显示样式： 排序： IF:  GO 导出

A Perron–Frobenius Theorem for Deciding Matrix Growth J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210621
René ThiemannMatrix interpretations are widely used in automated complexity analysis. Certifying such analyses boils down to determining the growth rate of An for a fixed nonnegative rational matrix A. There exists a conceptually simple algorithm to determine the growth rate, but this algorithm has the disadvantage that it is based on algebraic number computations. In this work we present an even simpler algorithm

Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210504
Antonio GonzálezBurgueño, Peter Csaba ÖlveczkyIn today's security protocols (also called “security ceremonies” when humans play a key role), different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in ebanking cannot; and so on. Furthermore, even if a node has the decryption capability, it must

Observational interpretations of hybrid dynamic logic with binders and silent transitions J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210525
Rolf Hennicker, Alexander Knapp, Alexandre MadeiraWe extend hybrid dynamic logic with binders (for state variables) by distinguishing between observable and silent transitions. This differentiation gives rise to two kinds of observational interpretations: The first one relies on observational abstraction from the ordinary model class of a specification Sp by considering its closure under weak bisimulation. The second one uses an observational satisfaction

Determinization of inverted grammar programs via contextfree expressions J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210517
Naoki Nishida, Minami NiwaIn this paper, we propose a determinization method of inverted grammar programs by means of contextfree expressions (CFEs, for short) which are straightforward extensions (socalled μregular expressions) of regular expressions to contextfree languages. Grammar programs are contextfree grammars that an inversion method proposed by Glück and Kawabe uses as intermediate results. We use deterministic

Belief base change as priority change: A study based on dynamic epistemic logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210519
Marlo Souza, Álvaro MoreiraAGM's belief revision is one of the main paradigms in the study of belief change operations. In this context, belief bases (prioritised bases) have been primarily used to specify the agent's belief state. While the connection of iterated AGMlike operations and their encoding in dynamic epistemic logics have been studied before, few works considered how wellknown postulates from iterated belief revision

Expressing discrete spatial relations under granularity J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210427
Giulia Sindoni, Katsuhiko Sano, John G. StellThe logic UBiSKt is a biintuitionistic modal logic with universal modalities having a semantics in which formulae are interpreted as subgraphs. We use the logic to formalize the idea of looking at subgraphs at different levels of detail. We show how the logic can be used to define various spatial relations between subgraphs. These relations are considered with respect to change in level of detail

The origins of the halting problem J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210510
Salvador LucasThe halting problem is a prominent example of undecidable problem and its formulation and undecidability proof is usually attributed to Turing's 1936 landmark paper. Copeland noticed in 2004, though, that it was so named and, apparently, first stated in a 1958 book by Martin Davis. We provide additional arguments partially supporting this claim as follows: (i) with a focus on computable (real) numbers

Event structure semantics of (controlled) reversible CCS J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210503
Eva Graversen, Iain Phillips, Nobuko YoshidaCCSK is a reversible form of CCS which is causal, meaning that actions can be reversed if and only if each action caused by them has already been reversed; there is no control on whether or when a computation reverses. We propose an event structure semantics for CCSK. For this purpose we define a category of reversible bundle event structures, and use the causal subcategory to model CCSK. We then modify

Resource separation in dynamic logic of propositional assignments J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210427
Joseph Boudou, Andreas Herzig, Nicolas TroquardWe extend dynamic logic of propositional assignments by adding an operator of parallel composition that is inspired by separation logics. We provide an axiomatization via reduction axioms, thereby establishing decidability. We also prove that the complexity of both the model checking and the satisfiability problem stay in PSPACE.

