Skip to main content

Showing 1–22 of 22 results for author: Nielson, F

.
  1. Experimental benchmarking of an automated deterministic error suppression workflow for quantum algorithms

    Authors: Pranav S. Mundada, Aaron Barbosa, Smarak Maity, Yulun Wang, T. M. Stace, Thomas Merkh, Felicity Nielson, Andre R. R. Carvalho, Michael Hush, Michael J. Biercuk, Yuval Baum

    Abstract: Excitement about the promise of quantum computers is tempered by the reality that the hardware remains exceptionally fragile and error-prone, forming a bottleneck in the development of novel applications. In this manuscript, we describe and experimentally test a fully autonomous workflow designed to deterministically suppress errors in quantum algorithms from the gate level through to circuit exec… ▽ More

    Submitted 3 May, 2023; v1 submitted 14 September, 2022; originally announced September 2022.

    Comments: 20 pages, 16 figures

  2. arXiv:2105.02991  [pdf

    q-bio.BM cs.MS

    Similarity Downselection: A Python implementation of a heuristic search algorithm for finding the set of the n most dissimilar items with an application in conformer sampling

    Authors: Felicity F. Nielson, Sean M. Colby, Ryan S. Renslow, Thomas O. Metz

    Abstract: Finding the set of the n items most dissimilar from each other out of a larger population becomes increasingly difficult and computationally expensive as either n or the population size grows large. Finding the set of the n most dissimilar items is different than simply sorting an array of numbers because there exists a pairwise relationship between each item and all other items in the population.… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

  3. arXiv:2012.10086  [pdf

    cs.PL

    Program Analysis (an Appetizer)

    Authors: Flemming Nielson, Hanne Riis Nielson

    Abstract: This book is an introduction to program analysis that is meant to be considerably more elementary than our advanced book Principles of Program Analysis (Springer, 2005). Rather than using flow charts as the model of programs, the book follows our introductory book Formal Methods an Appetizer (Springer, 2019) using program graphs as the model of programs. In our experience this makes the underlying… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

    Comments: 208 pages

  4. arXiv:2010.07434  [pdf

    physics.chem-ph q-bio.BM

    Exploring the impacts of conformer selection methods on ion mobility collision cross section predictions

    Authors: Felicity F. Nielson, Sean M. Colby, Dennis G. Thomas, Ryan S. Renslow, Thomas O. Metz

    Abstract: The prediction of structure dependent molecular properties, such as collision cross sections as measured using ion mobility spectrometry, are crucially dependent on the selection of the correct population of molecular conformers. Here, we report an in-depth evaluation of multiple conformation selection techniques, including simple averaging, Boltzmann weighting, lowest energy selection, low energy… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

  5. arXiv:1611.05651  [pdf, ps, other

    cs.PL

    A Theory of Available-by-Design Communicating Systems

    Authors: Hugo A. López, Flemming Nielson, Hanne Riis Nielson

    Abstract: Choreographic programming is a programming-language design approach that drives error-safe protocol development in distributed systems. Starting from a global specification (choreography) one can generate distributed implementations. The advantages of this top-down approach lie in the correctness-by-design principle, where implementations (endpoints) generated from a choreography behave according… ▽ More

    Submitted 17 November, 2016; originally announced November 2016.

    Comments: Extended version of paper entitled "Enforcing Availability in Failure-Aware Communicating Systems", presented at FORTE 2016. 30 pages (original paper) + 19 pages of appendixes

    MSC Class: 68Q55; 68Q60; 68Q85 ACM Class: D.2.4; D.3.1; D.3.2; B.8.1

  6. A Coordination Language for Databases

    Authors: Ximeng Li, Xi Wu, Alberto Lluch Lafuente, Flemming Nielson, Hanne Riis Nielson

    Abstract: We present a coordination language for the modeling of distributed database applications. The language, baptized Klaim-DB, borrows the concepts of localities and nets of the coordination language Klaim but re-incarnates the tuple spaces of Klaim as databases. It provides high-level abstractions and primitives for the access and manipulation of structured data, with integrity and atomicity consider… ▽ More

    Submitted 16 March, 2017; v1 submitted 7 October, 2016; originally announced October 2016.

    ACM Class: D.3.2

    Journal ref: Logical Methods in Computer Science, Volume 13, Issue 1 (March 17, 2017) lmcs:3205

  7. Discovering, quantifying, and displaying attacks

    Authors: Roberto Vigo, Flemming Nielson, Hanne Riis Nielson

    Abstract: In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially when distributed components are involved, it is hard to predict and confront all possible attacks. A main challenge in the development of complex systems is therefore to discover attacks, quantify them to comprehend their likelihood, and commu… ▽ More

    Submitted 19 October, 2016; v1 submitted 26 July, 2016; originally announced July 2016.

