Skip to main content

Showing 1–39 of 39 results for author: D'Antoni, L

.
  1. arXiv:2406.01792  [pdf, other

    cs.PL

    The SemGuS Toolkit

    Authors: Keith J. C. Johnson, Andrew Reynolds, Thomas Reps, Loris D'Antoni

    Abstract: Semantics-Guided Synthesis (SemGuS) is a programmable framework for defining synthesis problems in a domain- and solver-agnostic way. This paper presents the standardized SemGuS format, together with an open-source toolkit that provides a parser, a verifier, and enumerative SemGuS solvers. The paper also describes an initial set of SemGuS benchmarks, which form the basis for comparing SemGuS solve… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2405.21047  [pdf, other

    cs.AI cs.CL cs.LG

    Grammar-Aligned Decoding

    Authors: Kanghee Park, Jiayu Wang, Taylor Berg-Kirkpatrick, Nadia Polikarpova, Loris D'Antoni

    Abstract: Large Language Models (LLMs) struggle with reliably generating highly structured outputs, such as program code, mathematical formulas, or well-formed markup. Constrained decoding approaches mitigate this problem by greedily restricting what tokens an LLM can output at each step to guarantee that the output matches a given constraint. Specifically, in grammar-constrained decoding (GCD), the LLM's o… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  3. arXiv:2405.17361  [pdf, other

    cs.CL

    A One-Layer Decoder-Only Transformer is a Two-Layer RNN: With an Application to Certified Robustness

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: This paper reveals a key insight that a one-layer decoder-only Transformer is equivalent to a two-layer Recurrent Neural Network (RNN). Building on this insight, we propose ARC-Tran, a novel approach for verifying the robustness of decoder-only Transformers against arbitrary perturbation spaces. Compared to ARC-Tran, current robustness verification techniques are limited either to specific and len… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  4. arXiv:2403.03773  [pdf, other

    cs.LG

    Verified Training for Counterfactual Explanation Robustness under Data Shift

    Authors: Anna P. Meyer, Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Counterfactual explanations (CEs) enhance the interpretability of machine learning models by describing what changes to an input are necessary to change its prediction to a desired class. These explanations are commonly used to guide users' actions, e.g., by describing how a user whose loan application was denied can be approved for a loan in the future. Existing approaches generate CEs by focusin… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 16 pages, 2 figures. Accepted at DMLR workshop at ICLR 2024

  5. arXiv:2401.13244  [pdf, ps, other

    cs.PL

    Automating Unrealizability Logic: Hoare-style Proof Synthesis for Infinite Sets of Programs

    Authors: Shaan Nagy, **woo Kim, Loris D'Antoni, Thomas Reps

    Abstract: Unrealizability logic (UL) was proposed by Kim et al. as the first Hoare-style proof system for proving properties that hold for an infinite set of programs (defined by a regular tree grammar). The goal of our work is to automate reasoning and proof generation for UL. A key ingredient in UL is the notion of nonterminal summaries-inductive facts that characterize recursive nonterminals in the gramm… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: 30 pages, 5 figures, 2 tables

  6. arXiv:2308.06956  [pdf, ps, other

    cs.PL

    Modular System Synthesis

    Authors: Kanghee Park, Keith J. C. Johnson, Loris D'Antoni, Thomas Reps

    Abstract: This paper describes a way to improve the scalability of program synthesis by exploiting modularity: larger programs are synthesized from smaller programs. The key issue is to make each "larger-created-from-smaller" synthesis sub-problem be of a similar nature, so that the kind of synthesis sub-problem that needs to be solved--and the size of each search space--has roughly the same character at ea… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

  7. arXiv:2304.10655  [pdf, other

    cs.LG cs.CY

    The Dataset Multiplicity Problem: How Unreliable Data Impacts Predictions

    Authors: Anna P. Meyer, Aws Albarghouthi, Loris D'Antoni

    Abstract: We introduce dataset multiplicity, a way to study how inaccuracies, uncertainty, and social bias in training datasets impact test-time predictions. The dataset multiplicity framework asks a counterfactual question of what the set of resultant models (and associated test-time predictions) would be if we could somehow access all hypothetical, unbiased versions of the dataset. We discuss how to use t… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: 25 pages, 8 figures. Accepted at FAccT '23

