Skip to main content

Showing 1–35 of 35 results for author: Stoelinga, M

.
  1. arXiv:2403.08843  [pdf, other

    cs.AI

    Fuzzy Fault Trees Formalized

    Authors: Thi Kim Nhung Dang, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Fault tree analysis is a vital method of assessing safety risks. It helps to identify potential causes of accidents, assess their likelihood and severity, and suggest preventive measures. Quantitative analysis of fault trees is often done via the dependability metrics that compute the system's failure behaviour over time. However, the lack of precise data is a major obstacle to quantitative analys… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: 14 pages

  2. arXiv:2401.16015  [pdf

    cs.LO

    Querying Fault and Attack Trees: Property Specification on a Water Network

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, E. Moritz Hahn, Mariëlle Stoelinga

    Abstract: We provide an overview of three different query languages whose objective is to specify properties on the highly popular formalisms of fault trees (FTs) and attack trees (ATs). These are BFL, a Boolean Logic for FTs, PFL, a probabilistic extension of BFL and ATM, a logic for security metrics on ATs. We validate the framework composed by these three logics by applying them to the case study of a wa… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  3. arXiv:2401.12346  [pdf, other

    cs.CR

    Fuzzy quantitative attack tree analysis

    Authors: Thi Kim Nhung Dang, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Attack trees are important for security, as they help to identify weaknesses and vulnerabilities in a system. Quantitative attack tree analysis supports a number security metrics, which formulate important KPIs such as the shortest, most likely and cheapest attacks. A key bottleneck in quantitative analysis is that the values are usually not known exactly, due to insufficient data and/or lack of… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 23 pages, 6 figures, FASE2024

  4. arXiv:2401.06574  [pdf, other

    cs.LO

    CTMCs with Imprecisely Timed Observations

    Authors: Thom Badings, Matthias Volk, Sebastian Junges, Marielle Stoelinga, Nils Jansen

    Abstract: Labeled continuous-time Markov chains (CTMCs) describe processes subject to random timing and partial observability. In applications such as runtime monitoring, we must incorporate past observations. The timing of these observations matters but may be uncertain. Thus, we consider a setting in which we are given a sequence of imprecisely timed labels called the evidence. The problem is to compute r… ▽ More

    Submitted 29 January, 2024; v1 submitted 12 January, 2024; originally announced January 2024.

    Comments: Extended version (with appendix) of the paper accepted at TACAS 2024

  5. Fault Trees, Decision Trees, And Binary Decision Diagrams: A Systematic Comparison

    Authors: L. A. Jimenez-Roa, T. Heskes, M. Stoelinga

    Abstract: In reliability engineering, we need to understand system dependencies, cause-effect relations, identify critical components, and analyze how they trigger failures. Three prominent graph models commonly used for these purposes are fault trees (FTs), decision trees (DTs), and binary decision diagrams (BDDs). These models are popular because they are easy to interpret, serve as a communication tool b… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  6. Deterioration modeling of sewer pipes via discrete-time Markov chains: A large-scale case study in the Netherlands

    Authors: L. A. Jimenez-Roa, T. Heskes, T. Tinga, H. Molegraaf, M. Stoelinga

    Abstract: Sewer pipe network systems are an important part of civil infrastructure, and in order to find a good trade-off between maintenance costs and system performance, reliable sewer pipe degradation models are essential. In this paper, we present a large-scale case study in the city of Breda in the Netherlands. Our dataset has information on sewer pipes built since the 1920s and contains information on… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  7. arXiv:2309.09231  [pdf

    cs.CR cs.LO

    ATM: a Logic for Quantitative Security Properties on Attack Trees

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, E. Moritz Hahn, Mariëlle Stoelinga

    Abstract: Critical infrastructure systems - for which high reliability and availability are paramount - must operate securely. Attack trees (ATs) are hierarchical diagrams that offer a flexible modelling language used to assess how systems can be attacked. ATs are widely employed both in industry and academia but - in spite of their popularity - little work has been done to give practitioners instruments to… ▽ More

    Submitted 17 May, 2024; v1 submitted 17 September, 2023; originally announced September 2023.

  8. arXiv:2304.13417  [pdf, other

    cs.GT

    With a little help from your friends: semi-cooperative games via Joker moves

    Authors: Petra van den Bos, Marielle Stoelinga

    Abstract: This paper coins the notion of Joker games where Player 2 is not strictly adversarial: Player 1 gets help from Player 2 by playing a Joker. We formalize these games as cost games, and study their theoretical properties. Finally, we illustrate their use in model-based testing.

