be 2EXPTIME-complete. In this paper, we identify LTL fragments of lower complexity. Solving LTL games typically involves a doubly-exponential translation from LTL formulas to deterministic /spl omega/-automata. First, we show that the longest distance (length of the longest simple path) of the generator is also an important parameter, by giving an O(d log n)-space procedure to solve a Buchi game on a graph with n vertices and longest distance d. Then, for the LTL fragment with only eventualities and conjunctions, we provide a translation to deterministic generators of exponential size and linear longest distance, show both of these bounds to be optimal and prove the corresponding games to be PSPACE-complete. Introducing \"next\" modalities in this fragment, we provide a translation to deterministic generators that is still of exponential size but also with exponential longest distance, show both bounds to be optimal and prove the corresponding games to be EXPTIME-complete. For the fragment resulting by further adding disjunctions, we provide a translation to deterministic generators of doubly-exponential size and exponential longest distance, show both bounds to be optimal and prove the corresponding games to be EXPSPACE. Finally, we show tightness of the double-exponential bound on the size as well as the longest distance for deterministic generators for LTL, even in the absence of \"next\" and \"until\" modalities.","PeriodicalId":366313,"journal":{"name":"Proceedings 16th Annual IEEE Symposium on Logic in Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124251797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信