  8. arXiv:2301.11824  [pdf, other

    cs.CR cs.LG

    PECAN: A Deterministic Certified Defense Against Backdoor Attacks

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Neural networks are vulnerable to backdoor poisoning attacks, where the attackers maliciously poison the training set and insert triggers into the test input to change the prediction of the victim model. Existing defenses for backdoor attacks either provide no formal guarantees or come with expensive-to-compute and ineffective probabilistic guarantees. We present PECAN, an efficient and certified… ▽ More

    Submitted 20 May, 2024; v1 submitted 27 January, 2023; originally announced January 2023.

  9. arXiv:2301.11117  [pdf, other

    cs.PL

    Synthesizing Specifications

    Authors: Kanghee Park, Loris D'Antoni, Thomas Reps

    Abstract: Every program should be accompanied by a specification that describes important aspects of the code's behavior, but writing good specifications is often harder than writing the code itself. This paper addresses the problem of synthesizing specifications automatically, guided by user-supplied inputs of two kinds: i) a query posed about a set of function definitions, and ii) a domain-specific langua… ▽ More

    Submitted 5 February, 2024; v1 submitted 26 January, 2023; originally announced January 2023.

  10. arXiv:2211.07117  [pdf, ps, other

    cs.PL cs.LO

    Unrealizability Logic

    Authors: **woo Kim, Loris D'Antoni, Thomas Reps

    Abstract: We consider the problem of establishing that a program-synthesis problem is unrealizable (i.e., has no solution in a given search space of programs). Prior work on unrealizability has developed some automatic techniques to establish that a problem is unrealizable; however, these techniques are all black-box, meaning that they conceal the reasoning behind why a synthesis problem is unrealizable. In… ▽ More

    Submitted 8 March, 2023; v1 submitted 14 November, 2022; originally announced November 2022.

  11. arXiv:2208.05131  [pdf, ps, other

    cs.FL

    Synthesizing Transducers from Complex Specifications

    Authors: Anvay Grover, Ruediger Ehlers, Loris D'Antoni

    Abstract: Automating string transformations has been one of the killer applications of program synthesis. Existing synthesizers that solve this problem produce programs in domain-specific languages (DSL) that are engineered to help the synthesizer, and therefore lack nice formal properties. This limitation prevents the synthesized programs from being used in verification applications (e.g., to check complex… ▽ More

    Submitted 28 August, 2022; v1 submitted 9 August, 2022; originally announced August 2022.

  12. arXiv:2206.03575  [pdf, other

    cs.LG

    Certifying Data-Bias Robustness in Linear Regression

    Authors: Anna P. Meyer, Aws Albarghouthi, Loris D'Antoni

    Abstract: Datasets typically contain inaccuracies due to human error and societal biases, and these inaccuracies can affect the outcomes of models trained on such datasets. We present a technique for certifying whether linear regression models are pointwise-robust to label bias in the training dataset, i.e., whether bounded perturbations to the labels of a training dataset result in models that change the p… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: 19 pages, 8 figures

  13. arXiv:2205.13634  [pdf, other

    cs.LG

    BagFlip: A Certified Defense against Data Poisoning

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Machine learning models are vulnerable to data-poisoning attacks, in which an attacker maliciously modifies the training set to change the prediction of a learned model. In a trigger-less attack, the attacker can modify the training set but not the test inputs, while in a backdoor attack the attacker can also modify test inputs. Existing model-agnostic defense approaches either cannot handle backd… ▽ More

    Submitted 16 October, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

    Comments: Neurips 2022

  14. arXiv:2204.03113  [pdf, other

    cs.PL cs.CR cs.NI

    P4BID: Information Flow Control in P4

    Authors: Karuna Grewal, Loris D'Antoni, Justin Hsu

    Abstract: Modern programmable network switches can implement custom applications using efficient packet processing hardware, and the programming language P4 provides high-level constructs to program such switches. The increase in speed and programmability has inspired research in dataplane programming, where many complex functionalities, e.g., key-value stores and load balancers, can be implemented entirely… ▽ More

