Analysis of recursive state machines, Proceedings of CAV, pp.207-220, 2001. ,
On the Computation of McMillan???s Prefix for Contextual Nets and Graph Grammars, Proceedings of ICGT, pp.91-106, 2010. ,
DOI : 10.1007/978-3-642-15928-2_7
Efficient unfolding of contextual Petri nets, Theoretical Computer Science, vol.449, issue.1, pp.2-22, 2012. ,
DOI : 10.1016/j.tcs.2012.04.046
URL : https://hal.archives-ouvertes.fr/hal-00776752
Building Tight Occurrence Nets from Reveals Relations, 2011 Eleventh International Conference on Application of Concurrency to System Design, pp.44-53, 2011. ,
DOI : 10.1109/ACSD.2011.16
URL : https://hal.archives-ouvertes.fr/inria-00638232
A Saturation Method for Collapsible Pushdown Systems, Proceedings of ICALP, Part II, pp.165-176, 2012. ,
DOI : 10.1007/978-3-642-31585-5_18
URL : https://hal.archives-ouvertes.fr/hal-00694991
McMillan???s Complete Prefix for Contextual Nets, Proceedings of the UFO workshop, pp.32-49, 2007. ,
DOI : 10.1007/BFb0055644
McMillan's complete prefix for contextual nets. Transactions on Petri Nets and Other Models of Concurrency, LNCS, vol.1, issue.5100, pp.199-220, 2008. ,
An event structure semantics for P/T contextual nets: Asymmetric event structures, Proceeding of FoSSaCS, pp.63-80, 1998. ,
DOI : 10.1007/BFb0053542
Contextual Petri Nets, Asymmetric Event Structures, and Processes, Information and Computation, vol.171, issue.1, pp.1-49, 2001. ,
DOI : 10.1006/inco.2001.3060
URL : http://doi.org/10.1006/inco.2001.3060
Bounded phase analysis of message-passing programs, Proceedings of TACAS, pp.451-465, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00653085
On a routing problem, Quarterly of Applied Mathematics, vol.16, issue.1, pp.87-90, 1958. ,
DOI : 10.1090/qam/102435
Reachability analysis of pushdown automata: Application to model-checking, Proceedings of CONCUR 1997, pp.135-150, 1997. ,
DOI : 10.1007/3-540-63141-0_10
Reachability Analysis of Multithreaded Software with Asynchronous Communication, Proceedings of FSTTCS, pp.348-359, 2005. ,
DOI : 10.1007/11590156_28
SDSIrep: A Reputation System Based on SDSI, Proceedings of TACAS, pp.501-516, 2008. ,
DOI : 10.1007/978-3-540-78800-3_39
A Generic Approach to the Static Analysis of Concurrent Programs with Procedures, International Journal of Foundations of Computer Science, vol.14, issue.04, pp.551-582, 2003. ,
DOI : 10.1142/S0129054103001893
URL : https://hal.archives-ouvertes.fr/hal-00161121
A generic approach to the static analysis of concurrent programs with procedures, Proceedings of POPL, pp.62-73, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-00161121
Diagnosis of asynchronous discrete-event systems: a net unfolding approach, IEEE Transactions on Automatic Control, vol.48, issue.5, pp.714-727, 2003. ,
DOI : 10.1109/TAC.2003.811249
URL : https://hal.archives-ouvertes.fr/inria-00638345
Contextbounded analysis of multithreaded programs with dynamic linked structures, Proceedings of CAVBGR01] Michael Benedikt, Patrice Godefroid, and Thomas W. Reps. Model checking of unrestricted hierarchical state machines Proceedings of ICALP, pp.207-220, 2001. ,
CodeSurfer/x86???A Platform for Analyzing x86 Executables, Conference on Compiler Construction, pp.250-254, 2005. ,
DOI : 10.1007/978-3-540-31985-6_19
Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems, Proceedings of CONCUR, pp.473-487, 2005. ,
DOI : 10.1007/11539452_36
URL : https://hal.archives-ouvertes.fr/hal-00161107
String-Rewriting Systems. Texts and Monographs in Computer Science, 1993. ,
Bebop: A Symbolic Model Checker for Boolean Programs, Proceedings of the SPIN Workshop, pp.113-130, 2000. ,