    Submitted 25 January, 2024; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: Journal version for LMCS issue

  9. arXiv:2304.05812  [pdf, other

    cs.CR math.OC

    Cost-damage analysis of attack trees

    Authors: Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Attack trees (ATs) are a widely deployed modelling technique to categorize potential attacks on a system. An attacker of such a system aims at doing as much damage as possible, but might be limited by a cost budget. The maximum possible damage for a given cost budget is an important security metric of a system. In this paper, we find the maximum damage given a cost budget by modelling this problem… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

  10. PFL: a Probabilistic Logic for Fault Trees

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, E. Moritz Hahn, Mariëlle Stoelinga

    Abstract: Safety-critical infrastructures must operate in a safe and reliable way. Fault tree analysis is a widespread method used for risk assessment of these systems: fault trees (FTs) are required by, e.g., the Federal Aviation Administration and the Nuclear Regulatory Commission. In spite of their popularity, little work has been done on formulating structural queries about FT and analyzing these, e.g.,… ▽ More

    Submitted 1 June, 2024; v1 submitted 30 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2208.13424

    Journal ref: In: Chechik, M., Katoen, JP., Leucker, M. (eds) Formal Methods. FM 2023. Lecture Notes in Computer Science, vol 14000. Springer, Cham

  11. Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal Abstractions

    Authors: Thom Badings, Licio Romao, Alessandro Abate, David Parker, Hasan A. Poonawala, Marielle Stoelinga, Nils Jansen

    Abstract: Controllers for dynamical systems that operate in safety-critical settings must account for stochastic disturbances. Such disturbances are often modeled as process noise in a dynamical system, and common assumptions are that the underlying distributions are known and/or Gaussian. In practice, however, these assumptions may be unrealistic and can lead to poor approximations of the true noise distri… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

    Comments: To appear in the Journal of Artificial Intelligence Research (JAIR). arXiv admin note: text overlap with arXiv:2110.12662

    Journal ref: Journal of Artificial Intelligence Research (JAIR) 76 (2023) 341-391

  12. Efficient and Generic Algorithms for Quantitative Attack Tree Analysis

    Authors: Milan Lopuhaä-Zwakenberg, Carlos E. Budde, Mariëlle Stoelinga

    Abstract: Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is; typical metrics being the most likely attack, the cheapest, or the most damaging one. However, existing methods are only geared towards specific metrics or do not work on general attac… ▽ More

    Submitted 10 December, 2022; originally announced December 2022.

    Comments: Funding: ERC Consolidator (Grant Number: 864075), and European Union (Grant Number: 101067199-ProSVED), in IEEE Transactions on Dependable and Secure Computing, 2022. arXiv admin note: substantial text overlap with arXiv:2105.07511

    ACM Class: F.1.0; F.2.2; G.2.3

  13. BFL: a Logic to Reason about Fault Trees

    Authors: Stefano M. Nicoletti, E. Moritz Hahn, Marielle Stoelinga

    Abstract: Safety-critical infrastructures must operate safely and reliably. Fault tree analysis is a widespread method used to assess risks in these systems: fault trees (FTs) are required - among others - by the Federal Aviation Authority, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for software development in aerospace systems. Although popular both in industry a… ▽ More

    Submitted 1 June, 2024; v1 submitted 29 August, 2022; originally announced August 2022.

  14. Sampling-Based Verification of CTMCs with Uncertain Rates

    Authors: Thom S. Badings, Nils Jansen, Sebastian Junges, Marielle Stoelinga, Matthias Volk

    Abstract: We employ uncertain parametric CTMCs with parametric transition rates and a prior on the parameter values. The prior encodes uncertainty about the actual transition rates, while the parameters allow dependencies between transition rates. Sampling the parameter values from the prior distribution then yields a standard CTMC, for which we may compute relevant reachability probabilities. We provide a… ▽ More

    Submitted 21 June, 2022; v1 submitted 17 May, 2022; originally announced May 2022.

