Skip to main content

Showing 1–50 of 55 results for author: Meyer, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01008  [pdf, other

    cs.FL

    Separability in Büchi Vass and Singly Non-Linear Systems of Inequalities

    Authors: Pascal Baumann, Eren Keskin, Roland Meyer, Georg Zetzsche

    Abstract: The omega-regular separability problem for Büchi VASS coverability languages has recently been shown to be decidable, but with an EXPSPACE lower and a non-primitive recursive upper bound -- the exact complexity remained open. We close this gap and show that the problem is EXPSPACE-complete. A careful analysis of our complexity bounds additionally yields a PSPACE procedure in the case of fixed dime… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    ACM Class: F.1.1

  2. arXiv:2403.05607  [pdf, ps, other

    cs.LO cs.PL

    Realizability in Semantics-Guided Synthesis Done Eagerly

    Authors: Roland Meyer, Jakob Tepe, Sebastian Wolff

    Abstract: We present realizability and realization logic, two program logics that jointly address the problem of finding solutions in semantics-guided synthesis. What is new is that we proceed eagerly and not only analyze a single candidate program but a whole set. Realizability logic computes information about the set of candidate programs in a forward fashion. Realization logic uses this information as gu… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: 47 pages, 16 figures

  3. arXiv:2401.16095  [pdf, ps, other

    cs.FL

    On the Separability Problem of VASS Reachability Languages

    Authors: Eren Keskin, Roland Meyer

    Abstract: We show that the regular separability problem of VASS reachability languages is decidable and $\mathbf{F}_ω$-complete. At the heart of our decision procedure are doubly-marked graph transition sequences, a new proof object that tracks a suitable product of the VASS we wish to separate. We give a decomposition algorithm for DMGTS that not only achieves perfectness as known from MGTS, but also a new… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  4. arXiv:2311.14023  [pdf, ps, other

    math.NA cs.DS

    Algorithm-agnostic low-rank approximation of operator monotone matrix functions

    Authors: David Persson, Raphael A. Meyer, Christopher Musco

    Abstract: Low-rank approximation of a matrix function, $f(A)$, is an important task in computational mathematics. Most methods require direct access to $f(A)$, which is often considerably more expensive than accessing $A$. Persson and Kressner (SIMAX 2023) avoid this issue for symmetric positive semidefinite matrices by proposing funNyström, which first constructs a Nyström approximation to $A$ using subspa… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

    MSC Class: 65F15; 65F55; 65F60; 68W25

  5. arXiv:2309.04952  [pdf, ps, other

    cs.DS math.NA

    Hutchinson's Estimator is Bad at Kronecker-Trace-Estimation

    Authors: Raphael A. Meyer, Haim Avron

    Abstract: We study the problem of estimating the trace of a matrix $\mathbf{A}$ that can only be accessed through Kronecker-matrix-vector products. That is, for any Kronecker-structured vector $\boldsymbol{\mathrm{x}} = \otimes_{i=1}^k \boldsymbol{\mathrm{x}}_i$, we can compute $\mathbf{A}\boldsymbol{\mathrm{x}}$. We focus on the natural generalization of Hutchinson's Estimator to this setting, proving tigh… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

    Comments: 35 pages

    MSC Class: 65F99 (Primary) 15A69 (Secondary) ACM Class: G.1.3

  6. arXiv:2307.15549  [pdf, other

    cs.PL

    Context-Aware Separation Logic

    Authors: Roland Meyer, Thomas Wies, Sebastian Wolff

    Abstract: Separation logic is often praised for its ability to closely mimic the locality of state updates when reasoning about them at the level of assertions. The prover only needs to concern themselves with the footprint of the computation at hand, i.e., the part of the state that is actually being accessed and manipulated. Modern concurrent separation logics lift this local reasoning principle from the… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  7. arXiv:2305.02967  [pdf, ps, other

    cs.LO cs.GT

    Urgency Annotations for Alternating Choices

    Authors: Eren Keskin, Roland Meyer, Sören van der Wall

    Abstract: We propose urgency programs, a new programming model with support for alternation, imperfect information, and recursion. The novelty are urgency annotations that decorate the (angelic and demonic) choice operators and control the order in which alternation is resolved. We study standard notions of contextual equivalence for urgency programs. Our first main result are fully abstract characterizatio… ▽ More

    Submitted 20 October, 2023; v1 submitted 4 May, 2023; originally announced May 2023.