DOI : 10.1007/10722468_7
Automatically validating temporal safety properties of interfaces, Proceedings of SPIN, pp.103-122, 2001. ,
DOI : 10.1007/3-540-45139-0_7
Graph-Based Algorithms for Boolean Function Manipulation, IEEE Transactions on Computers, vol.35, issue.8, pp.35677-691, 1986. ,
DOI : 10.1109/TC.1986.1676819
Verfahren zur automatischen verarbeitung von kodierten daten und rechenmaschine zur ausbung des verfahrens, 1957. ,
Regular canonical systems and finite automata, Arch. Math. Logik, vol.6, pp.91-111, 1964. ,
On the regular structure of prefix rewriting, Theoretical Computer Science, vol.106, issue.1, pp.61-86, 1992. ,
DOI : 10.1016/0304-3975(92)90278-N
Somesh Jha, and Helmut Veith. Modular verification of software components in C, Proceedings of ICSE, pp.385-395, 2003. ,
Verifying concurrent message-passing C programs with recursive calls, Proceedings of TACAS, pp.334-349, 2006. ,
Counterexample-guided abstraction refinement, Proceedings of CAV, LNCS 1855, pp.154-169, 2000. ,
DOI : 10.1109/time.2003.1214874
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.407
A declarative encoding of telecommunications feature subscription in SAT, Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, PPDP '09, pp.255-266, 2009. ,
DOI : 10.1145/1599410.1599442
A note on two problems in connexion with graphs, Numerische Mathematik, vol.1, pp.269-271, 1959. ,
Solution of a problem in concurrent programming control, Communications of the ACM, vol.8, issue.9, p.569, 1965. ,
Locality-Based Abstractions, Proceedings of SAS, pp.118-134, 2005. ,
DOI : 10.1007/11547662_10
Implementing LTL model checking with net unfoldings, Proceedings of SPIN, pp.37-56, 2001. ,
DOI : 10.1007/3-540-45139-0_4
Unfoldings -A Partial-Order Approach to Model Checking, EATCS Monographs in Theoretical Computer Science, 2008. ,
Efficient Algorithms for Model Checking Pushdown Systems, Proceedings of CAV, pp.232-247, 2000. ,
DOI : 10.1007/10722167_20
Computation of summaries using net unfoldings, Proceedings of FSTTCS, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00925457
An Automata-Theoretic Approach to Interprocedural Data-Flow Analysis, Proceedings of FoSSaCS, pp.14-30, 1999. ,
DOI : 10.1007/3-540-49019-1_2
Reactive and Proactive Diagnosis of Distributed Systems Using Net Unfoldings, 2012 12th International Conference on Application of Concurrency to System Design, pp.154-163, 2012. ,
DOI : 10.1109/ACSD.2012.19
An Extension of Newton???s Method to ??-Continuous Semirings, Proceedings of DLT, pp.157-168, 2007. ,
DOI : 10.1007/978-3-540-73208-2_17
On Fixed Point Equations over Commutative Semirings, Proceedings of STACS, pp.296-307, 2007. ,
DOI : 10.1007/978-3-540-70918-3_26
Newton???s Method for ??-Continuous Semirings, Proceedings of ICALP, pp.14-26, 2008. ,
DOI : 10.1007/978-3-540-70583-3_2
Abstraction Refinement with Craig Interpolation and Symbolic Pushdown Systems, Proceedings of TACAS, pp.489-503, 2006. ,
DOI : 10.2307/2963593
A negative result on depth-first unfoldings. Software Tools for Technology Transfer, pp.161-166, 2008. ,
Abstraction Refinement with Craig Interpolation and Symbolic Pushdown Systems, Journal on Satisfiability Boolean Modeling and Computation, vol.22, pp.27-56, 2008. ,
DOI : 10.2307/2963593
A uniform framework for problems on context-free grammars, EATCS Bulletin, vol.72, pp.169-177, 2000. ,
An improvement of McMillan's unfolding algorithm. Formal Methods in System Design, pp.285-310, 2002. ,
A BDD-Based Model Checker for Recursive Programs, Proceedings of CAV, pp.324-336, 2001. ,
DOI : 10.1007/3-540-44585-4_30