    Submitted 14 June, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

  15. Prognosis: Closed-Box Analysis of Network Protocol Implementations

    Authors: Tiago Ferreira, Harrison Brewton, Loris D'Antoni, Alexandra Silva

    Abstract: We present Prognosis, a framework offering automated closed-box learning and analysis of models of network protocol implementations. Prognosis can learn models that vary in abstraction level from simple deterministic automata to models containing data operations, such as register updates, and can be used to unlock a variety of analysis techniques -- model checking temporal properties, computing di… ▽ More

    Submitted 14 November, 2021; originally announced January 2022.

    Comments: ACM SIGCOMM 2021 Conference (SIGCOMM '21), August 23--27, 2021, Virtual Event, USA

    ACM Class: F.3.1; F.1.1

    Journal ref: In Proceedings of the 2021 ACM SIGCOMM 2021 Conference. ACM, New York, NY, USA, 762-774

  16. arXiv:2110.04363  [pdf, other

    cs.LG cs.CY

    Certifying Robustness to Programmable Data Bias in Decision Trees

    Authors: Anna P. Meyer, Aws Albarghouthi, Loris D'Antoni

    Abstract: Datasets can be biased due to societal inequities, human biases, under-representation of minorities, etc. Our goal is to certify that models produced by a learning algorithm are pointwise-robust to potential dataset biases. This is a challenging problem: it entails learning models for a large, or even infinite, number of datasets, ensuring that they all produce the same prediction. We focus on dec… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: To be published at NeurIPS 2021. 22 pages, 4 figures

    ACM Class: I.2.2; I.5.0; K.4.2

  17. arXiv:2105.00493  [pdf, other

    cs.PL

    Synthesizing Abstract Transformers

    Authors: Pankaj Kumar Kalita, Sujit Kumar Muduli, Loris D'Antoni, Thomas Reps, Subhajit Roy

    Abstract: This paper addresses the problem of creating abstract transformers automatically. The method we present automates the construction of static analyzers in a fashion similar to the way $\textit{yacc}$ automates the construction of parsers. Our method treats the problem as a program-synthesis problem. The user provides specifications of (i) the concrete semantics of a given operation $\textit{op}$, (… ▽ More

    Submitted 15 August, 2022; v1 submitted 2 May, 2021; originally announced May 2021.

    Comments: 17 Figures, 5 Tables, 32 pages

  18. arXiv:2103.04188  [pdf, ps, other

    cs.PL

    Synthesis with Asymptotic Resource Bounds

    Authors: Qinhe** Hu, John Cyphert, Loris D'Antoni, Thomas Reps

    Abstract: We present a method for synthesizing recursive functions that satisfy both a functional specification and an asymptotic resource bound. Prior methods for synthesis with a resource metric require the user to specify a concrete expression exactly describing resource usage, whereas our method uses big-O notation to specify the asymptotic resource usage. Our method can synthesize programs with complex… ▽ More

    Submitted 26 May, 2021; v1 submitted 6 March, 2021; originally announced March 2021.

  19. arXiv:2102.07818  [pdf, other

    cs.LG

    Certified Robustness to Programmable Transformations in LSTMs

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Deep neural networks for natural language processing are fragile in the face of adversarial examples -- small input perturbations, like synonym substitution or word duplication, which cause a neural network to change its prediction. We present an approach to certifying the robustness of LSTMs (and extensions of LSTMs) and training models that can be efficiently certified. Our approach can certify… ▽ More

    Submitted 7 September, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

    Comments: EMNLP 2021

  20. Semantics-Guided Synthesis

    Authors: **woo Kim, Qinhe** Hu, Loris D'Antoni, Thomas Reps

    Abstract: This paper develops a new framework for program synthesis, called semantics-guided synthesis (SemGuS), that allows a user to provide both the syntax and the semantics for the constructs in the language. SemGuS accepts a recursively defined big-step semantics, which allows it, for example, to be used to specify and solve synthesis problems over an imperative programming language that may contain lo… ▽ More

    Submitted 11 November, 2020; v1 submitted 22 August, 2020; originally announced August 2020.