  8. arXiv:2305.02736  [pdf, other

    cs.FL

    Separability and Non-Determinizability of WSTS

    Authors: Wojciech Czerwiński, Eren Keskin, Sławomir Lasota, Roland Meyer, Sebastian Muskalla, K Narayan Kumar, Prakash Saivasan

    Abstract: We study the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that every pair of disjoint WSTS languages is regularly separable: there is a regular language containing one of them while being disjoint from the other. As a consequence, if a language as well as its complement are both recognized by WSTS, then they are ne… ▽ More

    Submitted 31 May, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

    Comments: This paper is the journal version of the CONCUR23 paper "Separability and Non-Determinizability of WSTS'', which can be found in the previous version of this arxiv document. It covers both papers about regular separability in WSTS: the CONCUR23 paper and its predecessor the CONCUR18 paper. As this version does not contain an appendix, please refer to the previous version for missing proofs

  9. arXiv:2305.02535  [pdf, other

    cs.DS math.NA

    On the Unreasonable Effectiveness of Single Vector Krylov Methods for Low-Rank Approximation

    Authors: Raphael A. Meyer, Cameron Musco, Christopher Musco

    Abstract: Krylov subspace methods are a ubiquitous tool for computing near-optimal rank $k$ approximations of large matrices. While "large block" Krylov methods with block size at least $k$ give the best known theoretical guarantees, block size one (a single vector) or a small constant is often preferred in practice. Despite their popularity, we lack theoretical bounds on the performance of such "small bloc… ▽ More

    Submitted 6 November, 2023; v1 submitted 4 May, 2023; originally announced May 2023.

    Comments: 41 pages, 7 figures. To appear at SODA 2024

    MSC Class: 65F55 (Primary) 65F15 (Secondary) ACM Class: G.1.3; F.2.1

  10. arXiv:2304.04886  [pdf, other

    cs.PL

    Make flows small again: revisiting the flow framework

    Authors: Roland Meyer, Thomas Wies, Sebastian Wolff

    Abstract: We present a new flow framework for separation logic reasoning about programs that manipulate general graphs. The framework overcomes problems in earlier developments: it is based on standard fixed point theory, guarantees least flows, rules out vanishing flows, and has an easy to understand notion of footprint as needed for soundness of the frame rule. In addition, we present algorithms for autom… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  11. arXiv:2301.11242  [pdf, other

    cs.FL

    Regular Separability in Büchi VASS

    Authors: Pascal Baumann, Roland Meyer, Georg Zetzsche

    Abstract: We study the ($ω$-)regular separability problem for Büchi VASS languages: Given two Büchi VASS with languages $L_1$ and $L_2$, check whether there is a regular language that fully contains $L_1$ while remaining disjoint from $L_2$. We show that the problem is decidable in general and PSPACE-complete in the 1-dimensional case, assuming succinct counter updates. The results rely on several arguments… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    ACM Class: F.1.1

  12. arXiv:2211.10285  [pdf, ps, other

    cs.LG cs.CY

    A Fair Loss Function for Network Pruning

    Authors: Robbie Meyer, Alexander Wong

    Abstract: Model pruning can enable the deployment of neural networks in environments with resource constraints. While pruning may have a small effect on the overall performance of the model, it can exacerbate existing biases into the model such that subsets of samples see significantly degraded performance. In this paper, we introduce the performance weighted loss function, a simple modified cross-entropy l… ▽ More

    Submitted 18 November, 2022; originally announced November 2022.

    Comments: Trustworthy and Socially Responsible Machine Learning (TSRML 2022) workshop co-located with NeurIPS 2022

  13. arXiv:2211.06790  [pdf, other

    cs.DS

    Near-Linear Sample Complexity for $L_p$ Polynomial Regression

    Authors: Raphael A. Meyer, Cameron Musco, Christopher Musco, David P. Woodruff, Samson Zhou

    Abstract: We study $L_p$ polynomial regression. Given query access to a function $f:[-1,1] \rightarrow \mathbb{R}$, the goal is to find a degree $d$ polynomial $\hat{q}$ such that, for a given parameter $\varepsilon > 0$, $$ \|\hat{q}-f\|_p\le (1+\varepsilon) \cdot \min_{q:\text{deg}(q)\le d}\|q-f\|_p. $$ Here $\|\cdot\|_p$ is the $L_p$ norm, $\|g\|_p = (\int_{-1}^1 |g(t)|^p dt)^{1/p}$. We show that queryin… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