An extensible SAT-solver, Proceedings of SAT, pp.502-518, 2003. ,
Network flow theory, 1956. ,
A direct symbolic approach to model checking pushdown systems, Electronic Notes in Theoretical Computer Science, vol.9, 1997. ,
Erreichbarkeitsanalyse funktionaler programme mit grundtermersetzungssystemen, 2008. ,
Precise Fixpoint Computation Through Strategy Iteration, Proceedings of ESOP, pp.300-315, 2007. ,
DOI : 10.1007/978-3-540-71316-6_21
Precise Relational Invariants Through Strategy Iteration, Proceedings of CSL, pp.23-40, 2007. ,
DOI : 10.1007/978-3-540-74915-8_6
Comparison of algorithms for checking emptiness on Büchi automata, Proceedings of the MEMICS workshop, pp.69-77, 2009. ,
Unfold and cover: Qualitative diagnosability for Petri Nets, 2007 46th IEEE Conference on Decision and Control, pp.1886-1891, 2007. ,
DOI : 10.1109/CDC.2007.4434691
URL : https://hal.archives-ouvertes.fr/inria-00638308
Types of Asynchronous Diagnosability and the Reveals-Relation in Occurrence Nets, IEEE Transactions on Automatic Control, vol.55, issue.10, pp.2310-2320, 2010. ,
DOI : 10.1109/TAC.2010.2063490
URL : https://hal.archives-ouvertes.fr/inria-00379540
Computer languages, The Australian Journal of Science, vol.20, pp.135-139, 1957. ,
Optimal constructions for active diagnosis, Proceedings of FSTTCS, 2013. ,
DOI : 10.1016/j.jcss.2016.04.007
URL : https://hal.archives-ouvertes.fr/hal-00926098
Lazy abstraction, Proceedings of POPL, pp.58-70, 2002. ,
Parikh's theorem in commutative Kleene algebra Computing the reveals relation in occurrence nets, Proceedings of LICS Proceedings of GandALF, volume 54 of Electronic Proceedings in Theoretical Computer Science, pp.394-401, 1999. ,
Computing the reveals relation in occurrence nets, Theoretical Computer Science, vol.493, pp.66-79, 2013. ,
DOI : 10.1016/j.tcs.2013.04.028
URL : https://hal.archives-ouvertes.fr/inria-00638262
Reachability analysis of communicating pushdown systems, Proceedings of FOSSACS, pp.267-281, 2010. ,
Symbolic backwardsreachability analysis for higher-order pushdown systems, Proceedings of FOSSACS, pp.213-227, 2007. ,
The SPIN Model Checker -primer and reference manual, 2004. ,
Reveal Your Faults: It's Only Fair!, 2013 13th International Conference on Application of Concurrency to System Design, pp.127-136, 2013. ,
DOI : 10.1109/ACSD.2013.15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.396.9818
Assembling molecules in Atomix is hard, Theoretical Computer Science, vol.303, issue.3, pp.447-462, 2004. ,
Reflections on Reflexion ? computational complexity considerations on a puzzle game, Proceedings of the Third International Conference on FUN with Algorithms, pp.90-105, 2004. ,
Invariant semantics of nets with inhibitor arcs, Proceedings of CONCUR, pp.317-331, 1991. ,
DOI : 10.1007/3-540-54430-5_97
Analysis of SPKI/SDSI certificates using model checking, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.129-146, 2002. ,
DOI : 10.1109/CSFW.2002.1021812
Weighted Pushdown Systems and Trust-Management Systems, Proceedings of TACAS, pp.1-26, 2006. ,
DOI : 10.1016/j.scico.2005.02.009
Boundedness vs. Unboundedness of Lock Chains: Characterizing Decidability of Pairwise CFL-Reachability for Threads Communicating via Locks, 2009 24th Annual IEEE Symposium on Logic In Computer Science, pp.27-36, 2009. ,
DOI : 10.1109/LICS.2009.45
The Punf unfolding tool ,
Reasoning about threads communicating via locks, Proceedings of CAV, pp.505-518, 2005. ,
LP Deadlock Checking Using Partial Order Dependencies, Proc. CONCUR, LNCS 1877, pp.410-425, 2000. ,
DOI : 10.1007/3-540-44618-4_30