    Comments: Updated version for camera-ready

  21. Automata Tutor v3

    Authors: Loris D'Antoni, Martin Helfrich, Jan Kretinsky, Emanuel Ramneantu, Maximilian Weininger

    Abstract: Computer science class enrollments have rapidly risen in the past decade. With current class sizes, standard approaches to grading and providing personalized feedback are no longer possible and new techniques become both feasible and necessary. In this paper, we present the third version of Automata Tutor, a tool for hel** teachers and students in large courses on automata and formal languages.… ▽ More

    Submitted 14 May, 2020; v1 submitted 4 May, 2020; originally announced May 2020.

  22. Exact and Approximate Methods for Proving Unrealizability of Syntax-Guided Synthesis Problems

    Authors: Qinhe** Hu, John Cyphert, Loris D'Antoni, Thomas Reps

    Abstract: We consider the problem of automatically establishing that a given syntax-guided-synthesis (SyGuS) problem is unrealizable (i.e., has no solution). We formulate the problem of proving that a SyGuS problem is unrealizable over a finite set of examples as one of solving a set of equations: the solution yields an overapproximation of the set of possible outputs that any term in the search space can p… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Journal ref: PLDI 2020

  23. arXiv:2002.09579  [pdf, other

    cs.LG stat.ML

    Robustness to Programmable String Transformations via Augmented Abstract Training

    Authors: Yuhao Zhang, Aws Albarghouthi, Loris D'Antoni

    Abstract: Deep neural networks for natural language processing tasks are vulnerable to adversarial input perturbations. In this paper, we present a versatile language for programmatically specifying string transformations -- e.g., insertions, deletions, substitutions, swaps, etc. -- that are relevant to the task at hand. We then present an approach to adversarially training models that are robust to such us… ▽ More

    Submitted 2 September, 2020; v1 submitted 21 February, 2020; originally announced February 2020.

    Comments: 12 pages, ICML 2020

  24. arXiv:1912.02402  [pdf, other

    cs.NI

    D2R: Dataplane-Only Policy-Compliant Routing Under Failures

    Authors: Kausik Subramanian, Anubhavnidhi Abhashkumar, Loris D'Antoni, Aditya Akella

    Abstract: In networks today, the data plane handles forwarding---sending a packet to the next device in the path---and the control plane handles routing---deciding the path of the packet in the network. This architecture has limitations. First, when link failures occur, the data plane has to wait for the control plane to install new routes, and packet losses can occur due to delayed routing convergence or c… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

  25. arXiv:1912.00981  [pdf, other

    cs.PL cs.AI cs.CR cs.LG

    Proving Data-Poisoning Robustness in Decision Trees

    Authors: Samuel Drews, Aws Albarghouthi, Loris D'Antoni

    Abstract: Machine learning models are brittle, and small changes in the training data can result in different predictions. We study the problem of proving that a prediction is robust to data poisoning, where an attacker can inject a number of malicious elements into the training set to influence the learned model. We target decision-tree models, a popular and simple class of machine learning models that und… ▽ More

    Submitted 23 June, 2020; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: Changes: revisions to main text for clarity of presentation, and corrections to proofs in the appendices

  26. arXiv:1905.08364  [pdf, ps, other

    cs.PL

    Efficient Synthesis with Probabilistic Constraints

    Authors: Samuel Drews, Aws Albarghouthi, Loris D'Antoni

    Abstract: We consider the problem of synthesizing a program given a probabilistic specification of its desired behavior. Specifically, we study the recent paradigm of distribution-guided inductive synthesis (DIGITS), which iteratively calls a synthesizer on finite sample sets from a given distribution. We make theoretical and algorithmic contributions: (i) We prove the surprising result that DIGITS only req… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

  27. arXiv:1905.05800  [pdf, ps, other

    cs.PL

    Proving Unrealizability for Syntax-Guided Synthesis

    Authors: Qinhe** Hu, Jason Breck, John Cyphert, Loris D'Antoni, Thomas Reps

    Abstract: Proving Unrealizability for Syntax-Guided Synthesis We consider the problem of automatically establishing that a given syntax-guided-synthesis (SyGuS) problem is unrealizable (i.e., has no solution). Existing techniques have quite limited ability to establish unrealizability for general SyGuS instances in which the grammar describing the search space contains infinitely many programs. By encodin… ▽ More

    Submitted 23 July, 2019; v1 submitted 14 May, 2019; originally announced May 2019.