    Comments: 68 pages, to be presented at SODA 2023

  14. arXiv:2210.10842  [pdf, other

    cs.CV cs.LG cs.RO

    MMRNet: Improving Reliability for Multimodal Object Detection and Segmentation for Bin Picking via Multimodal Redundancy

    Authors: Yuhao Chen, Hayden Gunraj, E. Zhixuan Zeng, Robbie Meyer, Maximilian Gilles, Alexander Wong

    Abstract: Recently, there has been tremendous interest in industry 4.0 infrastructure to address labor shortages in global supply chains. Deploying artificial intelligence-enabled robotic bin picking systems in real world has become particularly important for reducing stress and physical demands of workers while increasing speed and efficiency of warehouses. To this end, artificial intelligence-enabled robo… ▽ More

    Submitted 7 May, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: Accepted to CVPR TCV Workshop

  15. arXiv:2209.13692  [pdf, other

    cs.PL cs.LO

    Embedding Hindsight Reasoning in Separation Logic

    Authors: Roland Meyer, Thomas Wies, Sebastian Wolff

    Abstract: Proving linearizability of concurrent data structures remains a key challenge for verification. We present temporal interpolation as a new proof principle to conduct such proofs using hindsight arguments within concurrent separation logic. Temporal reasoning offers an easy-to-use alternative to prophecy variables and has the advantage of structuring proofs into easy-to-discharge hypotheses. To hin… ▽ More

    Submitted 21 April, 2023; v1 submitted 27 September, 2022; originally announced September 2022.

    Journal ref: Proc. ACM Program. Lang. 7, PLDI, Article 182 (June 2023), 24 pages

  16. Model-based Fault Classification for Automotive Software

    Authors: Mike Becker, Roland Meyer, Tobias Runge, Ina Schaefer, Sören van der Wall, Sebastian Wolff

    Abstract: Intensive testing using model-based approaches is the standard way of demonstrating the correctness of automotive software. Unfortunately, state-of-the-art techniques leave a crucial and labor intensive task to the test engineer: identifying bugs in failing tests. Our contribution is a model-based classification algorithm for failing tests that assists the engineer when identifying bugs. It consis… ▽ More

    Submitted 15 December, 2022; v1 submitted 30 August, 2022; originally announced August 2022.

  17. arXiv:2208.12553  [pdf, other

    cs.CR cs.LG cs.PL cs.SE

    I still know it's you! On Challenges in Anonymizing Source Code

    Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck

    Abstract: The source code of a program not only defines its semantics but also contains subtle clues that can identify its author. Several studies have shown that these clues can be automatically extracted using machine learning and allow for determining a program's author among hundreds of programmers. This attribution poses a significant threat to developers of anti-censorship and privacy-enhancing techno… ▽ More

    Submitted 10 April, 2024; v1 submitted 26 August, 2022; originally announced August 2022.

  18. arXiv:2207.10747  [pdf

    physics.chem-ph cond-mat.mtrl-sci cs.LG

    A Transferable Recommender Approach for Selecting the Best Density Functional Approximations in Chemical Discovery

    Authors: Chenru Duan, Aditya Nandy, Ralf Meyer, Naveen Arunachalam, Heather J. Kulik

    Abstract: Approximate density functional theory (DFT) has become indispensable owing to its cost-accuracy trade-off in comparison to more computationally demanding but accurate correlated wavefunction theory. To date, however, no single density functional approximation (DFA) with universal accuracy has been identified, leading to uncertainty in the quality of data generated from DFT. With electron density f… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

  19. arXiv:2207.02355  [pdf, other

    cs.PL cs.LO

    A Concurrent Program Logic with a Future and History

    Authors: Roland Meyer, Thomas Wies, Sebastian Wolff

    Abstract: Verifying fine-grained optimistic concurrent programs remains an open problem. Modern program logics provide abstraction mechanisms and compositional reasoning principles to deal with the inherent complexity. However, their use is mostly confined to pencil-and-paper or mechanized proofs. We devise a new separation logic geared towards the lacking automation. While local reasoning is known to be cr… ▽ More

    Submitted 11 November, 2022; v1 submitted 5 July, 2022; originally announced July 2022.