Towards an Efficient Algorithm for Unfolding Petri Nets, Proc. CONCUR, LNCS 2154, pp.366-380, 2001. ,
DOI : 10.1007/3-540-44685-0_25
Verification of bounded Petri nets using integer programming. Formal Methods in System Design, pp.143-176, 2007. ,
Merged processes: a new condensed representation of Petri net behaviour, Acta Informatica, vol.77, issue.5, pp.307-330, 2006. ,
DOI : 10.1007/s00236-006-0023-y
Canonical prefixes of Petri net unfoldings, Acta Informatica, vol.40, issue.2, pp.95-118, 2003. ,
DOI : 10.1007/s00236-003-0122-y
An Algorithm for Direct Construction of Complete Merged Processes, Proceedings of Petri Nets, pp.89-108, 2011. ,
DOI : 10.1007/3-540-45657-0_2
WALi: the weighted automata library, 2006. ,
Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains, Proceedings of FOSSACS, pp.440-455, 2009. ,
DOI : 10.1007/978-3-540-71389-0_25
Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains, 2009. ,
DOI : 10.1007/978-3-540-71389-0_25
Context-Bounded Analysis of Concurrent Queue Systems, Proceedings of TACAS, pp.299-314, 2008. ,
DOI : 10.1007/978-3-540-78800-3_21
Reducing Context-Bounded Concurrent Reachability to Sequential Reachability, Proceedings of CAV, pp.477-492, 2009. ,
DOI : 10.1007/978-3-642-02658-4_36
Reachability of multistack pushdown systems with scope-bounded matching relations, Proceedings of CONCUR, pp.203-218, 2011. ,
Reachability Problems on Regular Ground Tree Rewriting Graphs, Theory of Computing Systems, pp.347-383, 2006. ,
DOI : 10.1007/s00224-004-1170-6
Reducing concurrent analysis under a context bound to sequential analysis. Formal Methods in System Design, pp.73-97, 2009. ,
Extended Weighted Pushdown Systems, Proceedings of CAV, pp.434-448, 2005. ,
DOI : 10.1007/11513988_44
Accelerated Data-Flow Analysis, Proceedings of SAS, pp.184-199, 2007. ,
DOI : 10.1007/978-3-540-74061-2_12
URL : https://hal.archives-ouvertes.fr/hal-00346005
Interprocedural Analysis of Concurrent Programs Under a Context Bound, Proceedings of TACAS, pp.282-298, 2008. ,
DOI : 10.1007/978-3-540-78800-3_20
Decidability and Complexity of Model Checking Problems for Infinite-State Systems, 1998. ,
Symbolic Model Checking: an approach to the state explosion problem, 1992. ,
Interpolation and SAT-Based Model Checking, Proceedings of CAV, pp.1-13, 2003. ,
DOI : 10.1007/978-3-540-45069-6_1
Precise interprocedural analysis through linear algebra, Proceedings of POPL, pp.330-341, 2004. ,
Contextual occurrence nets and concurrent constraint programming, Dagstuhl Seminar 9301, pp.280-295, 1994. ,
DOI : 10.1007/3-540-57787-4_18
Contextual nets, Acta Informatica, vol.112, issue.6, pp.545-596, 1995. ,
DOI : 10.1007/BF01178907
Deadlock checking using net unfoldings, Proceedings of CAV, pp.352-363, 1997. ,
DOI : 10.1007/3-540-63166-6_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.3517
Petri nets, event structures and domains, part I, Theoretical Computer Science, vol.13, issue.1, pp.85-108, 1981. ,
DOI : 10.1016/0304-3975(81)90112-2
:, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.55-66, 2006. ,
DOI : 10.1145/1180337.1180343
Report on a general problem-solving program, International Conference on Information Processing, pp.256-264, 1959. ,
Kommunikation mit Automaten, 1962. ,
Context-Bounded Model Checking of Concurrent Software, Proceedings of TACAS 2005, pp.93-107, 2005. ,
DOI : 10.1007/978-3-540-31980-1_7
KISS: keep it simple and sequential, Proceedings of PLDI, pp.14-24, 2004. ,
Bounded Incremental Computation, LNCS, vol.1089, 1996. ,
DOI : 10.1007/BFb0028290
Context-sensitive synchronization-sensitive analysis is undecidable, ACM Transactions on Programming Languages and Systems, vol.22, issue.2, pp.416-430, 2000. ,