    Journal ref: Computed Aided Verification (CAV) 2022

  15. arXiv:2204.03743  [pdf, other

    cs.NE

    Automatic inference of fault tree models via multi-objective evolutionary algorithms

    Authors: Lisandro A. Jimenez-Roa, Tom Heskes, Tiedo Tinga, Marielle Stoelinga

    Abstract: Fault tree analysis is a well-known technique in reliability engineering and risk assessment, which supports decision-making processes and the management of complex systems. Traditionally, fault tree (FT) models are built manually together with domain experts, considered a time-consuming process prone to human errors. With Industry 4.0, there is an increasing availability of inspection and monitor… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

  16. arXiv:2202.02829  [pdf, other

    cs.SE

    BDDs Strike Back: Efficient Analysis of Static and Dynamic Fault Trees

    Authors: Daniel Basgöze, Matthias Volk, Joost-Pieter Katoen, Shahid Khan, Marielle Stoelinga

    Abstract: Fault trees are a key model in reliability analysis. Classical static fault trees (SFT) can best be analysed using binary decision diagrams (BDD). State-based techniques are favorable for the more expressive dynamic fault trees (DFT). This paper combines the best of both worlds by following Dugan's approach: dynamic sub-trees are analysed via model checking Markov models and replaced by basic even… ▽ More

    Submitted 28 March, 2022; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: Extended version of NFM'22 paper

  17. arXiv:2111.05114  [pdf, other

    cs.CR

    Attack time analysis in dynamic attack trees via integer linear programming

    Authors: Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Attack trees (ATs) are an important tool in security analysis, and an important part of AT analysis is computing metrics. However, metric computation is NP-complete in general. In this paper, we showcase the use of mixed integer linear programming (MILP) as a tool for quantitative analysis. Specifically, we use MILP to solve the open problem of calculating the min time metric of dynamic ATs, i.e.,… ▽ More

    Submitted 9 September, 2023; v1 submitted 9 November, 2021; originally announced November 2021.

  18. arXiv:2110.12662  [pdf, other

    eess.SY cs.AI cs.RO

    Sampling-Based Robust Control of Autonomous Systems with Non-Gaussian Noise

    Authors: Thom S. Badings, Alessandro Abate, Nils Jansen, David Parker, Hasan A. Poonawala, Marielle Stoelinga

    Abstract: Controllers for autonomous systems that operate in safety-critical settings must account for stochastic disturbances. Such disturbances are often modelled as process noise, and common assumptions are that the underlying distributions are known and/or Gaussian. In practice, however, these assumptions may be unrealistic and can lead to poor approximations of the true noise distribution. We present a… ▽ More

    Submitted 13 December, 2021; v1 submitted 25 October, 2021; originally announced October 2021.

    Journal ref: AAAI 2022 (distinguished paper)

  19. arXiv:2106.06272  [pdf

    cs.CR

    Model-based Joint Analysis of Safety and Security: Survey and Identification of Gaps

    Authors: Stefano M. Nicoletti, Marijn Peppelman, Christina Kolb, Mariëlle Stoelinga

    Abstract: We survey the state-of-the-art on model-based formalisms for safety and security joint analysis, where safety refers to the absence of unintended failures, and security to absence of malicious attacks. We conduct a thorough literature review and - as a result - we consider fourteen model-based formalisms and compare them with respect to several criteria: (1) Modelling capabilities and Expressivene… ▽ More

    Submitted 23 October, 2023; v1 submitted 11 June, 2021; originally announced June 2021.

  20. Efficient Algorithms for Quantitative Attack Tree Analysis

    Authors: Carlos E. Budde, Mariëlle Stoelinga

    Abstract: Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared… ▽ More

    Submitted 22 May, 2021; v1 submitted 16 May, 2021; originally announced May 2021.

    Comments: Public version of CSF'21 paper, including an appendix with all proofs of lemmas and theorems

    ACM Class: F.1.0; F.2.2; G.2.3

  21. arXiv:2103.02398  [pdf, other

    cs.AI cs.RO cs.SE eess.SY

    Correct-by-construction reach-avoid control of partially observable linear stochastic systems

    Authors: Thom Badings, Hasan A. Poonawala, Marielle Stoelinga, Nils Jansen

    Abstract: We study feedback controller synthesis for reach-avoid control of discrete-time, linear time-invariant (LTI) systems with Gaussian process and measurement noise. The problem is to compute a controller such that, with at least some required probability, the system reaches a desired goal state in finite time while avoiding unsafe states. Due to stochasticity and nonconvexity, this problem does not a… ▽ More

    Submitted 12 September, 2023; v1 submitted 3 March, 2021; originally announced March 2021.

  22. arXiv:1910.11672  [pdf, other

    cs.DC cs.FL eess.SY

    Rare Event Simulation for non-Markovian repairable Fault Trees

    Authors: Carlos E. Budde, Marco Biagi, Raúl E. Monti, Pedro R. D'Argenio, Mariëlle Stoelinga

    Abstract: Dynamic Fault Trees (DFT) are widely adopted in industry to assess the dependability of safety-critical equipment. Since many systems are too large to be studied numerically, DFTs dependability is often analysed using Monte Carlo simulation. A bottleneck here is that many simulation samples are required in the case of rare events, e.g. in highly reliable systems where components fail seldomly. Rar… ▽ More

    Submitted 28 October, 2019; v1 submitted 23 October, 2019; originally announced October 2019.