    Journal ref: Proc. ACM Program. Lang. 6, OOPSLA2, Article 174 (October 2022), 30 pages

  20. arXiv:2203.07557  [pdf, other

    cs.DS

    Fast Regression for Structured Inputs

    Authors: Raphael A. Meyer, Cameron Musco, Christopher Musco, David P. Woodruff, Samson Zhou

    Abstract: We study the $\ell_p$ regression problem, which requires finding $\mathbf{x}\in\mathbb R^{d}$ that minimizes $\|\mathbf{A}\mathbf{x}-\mathbf{b}\|_p$ for a matrix $\mathbf{A}\in\mathbb R^{n \times d}$ and response vector $\mathbf{b}\in\mathbb R^{n}$. There has been recent interest in develo** subsampling methods for this problem that can outperform standard techniques when $n$ is very large. Howe… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  21. arXiv:2111.15240  [pdf, ps, other

    cs.OS

    Verifying and Optimizing Compact NUMA-Aware Locks on Weak Memory Models

    Authors: Antonio Paolillo, Hernán Ponce-de-León, Thomas Haas, Diogo Behrens, Rafael Chehab, Ming Fu, Roland Meyer

    Abstract: Develo** concurrent software is challenging, especially if it has to run on modern architectures with Weak Memory Models (WMMs) such as ARMv8, Power, or RISC-V. For the sake of performance, WMMs allow hardware and compilers to aggressively reorder memory accesses. To guarantee correctness, developers have to carefully place memory barriers in the code to enforce ordering among critical memory op… ▽ More

    Submitted 9 July, 2022; v1 submitted 30 November, 2021; originally announced November 2021.

  22. arXiv:2101.12123  [pdf, other

    cs.LO cs.PL

    Safety Verification of Parameterized Systems under Release-Acquire

    Authors: Adwait Godbole, Shankara Narayanan Krishna, Roland Meyer

    Abstract: We study the safety verification problem for parameterized systems under the release-acquire (RA) semantics. It has been shown that the problem is intractable for systems with unlimited access to atomic compare-and-swap (CAS) instructions. We show that, from a verification perspective where approximate results help, this is overly pessimistic. We study parameterized systems consisting of an unboun… ▽ More

    Submitted 5 May, 2022; v1 submitted 28 January, 2021; originally announced January 2021.

  23. arXiv:2010.09649  [pdf, other

    cs.DS cs.LG math.NA

    Hutch++: Optimal Stochastic Trace Estimation

    Authors: Raphael A. Meyer, Cameron Musco, Christopher Musco, David P. Woodruff

    Abstract: We study the problem of estimating the trace of a matrix $A$ that can only be accessed through matrix-vector multiplication. We introduce a new randomized algorithm, Hutch++, which computes a $(1 \pm ε)$ approximation to $tr(A)$ for any positive semidefinite (PSD) $A$ using just $O(1/ε)$ matrix-vector products. This improves on the ubiquitous Hutchinson's estimator, which requires $O(1/ε^2)$ matri… ▽ More

    Submitted 10 June, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: SIAM Symposium on Simplicity in Algorithms (SOSA21)

  24. arXiv:2006.08035  [pdf, ps, other

    cs.LG stat.ML

    The Statistical Cost of Robust Kernel Hyperparameter Tuning

    Authors: Raphael A. Meyer, Christopher Musco

    Abstract: This paper studies the statistical complexity of kernel hyperparameter tuning in the setting of active regression under adversarial noise. We consider the problem of finding the best interpolant from a class of kernels with unknown hyperparameters, assuming only that the noise is square-integrable. We provide finite-sample guarantees for the problem, characterizing how increasing the complexity of… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

    ACM Class: G.3

  25. Pointer Life Cycle Types for Lock-Free Data Structures with Memory Reclamation

    Authors: Roland Meyer, Sebastian Wolff

    Abstract: We consider the verification of lock-free data structures that manually manage their memory with the help of a safe memory reclamation (SMR) algorithm. Our first contribution is a type system that checks whether a program properly manages its memory. If the type check succeeds, it is safe to ignore the SMR algorithm and consider the program under garbage collection. Intuitively, our types track th… ▽ More

    Submitted 26 November, 2019; v1 submitted 25 October, 2019; originally announced October 2019.