  28. arXiv:1811.06968  [pdf, other

    cs.FL

    Symbolic Register Automata

    Authors: Loris D'Antoni, Tiago Ferreira, Matteo Sammartino, Alexandra Silva

    Abstract: Symbolic Finite Automata and Register Automata are two orthogonal extensions of finite automata motivated by real-world problems where data may have unbounded domains. These automata address a demand for a model over large or infinite alphabets, respectively. Both automata models have interesting applications and have been successful in their own right. In this paper, we introduce Symbolic Registe… ▽ More

    Submitted 23 May, 2019; v1 submitted 16 November, 2018; originally announced November 2018.

  29. arXiv:1803.07522  [pdf, other

    cs.PL

    Program Repair via Direct State Manipulation

    Authors: Qinhe** Hu, Isaac Evavold, Roopsha Samanta, Rishabh Singh, Loris D'Antoni

    Abstract: The goal of program repair is to automatically fix programs to meet a specification. We propose a new specification mechanism, direct manipulation, in which the programmer can visualize the trace of a buggy program on a failing input and convey the intended program behavior by manipulating variable values at some location. The repair problem is to find a program that, on the same input, reaches th… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

  30. arXiv:1803.03806  [pdf, other

    cs.SE

    Learning Quick Fixes from Code Repositories

    Authors: Reudismam Rolim, Gustavo Soares, Rohit Gheyi, Titus Barik, Loris D'Antoni

    Abstract: Code analyzers such as Error Prone and FindBugs detect code patterns symptomatic of bugs, performance issues, or bad style. These tools express patterns as quick fixes that detect and rewrite unwanted code. However, it is difficult to come up with new quick fixes and decide which ones are useful and frequently appear in real code. We propose to rely on the collective wisdom of programmers and lear… ▽ More

    Submitted 7 September, 2018; v1 submitted 10 March, 2018; originally announced March 2018.

    Comments: 12 pages

  31. arXiv:1708.03786  [pdf, other

    cs.HC cs.CY cs.PL cs.SE

    TraceDiff: Debugging Unexpected Code Behavior Using Trace Divergences

    Authors: Ryo Suzuki, Gustavo Soares, Andrew Head, Elena Glassman, Ruan Reis, Melina Mongiovi, Loris D'Antoni, Bjoern Hartmann

    Abstract: Recent advances in program synthesis offer means to automatically debug student submissions and generate personalized feedback in massive programming classrooms. When automatically generating feedback for programming assignments, a key challenge is designing pedagogically useful hints that are as effective as the manual feedback given by teachers. Through an analysis of teachers' hint-giving pract… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.

    Comments: VL/HCC 2017

    ACM Class: H.5.2

  32. arXiv:1702.05437  [pdf, other

    cs.PL cs.AI

    Quantifying Program Bias

    Authors: Aws Albarghouthi, Loris D'Antoni, Samuel Drews, Aditya Nori

    Abstract: With the range and sensitivity of algorithmic decisions expanding at a break-neck speed, it is imperative that we aggressively investigate whether programs are biased. We propose a novel probabilistic program analysis technique and apply it to quantifying bias in decision-making programs. Specifically, we (i) present a sound and complete automated verification technique for proving quantitative pr… ▽ More

    Submitted 6 March, 2017; v1 submitted 17 February, 2017; originally announced February 2017.

  33. arXiv:1610.06067  [pdf, other

    cs.PL cs.AI

    Fairness as a Program Property

    Authors: Aws Albarghouthi, Loris D'Antoni, Samuel Drews, Aditya Nori

    Abstract: We explore the following question: Is a decision-making program fair, for some useful definition of fairness? First, we describe how several algorithmic fairness questions can be phrased as program verification problems. Second, we discuss an automated verification technique for proving or disproving fairness of decision-making programs with respect to a probabilistic model of the population.