    ACM Class: D.2.4; I.6.1; I.6.8

  23. arXiv:1909.06258  [pdf, other

    cs.FL eess.SY

    Fault Trees from Data: Efficient Learning with an Evolutionary Algorithm

    Authors: Alexis Linard, Doina Bucur, Marielle Stoelinga

    Abstract: Cyber-physical systems come with increasingly complex architectures and failure modes, which complicates the task of obtaining accurate system reliability models. At the same time, with the emergence of the (industrial) Internet-of-Things, systems are more and more often being monitored via advanced sensor systems. These sensors produce large amounts of data about the components' failure behaviour… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Comments: This paper is an extended version of the SETTA 2019 paper, Springer-Verlag

  24. arXiv:1906.05283  [pdf, ps, other

    cs.CR cs.FL cs.MA

    Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems

    Authors: Jaime Arias, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Mariëlle Stoelinga

    Abstract: Attack-Defence Trees (ADTs) are well-suited to assess possible attacks to systems and the efficiency of counter-measures. In this paper, we first enrich the available constructs with reactive patterns that cover further security scenarios, and equip all constructs with attributes such as time and cost to allow quantitative analyses. Then, ADTs are modelled as (an extension of) Asynchronous Multi-A… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

    Comments: This work was partially funded by the NWO project SEQUOIA (grant 15474), EU project SUCCESS (102112) and the PHC van Gogh PAMPAS. The work of Arias and Petrucci has been supported by the BQR project AMoJAS

  25. arXiv:1902.04336  [pdf, other

    cs.CR

    Parametric analyses of attack-fault trees

    Authors: Étienne André, Didier Lime, Mathias Ramparison, Mariëlle Stoelinga

    Abstract: Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-infrastructures has always been challenging: safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to attackers) are conditions that must be guaranteed. One of the traditional tools used to help considering these problems is attack trees, a tree-based formalism inspired by faul… ▽ More

    Submitted 8 May, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: This is the extended version of the manuscript of the same name published in ACSD 2019. This work is supported by ANR PACS (ANR-14-CE28-0002), the PHC Van Gogh project PAMPAS, by STW under the project 15474 SEQUOIA, KIA KIEM project 628.010.006 StepUp, the EU under the project 102112 SUCCESS and ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST

  26. Tester versus Bug: A Generic Framework for Model-Based Testing via Games

    Authors: Petra van den Bos, Marielle Stoelinga

    Abstract: We propose a generic game-based approach for test case generation. We set up a game between the tester and the System Under Test, in such a way that test cases correspond to game strategies, and the conformance relation ioco corresponds to alternating refinement. We show that different test assumptions from the literature can be easily incorporated, by slightly varying the moves in the games an… ▽ More

    Submitted 9 September, 2018; originally announced September 2018.

    Comments: In Proceedings GandALF 2018, arXiv:1809.02416

    Journal ref: EPTCS 277, 2018, pp. 118-132

  27. arXiv:1806.05174  [pdf, other

    eess.SY

    Maintenance of Smart Buildings using Fault Trees

    Authors: Nathalie Cauchi, Khaza Anuarul Hoque, Marielle Stoelinga, Alessandro Abate

    Abstract: Timely maintenance is an important means of increasing system dependability and life span. Fault Maintenance trees (FMTs) are an innovative framework incorporating both maintenance strategies and degradation models and serve as a good planning platform for balancing total costs (operational and maintenance) with dependability of a system. In this work, we apply the FMT formalism to a {Smart Buildi… ▽ More

    Submitted 22 June, 2018; v1 submitted 13 June, 2018; originally announced June 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1801.04263

  28. One Net Fits All: A unifying semantics of Dynamic Fault Trees using GSPNs

    Authors: Sebastian Junges, Joost-Pieter Katoen, Marielle Stoelinga, Matthias Volk

    Abstract: Dynamic Fault Trees (DFTs) are a prominent model in reliability engineering. They are strictly more expressive than static fault trees, but this comes at a price: their interpretation is non-trivial and leaves quite some freedom. This paper presents a GSPN semantics for DFTs. This semantics is rather simple and compositional. The key feature is that this GSPN semantics unifies all existing DFT sem… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