  26. arXiv:1909.12004  [pdf, other

    cs.FL cs.CC

    Complexity of Liveness in Parameterized Systems

    Authors: Peter Chini, Roland Meyer, Prakash Saivasan

    Abstract: We investigate the fine-grained complexity of liveness verification for leader contributor systems. These consist of a designated leader thread and an arbitrary number of identical contributor threads communicating via a shared memory. The liveness verification problem asks whether there is an infinite computation of the system in which the leader reaches a final state infinitely often. Like its r… ▽ More

    Submitted 7 October, 2019; v1 submitted 26 September, 2019; originally announced September 2019.

  27. arXiv:1904.00833  [pdf, ps, other

    cs.FL

    Liveness in Broadcast Networks

    Authors: Peter Chini, Roland Meyer, Prakash Saivasan

    Abstract: We study liveness and model checking problems for broadcast networks, a system model of identical clients communicating via message passing. The first problem that we consider is Liveness Verification. It asks whether there is a computation such that one of the clients visits a final state infinitely often. The complexity of the problem has been open since 2010 when it was shown to be P-hard and s… ▽ More

    Submitted 21 July, 2020; v1 submitted 1 April, 2019; originally announced April 2019.

  28. arXiv:1901.09087  [pdf, other

    cs.LG stat.ML

    Optimality Implies Kernel Sum Classifiers are Statistically Efficient

    Authors: Raphael Arkady Meyer, Jean Honorio

    Abstract: We propose a novel combination of optimization tools with learning theory bounds in order to analyze the sample complexity of optimal kernel sum classifiers. This contrasts the typical learning theoretic results which hold for all (potentially suboptimal) classifiers. Our work also justifies assumptions made in prior work on multiple kernel learning. As a byproduct of our analysis, we also provide… ▽ More

    Submitted 2 June, 2019; v1 submitted 25 January, 2019; originally announced January 2019.

    Journal ref: International Conference on Machine Learning (ICML) 2019

  29. arXiv:1810.10807  [pdf, other

    cs.PL

    Decoupling Lock-Free Data Structures from Memory Reclamation for Static Analysis

    Authors: Roland Meyer, Sebastian Wolff

    Abstract: Verification of concurrent data structures is one of the most challenging tasks in software verification. The topic has received considerable attention over the course of the last decade. Nevertheless, human-driven techniques remain cumbersome and notoriously difficult while automated approaches suffer from limited applicability. The main obstacle for automation is the complexity of concurrent dat… ▽ More

    Submitted 9 November, 2018; v1 submitted 25 October, 2018; originally announced October 2018.

  30. arXiv:1807.05777  [pdf, ps, other

    cs.CC cs.DM

    Fast Witness Counting

    Authors: Peter Chini, Rehab Massoud, Roland Meyer, Prakash Saivasan

    Abstract: We study the witness-counting problem: given a set of vectors $V$ in the $d$-dimensional vector space over $\mathbb{F}_2$, a target vector $t$, and an integer $k$, count all ways to sum-up exactly $k$ different vectors from $V$ to reach $t$. The problem is well-known in coding theory and received considerable attention in complexity theory. Recently, it appeared in the context of hardware monitori… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

  31. arXiv:1805.02963  [pdf, other

    cs.LO cs.FL

    Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems

    Authors: Matthew Hague, Roland Meyer, Sebastian Muskalla, Martin Zimmermann

    Abstract: We give a direct polynomial-time reduction from parity games played over the configuration graphs of collapsible pushdown systems to safety games played over the same class of graphs. That a polynomial-time reduction would exist was known since both problems are complete for the same complexity class. Coming up with a direct reduction, however, has been an open problem. Our solution to the puzzle… ▽ More

    Submitted 5 July, 2018; v1 submitted 8 May, 2018; originally announced May 2018.

  32. arXiv:1803.09703  [pdf, other

    cs.LO cs.FL

    Bounded Context Switching for Valence Systems

    Authors: Roland Meyer, Sebastian Muskalla, Georg Zetzsche

    Abstract: We study valence systems, finite-control programs over infinite-state memories modeled in terms of graph monoids. Our contribution is a notion of bounded context switching (BCS). Valence systems generalize pushdowns, concurrent pushdowns, and Petri nets. In these settings, our definition conservatively generalizes existing notions. The main finding is that reachability within a bounded number of c… ▽ More

    Submitted 5 July, 2018; v1 submitted 26 March, 2018; originally announced March 2018.