    Submitted 19 October, 2016; originally announced October 2016.

  34. arXiv:1610.01722  [pdf, other

    cs.FL

    A Symbolic Decision Procedure for Symbolic Alternating Finite Automata

    Authors: Loris D'Antoni, Zachary Kincaid, Fang Wang

    Abstract: We introduce Symbolic Alternating Finite Automata (s-AFA) as an expressive, succinct, and decidable model for describing sets of finite sequences over arbitrary alphabets. Boolean operations over s-AFAs have linear complexity, which is in sharp contrast with the quadratic cost of intersection and union for non-alternating symbolic automata. Due to this succinctness, emptiness and equivalence check… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

    Comments: 12 pages

  35. arXiv:1608.09000  [pdf, other

    cs.SE cs.LG cs.PL

    Learning Syntactic Program Transformations from Examples

    Authors: Reudismam Rolim, Gustavo Soares, Loris D'Antoni, Oleksandr Polozov, Sumit Gulwani, Rohit Gheyi, Ryo Suzuki, Bjoern Hartmann

    Abstract: IDEs, such as Visual Studio, automate common transformations, such as Rename and Extract Method refactorings. However, extending these catalogs of transformations is complex and time-consuming. A similar phenomenon appears in intelligent tutoring systems where instructors have to write cumbersome code transformations that describe "common faults" to fix similar student submissions to programming a… ▽ More

    Submitted 31 August, 2016; originally announced August 2016.

  36. arXiv:1608.08219  [pdf, other

    cs.PL

    NoFAQ: Synthesizing Command Repairs from Examples

    Authors: Loris D'Antoni, Rishabh Singh, Michael Vaughn

    Abstract: Command-line tools are confusing and hard to use for novice programmers due to their cryptic error messages and lack of documentation. Novice users often resort to online help-forums for finding corrections to their buggy commands, but have a hard time in searching precisely for posts that are relevant to their problem and then applying the suggested solutions to their buggy command. We present… ▽ More

    Submitted 29 August, 2016; originally announced August 2016.

    Comments: 15 Pages, 9 Figures

  37. arXiv:1208.5980  [pdf, other

    cs.FL

    In the Maze of Data Languages

    Authors: Loris D'Antoni

    Abstract: In data languages the positions of strings and trees carry a label from a finite alphabet and a data value from an infinite alphabet. Extensions of automata and logics over finite alphabets have been defined to recognize data languages, both in the string and tree cases. In this paper we describe and compare the complexity and expressiveness of such models to understand which ones are better candi… ▽ More

    Submitted 29 August, 2012; originally announced August 2012.

  38. arXiv:1111.0670  [pdf, ps, other

    cs.FL cs.LO

    Regular Functions, Cost Register Automata, and Generalized Min-Cost Problems

    Authors: Rajeev Alur, Loris D'Antoni, Jyotirmoy V. Deshmukh, Mukund Raghothaman, Yifei Yuan

    Abstract: Motivated by the successful application of the theory of regular languages to formal verification of finite-state systems, there is a renewed interest in develo** a theory of analyzable functions from strings to numerical values that can provide a foundation for analyzing {\em quantitative} properties of finite-state systems. In this paper, we propose a deterministic model for associating costs… ▽ More

    Submitted 21 February, 2012; v1 submitted 2 November, 2011; originally announced November 2011.

    Comments: ICALP12 submission, technical report/extended version. 33 pages+title page

  39. arXiv:1104.2599  [pdf, other

    cs.FL cs.DB

    Streaming Tree Transducers

    Authors: Rajeev Alur, Loris D'Antoni

    Abstract: Theory of tree transducers provides a foundation for understanding expressiveness and complexity of analysis problems for specification languages for transforming hierarchically structured data such as XML documents. We introduce streaming tree transducers as an analyzable, executable, and expressive model for transforming unranked ordered trees in a single pass. Given a linear encoding of the inp… ▽ More

    Submitted 21 February, 2012; v1 submitted 13 April, 2011; originally announced April 2011.

    Comments: 40 pages