    Comments: LMCS SPECIAL ISSUE FORTE 2014

    MSC Class: 68Q60

    Journal ref: Logical Methods in Computer Science, Volume 12, Issue 4 (April 27, 2017) lmcs:2178

  8. arXiv:1403.6367  [pdf, ps, other

    cs.LO cs.CR eess.SY

    A Framework for Hybrid Systems with Denial-of-Service Security Attack

    Authors: Shuling Wang, Flemming Nielson, Hanne Riis Nielson

    Abstract: Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial-of-service security attack, the expected information from the controllers is not received and as a consequence the… ▽ More

    Submitted 27 March, 2014; v1 submitted 24 March, 2014; originally announced March 2014.

    Comments: 19 pages, 1 figures, the short version was accepted by FORTE 2014

  9. arXiv:1307.4585  [pdf, other

    cs.PL

    Pushdown Systems for Monotone Frameworks

    Authors: Michal Terepeta, Hanne Riis Nielson, Flemming Nielson

    Abstract: Monotone frameworks is one of the most successful frameworks for intraprocedural data flow analysis extending the traditional class of bitvector frameworks (like live variables and available expressions). Weighted pushdown systems is similarly one of the most general frameworks for interprocedural analysis of programs. However, it makes use of idempotent semirings to represent the sets of properti… ▽ More

    Submitted 17 July, 2013; originally announced July 2013.

  10. arXiv:1302.1111  [pdf

    cs.CR

    Design-Efficiency in Security

    Authors: Ender Yüksel, Hanne Riis Nielson, Flemming Nielson

    Abstract: In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-efficiency of key updates. We employ probabilistic model checking approach and present our modelling and analysis study using PRISM… ▽ More

    Submitted 5 February, 2013; originally announced February 2013.

    Report number: IMM--TECHNICALREPORT?2013-03

  11. arXiv:1209.6578  [pdf, other

    cs.LO cs.FL

    Roadmap Document on Stochastic Analysis

    Authors: Bo Friis Nielsen, Flemming Nielson, Henrik Pilegaard, Michael James Andrew Smith, Ender Yüksel, Kebin Zeng, Lijun Zhang

    Abstract: This document was prepared as part of the MT-LAB research centre. The research centre studies the Modelling of Information Technology and is a VKR Centre of Excellence funded for five years by the VILLUM Foundation. You can read more about MT-LAB at its webpage www.MT-LAB.dk. The goal of the document is to serve as an introduction to new PhD students addressing the research goals of MT-LAB. As s… ▽ More

    Submitted 27 September, 2012; originally announced September 2012.

    Comments: This work has been supported by MT-LAB, a VKR Centre of Excellence for the Modelling of Information Technology

  12. arXiv:1207.5384  [pdf, ps, other

    cs.LO

    Lattice based Least Fixed Point Logic

    Authors: Piotr Filipiuk, Flemming Nielson, Hanne Riis Nielson

    Abstract: As software systems become more complex, there is an increasing need for new static analyses. Thanks to the declarative style, logic programming is an attractive formalism for specifying them. However, prior work on using logic programming for static analysis focused on analyses defined over some powerset domain, which is quite limiting. In this paper we present a logic that lifts this restriction… ▽ More

    Submitted 23 July, 2012; originally announced July 2012.

  13. arXiv:1206.5327  [pdf, ps, other

    cs.IT

    XACML 3.0 in Answer Set Programming

    Authors: Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, Flemming Nielson

    Abstract: We present a systematic technique for transforming XACML 3.0 policies in Answer Set Programming (ASP). We show that the resulting logic program has a unique answer set that directly corresponds to our formalisation of the standard semantics of XACML 3.0 from Ramli et. al. We demonstrate how our results make it possible to use off-the-shelf ASP solvers to formally verify properties of access contro… ▽ More

    Submitted 18 February, 2013; v1 submitted 22 June, 2012; originally announced June 2012.

  14. arXiv:1205.6675  [pdf, other

    cs.CR

    Optimizing ZigBee Security using Stochastic Model Checking

    Authors: Ender Yüksel, Hanne Riis Nielson, Flemming Nielson, Matthias Fruth, Marta Kwiatkowska

    Abstract: ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report, we identify an important gap in the specification on key updates, and present a methodology for determ… ▽ More

    Submitted 30 May, 2012; originally announced May 2012.