  33. arXiv:1802.05559  [pdf, ps, other

    cs.LO cs.DC cs.DS

    Fine-Grained Complexity of Safety Verification

    Authors: Peter Chini, Roland Meyer, Prakash Saivasan

    Abstract: We study the fine-grained complexity of Leader Contributor Reachability (LCR) and Bounded-Stage Reachability (BSR), two variants of the safety verification problem for shared memory concurrent programs. For both problems, the memory is a single variable over a finite data domain. Our contributions are new verification algorithms and lower bounds. The latter are based on the Exponential Time Hypoth… ▽ More

    Submitted 10 January, 2020; v1 submitted 15 February, 2018; originally announced February 2018.

  34. arXiv:1705.03701  [pdf, other

    cs.PL

    Effect Summaries for Thread-Modular Analysis

    Authors: Lukáš Holík, Roland Meyer, Tomáš Vojnar, Sebastian Wolff

    Abstract: We propose a novel guess-and-check principle to increase the efficiency of thread-modular verification of lock-free data structures. We build on a heuristic that guesses candidates for stateless effect summaries of programs by searching the code for instances of a copy-and-check programming idiom common in lock-free data structures. These candidate summaries are used to compute the interference am… ▽ More

    Submitted 10 May, 2017; originally announced May 2017.

  35. arXiv:1705.00355  [pdf, other

    cs.LO cs.FL

    Domains for Higher-Order Games

    Authors: Matthew Hague, Roland Meyer, Sebastian Muskalla

    Abstract: We study two-player inclusion games played over word-generating higher-order recursion schemes. While inclusion checks are known to capture verification problems, two-player games generalize this relationship to program synthesis. In such games, non-terminals of the grammar are controlled by opposing players. The goal of the existential player is to avoid producing a word that lies outside of a re… ▽ More

    Submitted 5 August, 2017; v1 submitted 30 April, 2017; originally announced May 2017.

    Comments: Conference version accepted for presentation and publication at the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017)

    ACM Class: F.1.1

  36. arXiv:1703.04603  [pdf, ps, other

    cs.DC

    Locality and Singularity for Store-Atomic Memory Models

    Authors: Egor Derevenetc, Roland Meyer, Sebastian Schweizer

    Abstract: Robustness is a correctness notion for concurrent programs running under relaxed consistency models. The task is to check that the relaxed behavior coincides (up to traces) with sequential consistency (SC). Although computationally simple on paper (robustness has been shown to be PSPACE-complete for TSO, PGAS, and Power), building a practical robustness checker remains a challenge. The problem is… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

  37. arXiv:1702.06704  [pdf, ps, other

    cs.PL cs.LO

    Portability Analysis for Axiomatic Memory Models. PORTHOS: One Tool for all Models

    Authors: Hernán Ponce-de-León, Florian Furbach, Keijo Heljanko, Roland Meyer

    Abstract: We present Porthos, the first tool that discovers porting bugs in performance-critical code. Porthos takes as input a program and the memory models of the source architecture for which the program has been developed and the target model to which it is ported. If the code is not portable, Porthos finds a bug in the form of an unexpected execution - an execution that is consistent with the target bu… ▽ More

    Submitted 28 April, 2017; v1 submitted 22 February, 2017; originally announced February 2017.

  38. arXiv:1702.05334  [pdf, other

    cs.FL

    Regular Separability of Well Structured Transition Systems

    Authors: Wojciech Czerwiński, Sławomir Lasota, Roland Meyer, Sebastian Muskalla, K Narayan Kumar, Prakash Saivasan

    Abstract: We investigate the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that, under very mild assumptions, every two disjoint WSTS languages are regular separable: There is a regular language containing one of them and being disjoint from the other. As a consequence, if a language as well as its complement are both recogni… ▽ More

    Submitted 5 July, 2018; v1 submitted 17 February, 2017; originally announced February 2017.