DOI : 10.1145/349214.349241
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.538
Algorithms for Mutual Exclusion, 1986. ,
Elements of Distributed Algorithms: Modeling and Analysis with Petri Nets, 1998. ,
DOI : 10.1007/978-3-662-03687-7
Modelling Systems with Shared Resources via Petri Nets, 1994. ,
Verification of Petri Nets with Read Arcs, Proceedings of Concur, pp.471-485, 2012. ,
DOI : 10.1007/978-3-642-32940-1_33
An improved construction of Petri net unfoldings, Proceedings of the FSFMA workshop, pp.47-52, 2013. ,
Efficient Contextual Unfolding, Proceedings of Concur, pp.342-357, 2011. ,
DOI : 10.1007/BFb0055644
Weighted pushdown systems and their application to interprocedural dataflow analysis, Proceedings of SAS, pp.189-213, 2003. ,
Weighted pushdown systems and their application to interprocedural dataflow analysis, Special Issue on the Static Analysis Symposium, pp.206-263, 2003. ,
DOI : 10.1016/j.scico.2005.02.009
Contextual Merged Processes, Proceedings of ICATPN, pp.29-48, 2013. ,
DOI : 10.1007/978-3-642-38697-8_3
jMoped: A Test Environment for Java Programs, Proceedings of CAV, pp.164-167, 2007. ,
DOI : 10.1007/978-3-540-73368-3_19
WPDS: A library for weighted pushdown systems ,
Determinization and Complementation of Streett Automata, Automata, Logics, and Infinite Games, pp.79-91, 2002. ,
DOI : 10.1007/3-540-36387-4_5
Model-Checking Pushdown Systems, 2002. ,
A Note on On-the-Fly Verification Algorithms, Proceedings of TACAS, pp.174-190, 2005. ,
DOI : 10.1007/978-3-540-31980-1_12
Symbolic Context-Bounded Analysis of Multithreaded Java Programs, Proceedings of SPIN, pp.270-287, 2008. ,
DOI : 10.1007/978-3-540-85114-1_19
On generalized authorization problems, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.202-218, 2003. ,
DOI : 10.1109/CSFW.2003.1212714
Two approaches to interprocedural data flow analysis, Program Flow Analysis: Theory and Applications, pp.189-234 ,
Model-based test generation using quantified CSPs: A map, Proceedings of the ECAI 2008 Workshop on Model-Based Systems, pp.37-41, 2008. ,
jMoped: A Java Bytecode Checker Based on Moped, Proceedings of TACAS, pp.541-545, 2005. ,
DOI : 10.1007/978-3-540-31980-1_35
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains, Proceedings of ATVA, pp.141-153, 2006. ,
DOI : 10.1007/11901914_13
Reachability in Pushdown Systems: Algorithms and Applications, 2009. ,
Complexity Results on Balanced Context-Free Languages, Proceedings of FoSSaCS, pp.346-360, 2007. ,
DOI : 10.1007/978-3-540-71389-0_25
Proposal for the development in the mathematics division of an automatic computing engine, 1945. ,
Unfolding and finite prefix for nets with read arcs, Proceedings of CONCUR, LNCS 1466, pp.501-516, 1998. ,
DOI : 10.1007/BFb0055644
Automata theoretic techniques for modal logics of programs, Journal of Computer and System Sciences, vol.32, pp.183-221, 1986. ,
Pushdown Processes: Games and Model Checking, Proceedings of CAV, pp.62-74, 1996. ,
DOI : 10.7146/brics.v3i54.20057
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.4162
Model Checking CTL Properties of Pushdown Systems, Proceedings of FSTTCS, pp.127-138, 2000. ,
DOI : 10.1007/3-540-44450-5_10
Weighted Dynamic Pushdown Networks, Proceedings of ESOP, pp.590-609, 2010. ,
DOI : 10.1007/978-3-642-11957-6_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.3993
Reachability in contextual nets, Fundamenta Informaticae, vol.51, issue.12, pp.235-250, 2002. ,
A semantic model for authentication protocols, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.178-194, 1993. ,
DOI : 10.1109/RISP.1993.287633