EventBased TimeStamped Claim Logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210428
Jaime Ramos, João Rasga, Cristina Sernadas, Luca ViganòThe EventBased TimeStamped Claim Logic that we define in this paper allows one to reason about distributed timestamped claims that can change through time by the occurrence of events. Such a logic is interesting for theoretical reasons, i.e., as a logic per se, but also because it can be applied in a number of different disciplines and application domains (e.g., history, crime forensics or cyber

Operational semantics with semicommutations J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210323
Hendrik Maarand, Tarmo UustaluWe propose an operational semantics where the execution of instructions of a program is not necessarily in the order in which they are given in the program. In other words, an instruction might be executed before its preceding instructions have been executed. The idea is that such an execution mechanism can capture some optimizations that a compiler or a runtime environment might apply to the program

Explaining safety failures in NetKAT J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210412
Georgiana Caltais, Hünkar Can TunçThis work introduces a concept of explanations with respect to the violation of safe behaviours within software defined networks (SDNs) expressible in NetKAT. The latter is a network programming language based on a wellstudied mathematical structure, namely, Kleene Algebra with Tests (KAT). Amongst others, the mathematical foundation of NetKAT gave rise to a sound and complete equational theory. In

Automated verification of reactive and concurrent programs by calculation J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210414
Simon Foster, Kangfeng Ye, Ana Cavalcanti, Jim WoodcockReactive programs combine traditional sequential programming constructs with primitives to allow communication with other concurrent agents. They are ubiquitous in modern applications, ranging from components systems and web services, to cyberphysical systems and autonomous robots. In this paper, we present an algebraic verification strategy for concurrent reactive programs, with a large or infinite

Applications and extensions of contextsensitive rewriting J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210331
Salvador LucasContextsensitive rewriting is a restriction of term rewriting which is obtained by imposing replacement restrictions on the arguments of function symbols. It has proven useful to analyze computational properties of programs written in sophisticated rewritingbased programming languages such as CafeOBJ, Haskell, Maude, OBJ*, etc. Also, a number of extensions (e.g., to conditional rewriting or constrained

On primitives for compensation handling as adaptable processes J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210323
Jovana Dedeić, Jovanka Pantović, Jorge A. PérezMechanisms for compensation handling and dynamic update are increasingly relevant in the specification of reliable communicating systems. Compensations and updates are intuitively similar: both specify how the behavior of a concurrent system changes at runtime in response to an exceptional event. However, calculi for concurrency with compensations and updates are technically quite different. We compare

Nondual modal operators as a basis for 4valued accessibility relations in Hybrid logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210329
Diana Costa, Manuel A. MartinsThe modal operators usually associated with the notions of possibility and necessity are classically duals. This paper aims to defy that duality in a paraconsistent environment, namely in a Belnapian Hybrid logic where both propositional variables and accessibility relations are fourvalued. Hybrid logic, which is an extension of Modal logic, incorporates extra machinery such as nominals – for uniquely

Formal verification of timed synchronous dataflow graphs using Lustre J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210326
Imed Eddine BennourThe timed synchronous dataflow graph model is a graphical model of computation that allows concurrency between processes. This model is widely used due to its expressive power, semantic simplicity and predefined properties. However, the lack of support for formal verification makes it difficult to manually verify userdefined properties, even for smallsized graphs. This paper presents a formal verification

Reasoning about distributed information with infinitely many agents J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210319
Michell Guzmán, Sophia Knight, Santiago Quintero, Sergio Ramírez, Camilo Rueda, Frank ValenciaSpatial constraint systems (scs) are semantic structures for reasoning about spatial and epistemic information in concurrent systems. We develop the theory of scs to reason about the distributed information of potentially infinite groups. We characterize the notion of distributed information of a group of agents as the infimum of the set of joinpreserving functions that represent the spaces of the

Certifying Findel derivatives for blockchain J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210212
Andrei ArusoaieFindel is a composable DSL for financial derivatives that can be executed on the blockchain. The language is simple and expressive enough to express complex derivatives. However, compared to its competitors, Findel does not guarantee that contracts progress properly. There is no default refund mechanism, and the economic enforcement is not handled by the language itself. Given the immutability of the

Scalable optimal deployment in the cloud of componentbased applications using optimization modulo theory, mathematical programming and symmetry breaking J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210210
Mădălina Eraşcu, Flavia Micota, Daniela ZaharieAutomated deployment of componentbased applications in the Cloud consists in the allocation of virtual machines (VMs) offers from various Cloud Providers such that the constraints induced by the interactions between components and by the components hardware/software requirements are satisfied and the performance objectives are optimized (e.g. costs are minimized). It can be formulated as a constraint