  39. arXiv:1701.02947  [pdf, other

    cs.FL cs.LO

    Liveness Verification and Synthesis: New Algorithms for Recursive Programs

    Authors: Roland Meyer, Sebastian Muskalla, Elisabeth Neumann

    Abstract: We consider the problems of liveness verification and liveness synthesis for recursive programs. The liveness verification problem (LVP) is to decide whether a given omega-context-free language is contained in a given omega-regular language. The liveness synthesis problem (LSP) is to compute a strategy so that a given omega-context-free game, when played along the strategy, is guaranteed to derive… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    ACM Class: F.1.1

  40. arXiv:1701.02927  [pdf, ps, other

    cs.FL cs.LO

    On the Upward/Downward Closures of Petri Nets

    Authors: Mohamed Faouzi Atig, Roland Meyer, Sebastian Muskalla, Prakash Saivasan

    Abstract: We study the size and the complexity of computing finite state automata (FSA) representing and approximating the downward and the upward closure of Petri net languages with coverability as the acceptance condition. We show how to construct an FSA recognizing the upward closure of a Petri net language in doubly-exponential time, and therefore the size is at most doubly exponential. For downward clo… ▽ More

    Submitted 6 April, 2018; v1 submitted 11 January, 2017; originally announced January 2017.

    Comments: The conference version of this paper has been published in the proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017

    ACM Class: F.1.1

  41. arXiv:1612.01675  [pdf, other

    cs.SE

    Managing Usability and Reliability Aspects in Cloud Computing

    Authors: Maria Spichkova, Heinz W. Schmidt, Ian E. Thomas, Iman I. Yusuf, Steve Androulakis, Grischa R. Meyer

    Abstract: Cloud computing provides a great opportunity for scientists, as it enables large-scale experiments that cannot are too long to run on local desktop machines. Cloud-based computations can be highly parallel, long running and data-intensive, which is desirable for many kinds of scientific experiments. However, to unlock this power, we need a user-friendly interface and an easy-to-use methodology for… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

    Comments: Preprint. Accepted to the 11th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2016). Final version published by SCITEPRESS, http://www.scitepress.org

  42. arXiv:1609.09728  [pdf, other

    cs.FL cs.LO

    On the Complexity of Bounded Context Switching

    Authors: Peter Chini, Jonathan Kolberg, Andreas Krebs, Roland Meyer, Prakash Saivasan

    Abstract: Bounded context switching (BCS) is an under-approximate method for finding violations to safety properties in shared memory concurrent programs. Technically, BCS is a reachability problem that is known to be NP-complete. Our contribution is a parameterized analysis of BCS. The first result is an algorithm that solves BCS when parameterized by the number of context switches (cs) and the size of t… ▽ More

    Submitted 24 April, 2017; v1 submitted 30 September, 2016; originally announced September 2016.

  43. arXiv:1605.00422  [pdf, other

    cs.SC cs.DS

    Munchausen Iteration

    Authors: Roland Meyer, Sebastian Muskalla

    Abstract: We present a method for solving polynomial equations over idempotent omega-continuous semirings. The idea is to iterate over the semiring of functions rather than the semiring of interest, and only evaluate when needed. The key operation is substitution. In the initial step, we compute a linear completion of the system of equations that exhaustively inserts the equations into one another. With fun… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

  44. arXiv:1603.07256  [pdf, other

    cs.LO cs.FL cs.GT

    Summaries for Context-Free Games

    Authors: Lukáš Holík, Roland Meyer, Sebastian Muskalla

    Abstract: We study two-player games played on the infinite graph of sentential forms induced by a context-free grammar (that comes with an ownership partitioning of the non-terminals). The winning condition is inclusion of the derived terminal word in the language of a finite automaton. Our contribution is a new algorithm to decide the winning player and to compute her strategy. It is based on a novel repre… ▽ More

    Submitted 1 November, 2016; v1 submitted 23 March, 2016; originally announced March 2016.

    Comments: The conference version of this paper was accepted for FSTTCS 2016

    ACM Class: F.1.1

  45. arXiv:1511.00184  [pdf, other

    cs.PL

    Pointer Race Freedom

    Authors: Frédéric Haziza, Lukáš Holík, Roland Meyer, Sebastian Wolff

    Abstract: We propose a novel notion of pointer race for concurrent programs manipulating a shared heap. A pointer race is an access to a memory address which was freed, and it is out of the accessor's control whether or not the cell has been re-allocated. We establish two results. (1) Under the assumption of pointer race freedom, it is sound to verify a program running under explicit memory management as if… ▽ More

    Submitted 11 November, 2015; v1 submitted 31 October, 2015; originally announced November 2015.