    Comments: Accepted at Petri Nets 2018

  29. arXiv:1801.04263  [pdf, other

    cs.LO eess.SY

    Efficient Probabilistic Model Checking of Smart Building Maintenance using Fault Maintenance Trees

    Authors: Nathalie Cauchi, Khaza Anuarul Hoque, Alessandro Abate, Marielle Stoelinga

    Abstract: Cyber-physical systems, like Smart Buildings and power plants, have to meet high standards, both in terms of reliability and availability. Such metrics are typically evaluated using Fault trees (FTs) and do not consider maintenance strategies which can significantly improve lifespan and reliability. Fault Maintenance trees (FMTs) -- an extension of FTs that also incorporate maintenance and degrada… ▽ More

    Submitted 12 January, 2018; originally announced January 2018.

    Comments: conference

  30. Modeling and Verification of the Bitcoin Protocol

    Authors: Kaylash Chaudhary, Ansgar Fehnker, Jaco van de Pol, Marielle Stoelinga

    Abstract: Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin prot… ▽ More

    Submitted 13 November, 2015; originally announced November 2015.

    Comments: In Proceedings MARS 2015, arXiv:1511.02528

    Journal ref: EPTCS 196, 2015, pp. 46-60

  31. arXiv:1510.00050  [pdf, ps, other

    cs.CR

    Time Dependent Analysis with Dynamic Counter Measure Trees

    Authors: Rajesh Kumar, Dennis Guck, Marielle Stoelinga

    Abstract: The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack. Formalisms such as Reliability block diagrams, Reliability graphs and Attack Countermeasure trees provide quantitative information about attack scenarios, but they are provably insufficient to model dependent actions which involve costs, skills, an… ▽ More

    Submitted 30 September, 2015; originally announced October 2015.

    Comments: 5 pages, 2 Figures, Workshop paper(QAPL 2015)-Extended abstract

  32. Ioco Theory for Probabilistic Automata

    Authors: Marcus Gerhold, Mariëlle Stoelinga

    Abstract: Model-based testing (MBT) is a well-known technology, which allows for automatic test case generation, execution and evaluation. To test non-functional properties, a number of test MBT frameworks have been developed to test systems with real-time, continuous behaviour, symbolic data and quantitative system aspects. Notably, a lot of these frameworks are based on Tretmans' classical input/output co… ▽ More

    Submitted 9 April, 2015; originally announced April 2015.

    Comments: In Proceedings MBT 2015, arXiv:1504.01928

    Journal ref: EPTCS 180, 2015, pp. 23-40

  33. Talking quiescence: a rigorous theory that supports parallel composition, action hiding and determinisation

    Authors: Gerjan Stokkink, Mark Timmer, Mariëlle Stoelinga

    Abstract: The notion of quiescence - the absence of outputs - is vital in both behavioural modelling and testing theory. Although the need for quiescence was already recognised in the 90s, it has only been treated as a second-class citizen thus far. This paper moves quiescence into the foreground and introduces the notion of quiescent transition systems (QTSs): an extension of regular input-output transitio… ▽ More

    Submitted 28 February, 2012; originally announced February 2012.

    Comments: In Proceedings MBT 2012, arXiv:1202.5826

    Journal ref: EPTCS 80, 2012, pp. 73-87

  34. arXiv:1011.2314  [pdf, ps, other

    cs.LO cs.DM cs.FL

    Confluence Reduction for Probabilistic Systems (extended version)

    Authors: Mark Timmer, Mariëlle Stoelinga, Jaco van de Pol

    Abstract: This paper presents a novel technique for state space reduction of probabilistic specifications, based on a newly developed notion of confluence for probabilistic automata. We prove that this reduction preserves branching probabilistic bisimulation and can be applied on-the-fly. To support the technique, we introduce a method for detecting confluent transitions in the context of a probabilistic pr… ▽ More

    Submitted 10 November, 2010; originally announced November 2010.

  35. Game Refinement Relations and Metrics

    Authors: Luca de Alfaro, Rupak Majumdar, Vishwanath Raman, Mariëlle Stoelinga

    Abstract: We consider two-player games played over finite state spaces for an infinite number of rounds. At each state, the players simultaneously choose moves; the moves determine a successor state. It is often advantageous for players to choose probability distributions over moves, rather than single moves. Given a goal, for example, reach a target state, the question of winning is thus a probabilistic… ▽ More

    Submitted 10 September, 2008; v1 submitted 30 June, 2008; originally announced June 2008.

    ACM Class: F.4.1; F.1.1

    Journal ref: Logical Methods in Computer Science, Volume 4, Issue 3 (September 11, 2008) lmcs:781