A dynamic epistemic logic analysis of equality negation and other epistemic covering tasks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210204
Hans van Ditmarsch, Éric Goubault, Marijana Lazić, Jérémy Ledent, Sergio RajsbaumIn this paper we study the solvability of the equality negation task in a simple waitfree model where two processes communicate by reading and writing shared variables or exchanging messages. In this task, the two processes start with a private input value in the set {0,1,2}, and after communicating, each one must decide a binary output value, so that the outputs of the processes are the same if and

Simpler proofs with decentralized invariants J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210128
JeanChristophe FilliâtreWhen verifying programs where the data have some recursive structure, it is natural to make use of global invariants that are themselves recursively defined. Though this is mathematically elegant, this makes the proofs more complex, as the preservation of these invariants now requires induction. In particular, this makes the proofs less amenable to automation. An alternative is to use local invariants

Verification of dynamic bisimulation theorems in Coq J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210127
Raul Fervari, Francisco Trucco, Beta ZilianiOver the last years, the study of logics that can update a model while evaluating a formula has gained in interest. Motivated by many examples in practice such as hybrid logics, separation logics and dynamic epistemic logics, the ability to update a model has been investigated from a more general point of view. In this work, we formalize and verify in the proof assistant Coq, the bisimulation theorems

Schreier split extensions of preordered monoids J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210126
Nelson MartinsFerreira, Manuela SobralProperties of preordered monoids are investigated and important subclasses of such structures are studied. The corresponding full subcategories are related between them by appropriate functors as well as with the categories of preordered sets and of monoids. Schreier split extensions are described in the full subcategory of preordered monoids whose preorder is determined by the corresponding positive

ManySorted Hybrid Modal Languages J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210126
Ioana Leuştean, Natalia Moangă, Traian Florin ŞerbănuţăWe continue our investigation into using the hybridization technique on top of the manysorted polyadic modal logic we have previously defined. By adding different operators and binders, we present in this paper several systems we have developed. We briefly discuss the goals we have achieved by developing each system. We identify a fragment of the full hybrid logic, for which we prove its sound and

On checking equivalence of simulation scripts J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210118
Toni Mancini, Federico Mari, Annalisa Massini, Igor Melatti, Enrico TronciTo support Model Based Design of CyberPhysical Systems (CPSs) many simulation based approaches to System Level Formal Verification (SLFV) have been devised. Basically, these are Bounded Model Checking approaches (since simulation horizon is of course bounded) relying on simulators to compute the system dynamics and thereby verify the given system properties. The main obstacle to simulation based SLFV

A fixedpoints based framework for compliance of behavioural contracts J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210119
Maurizio MurgiaWe study compliance relations between behavioural contracts in a syntax independent setting based on Labelled Transition Systems. We introduce a fixedpoint based family of compliance relations, and show that many compliance relations appearing in literature belong to this family. We then study fixcompliance in the context of synchronous and asynchronous session contracts.

A structural approach to graph transformation based on symmetric Petri nets J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210112
Lorenzo CapraGraph Transformation Systems (GTS) and Petri Nets (PN) are two central, theoretically sound, formal models for concurrent or distributed systems. A lot of papers have focused on the relationship between GTS and PN. It is generally accepted that PN are instances of GTS due to the lack of ability to adapt or reconfigure their structure. In this paper, which extends a recent one, we reverse this perspective

Matching logic explained J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210114
Xiaohong Chen, Dorel Lucanu, Grigore RoşuMatching logic was recently proposed as a unifying logic for specifying and reasoning about static structure and dynamic behavior of programs. In matching logic, patterns and specifications are used to uniformly represent mathematical domains (such as numbers and Boolean values), datatypes, and transition systems, whose properties can be reasoned about using one fixed matching logic proof system. In

A messagepassing interpretation of adjoint logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201228
Klaas Pruiksma, Frank PfenningWe present a system of session types based on adjoint logic which generalizes standard binary session types. Our system allows us to uniformly capture several new behaviors in the space of asynchronous messagepassing communication, including multicast, where a process sends a single message to multiple clients, replicable services, which have multiple clients and replicate themselves ondemand to

Computer says no: Verdict explainability for runtime monitors using a local proof system J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201209
Adrian Francalanza, Clare CiniMonitors in Runtime Verification are often constructed as black boxes: they provide verdicts on whether a property is satisfied or violated by the executing system under scrutiny, without much explanation as to why this is the case. In the best of cases, monitors might also return the trace observed, still leaving it up to the user to figure out the logic employed to reach the declared verdict from