    Report number: FIT-TR-2015-05

  46. arXiv:1510.04507  [pdf

    quant-ph cs.CR cs.ET physics.ao-ph physics.optics

    Satellite Quantum Communication via the Alphasat Laser Communication Terminal

    Authors: Dominique Elser, Kevin Günthner, Imran Khan, Birgit Stiller, Christoph Marquardt, Gerd Leuchs, Karen Saucke, Daniel Tröndle, Frank Heine, Stefan Seel, Peter Greulich, Herwig Zech, Björn Gütlich, Ines Richter, Rolf Meyer

    Abstract: By harnessing quantum effects, we nowadays can use encryption that is in principle proven to withstand any conceivable attack. These fascinating quantum features have been implemented in metropolitan quantum networks around the world. In order to interconnect such networks over long distances, optical satellite communication is the method of choice. Standard telecommunication components allow one… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: International Conference on Space Optical Systems and Applications (IEEE ICSOS 2015), October 27 and 28, 2015, New Orleans, USA, 4 pages, 5 figures

  47. arXiv:1507.01321  [pdf, other

    cs.SE cs.DC

    Chiminey: Reliable Computing and Data Management Platform in the Cloud

    Authors: Iman I. Yusuf, Ian E. Thomas, Maria Spichkova, Steve Androulakis, Grischa R. Meyer, Daniel W. Drumm, George Opletal, Salvy P. Russo, Ashley M. Buckle, Heinz W. Schmidt

    Abstract: The enabling of scientific experiments that are embarrassingly parallel, long running and data-intensive into a cloud-based execution environment is a desirable, though complex undertaking for many researchers. The management of such virtual environments is cumbersome and not necessarily within the core skill set for scientists and engineers. We present here Chiminey, a software platform that enab… ▽ More

    Submitted 5 July, 2015; originally announced July 2015.

    Comments: Preprint, ICSE 2015

  48. arXiv:1501.02683  [pdf, ps, other

    cs.PL

    Lazy TSO Reachability

    Authors: Ahmed Bouajjani, Georgel Calin, Egor Derevenetc, Roland Meyer

    Abstract: We address the problem of checking state reachability for programs running under Total Store Order (TSO). The problem has been shown to be decidable but the cost is prohibitive, namely non-primitive recursive. We propose here to give up completeness. Our contribution is a new algorithm for TSO reachability: it uses the standard SC semantics and introduces the TSO semantics lazily and only where ne… ▽ More

    Submitted 12 January, 2015; originally announced January 2015.

    Comments: accepted to FASE 2015

    MSC Class: 68Q60 ACM Class: D.2.4; D.1.3; D.3.4

  49. arXiv:1404.7092  [pdf, other

    cs.LO

    Robustness against Power is PSPACE-complete

    Authors: Egor Derevenetc, Roland Meyer

    Abstract: Power is a RISC architecture developed by IBM, Freescale, and several other companies and implemented in a series of POWER processors. The architecture features a relaxed memory model providing very weak guarantees with respect to the ordering and atomicity of memory accesses. Due to these weaknesses, some programs that are correct under sequential consistency (SC) show undesirable effects when… ▽ More

    Submitted 28 April, 2014; originally announced April 2014.

    MSC Class: 68Q60 ACM Class: D.2.4; D.1.3

  50. A Polynomial Translation of pi-calculus FCPs to Safe Petri Nets

    Authors: Victor Khomenko, Roland Meyer, Reiner Hüchting

    Abstract: We develop a polynomial translation from finite control pi-calculus processes to safe low-level Petri nets. To our knowledge, this is the first such translation. It is natural in that there is a close correspondence between the control flows, enjoys a bisimulation result, and is suitable for practical model checking.

    Submitted 16 September, 2013; v1 submitted 3 September, 2013; originally announced September 2013.

    Comments: To appear in special issue on best papers of CONCUR'12 of Logical Methods in Computer Science

    Journal ref: Logical Methods in Computer Science, Volume 9, Issue 3 (September 17, 2013) lmcs:932