  15. arXiv:1205.6664  [pdf

    cs.NI

    Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study

    Authors: Ender Yüksel, Hanne Riis Nielson, Flemming Nielson, Huibiao Zhu, Heqing Huang

    Abstract: Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues that require novel methods and applications. In this context, an important issue is the verification o… ▽ More

    Submitted 30 May, 2012; originally announced May 2012.

  16. arXiv:1204.2768  [pdf, ps, other

    cs.LO

    Layered Fixed Point Logic

    Authors: Piotr Filipiuk, Flemming Nielson, Hanne Riis Nielson

    Abstract: We present a logic for the specification of static analysis problems that goes beyond the logics traditionally used. Its most prominent feature is the direct support for both inductive computations of behaviors as well as co-inductive specifications of properties. Two main theoretical contributions are a Moore Family result and a parametrized worst case time complexity result. We show that the log… ▽ More

    Submitted 12 April, 2012; originally announced April 2012.

  17. arXiv:1201.4262  [pdf, ps, other

    cs.PL cs.DC

    Secondary use of data in EHR systems

    Authors: Fan Yang, Chris Hankin, Flemming Nielson, Hanne Riis Nielson

    Abstract: We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies - policies based on the future behavior of a program. A novel feature of our approach is that advice is able to analyze the future use of… ▽ More

    Submitted 20 January, 2012; originally announced January 2012.

    Comments: 40 pages

  18. arXiv:1110.3706  [pdf, ps, other

    cs.CR cs.LO

    The Logic of XACML - Extended

    Authors: Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, Flemming Nielson

    Abstract: We study the international standard XACML 3.0 for describing security access control policy in a compositional way. Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML. To guard against modelling artefacts we provide an alternative way of characterizing the policy combining… ▽ More

    Submitted 17 October, 2011; originally announced October 2011.

    Comments: Extended paper from The Logic of XACML, presented in FACS 2011 (8th International Symposium on Formal Aspects of Component Software)

  19. A Stochastic Broadcast Pi-Calculus

    Authors: Lei Song, Flemming Nielson, Bo Friis Nielsen

    Abstract: In this paper we propose a stochastic broadcast PI-calculus which can be used to model server-client based systems where synchronization is always governed by only one participant. Therefore, there is no need to determine the joint synchronization rates. We also take immediate transitions into account which is useful to model behaviors with no impact on the temporal properties of a system. Since i… ▽ More

    Submitted 6 July, 2011; originally announced July 2011.

    Comments: In Proceedings QAPL 2011, arXiv:1107.0746

    Journal ref: EPTCS 57, 2011, pp. 74-88

  20. Bisimulations Meet PCTL Equivalences for Probabilistic Automata

    Authors: Lei Song, Lijun Zhang, Jens Chr. Godskesen, Flemming Nielson

    Abstract: Probabilistic automata (PAs) have been successfully applied in formal verification of concurrent and stochastic systems. Efficient model checking algorithms have been studied, where the most often used logics for expressing properties are based on probabilistic computation tree logic (PCTL) and its extension PCTL^*. Various behavioral equivalences are proposed, as a powerful tool for abstraction… ▽ More

    Submitted 21 June, 2013; v1 submitted 10 June, 2011; originally announced June 2011.

    Comments: Long version of CONCUR'11 with the same title: added extension to simulations, countable states

    Journal ref: Logical Methods in Computer Science, Volume 9, Issue 2 (June 21, 2013) lmcs:1238

  21. Efficient CSL Model Checking Using Stratification

    Authors: Lijun Zhang, David N. Jansen, Flemming Nielson, Holger Hermanns

    Abstract: For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. Their proof can be turned into an approximation algorithm with worse than exponential complexity. In 2000, Baier, Haverkort, Hermanns and Katoen presented an efficient polynomial-time approx… ▽ More

    Submitted 27 June, 2012; v1 submitted 26 April, 2011; originally announced April 2011.

    Comments: 18 pages, preprint for LMCS. An extended abstract appeared in ICALP 2011

    ACM Class: G.3, F.4.1, F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 8, Issue 2 (July 31, 2012) lmcs:1085

  22. arXiv:1010.5567  [pdf, other

    cs.CR cs.DC cs.PL

    History-sensitive versus future-sensitive approaches to security in distributed systems

    Authors: Alejandro Mario Hernandez, Flemming Nielson

    Abstract: We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavour of dealing with information flow rather than mere access control. We show in this paper that it is beneficial to aug… ▽ More

    Submitted 27 October, 2010; originally announced October 2010.

    Comments: In Proceedings ICE 2010, arXiv:1010.5308

    Journal ref: EPTCS 38, 2010, pp. 29-43