Deciding the consistency of nonlinear real arithmetic constraints with a conflict driven search using cylindrical algebraic coverings J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201127
Erika Ábrahám, James H. Davenport, Matthew England, Gereon KremerWe present a new algorithm for determining the satisfiability of conjunctions of nonlinear polynomial constraints over the reals, which can be used as a theory solver for satisfiability modulo theory (SMT) solving for nonlinear real arithmetic. The algorithm is a variant of Cylindrical Algebraic Decomposition (CAD) adapted for satisfiability, where solution candidates (sample points) are constructed

Wellstructuredness, safeness and soundness: A formal classification of BPMN collaborations J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201126
Flavio Corradini, Andrea Morichetta, Chiara Muzi, Barbara Re, Francesco TiezziThe BPMN standard has a huge uptake in modelling business processes within the same organisation or collaborations involving multiple interacting participants. It is widely accepted by the Business Process Management community that a solid formal framework for the notation can help designers to properly understand their BPMN models as well as to state and verify model properties. With this aim in mind

Synthesis of sorting algorithms using multisets in Theorema J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201203
Isabela Drămnesc, Tudor JebeleanUsing multisets, we develop novel techniques for mechanizing the proofs of the synthesis conjectures for list–sorting algorithms, and we demonstrate them in the Theorema system. We use the classical principle of extracting the algorithm as a set of rewrite rules based on the witnesses found in the proof of the synthesis conjecture produced from the specification of the desired function (input and output

Semantics of multiway dataflow constraint systems J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201203
Magne Haveraaen, Jaakko JärviMultiway dataflow constraint systems (MDCS) is a programming model where statements are not executed in a predetermined order. Rather, individual methods are selected from specific method sets and then executed to achieve a desired global state. The selection is done by a planner, which typically bases the choice of methods on the history of updates to the global state. MDCS is well suited for describing

Semantics of temporal constrained objects J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201125
Jinesh M. Kannimoola, Bharat Jayaraman, Krishnashree AchuthanThis paper presents the declarative and operational semantics for the paradigm of temporal constrained objects (TCOB). This modeling paradigm is an extension of basic constrained objects where objects specify the structure of a system and constraints specify its behavior. Temporal constrained objects have been shown to provide a clear and highlevel declarative specification of the timedependent behavior

Conflict vs causality in event structures J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201125
Daniele Gorla, Ivano SalvoEvent structures are one of the best known models for concurrency. Many variants of the basic model and many possible notions of equivalence for them have been devised in the literature. In this paper, we study how the spectrum of equivalences for Labeled Prime Event Structures built by Van Glabbeek and Goltz changes if we consider two simplified notions of event structures: the first one is obtained

Checking deadlockfreedom of parametric componentbased systems J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201113
Marius Bozga, Radu Iosif, Joseph SifakisWe propose an automated method for computing inductive invariants used to proving deadlock freedom of parametric componentbased systems. The method generalizes the approach for computing structural trap invariants from bounded to parametric systems with general architectures. It symbolically extracts trap invariants from interaction formulae defining the system architecture. The paper presents the

The Cπcalculus: A model for confidential name passing J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201117
Ivan Prokić, Hugo Torres VieiraSharing confidential information in distributed systems is often a necessity in the context of many applications, however, it opens the problem of controlling information sharing even among trusted parties. In this paper, we present a formal model in which dissemination of information, in particular information forwarding, is not allowed. Namely, we introduce a fragment of the πcalculus where forwarding

Composition and decomposition of multiparty sessions J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201104
Franco Barbanera, Mariangiola DezaniCiancaglini, Ivan Lanese, Emilio TuostoMultiparty sessions are systems of concurrent processes, which allow several participants to communicate by sending and receiving messages. Their overall behaviour can be described by means of global types. Typable multiparty sessions enjoy lockfreedom. We look at multiparty sessions as open systems by allowing one to compose multiparty sessions by transforming two of their participants into a pair

Soft constraint automata with memory J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201021
Kasper Dokter, Fabio Gadducci, Benjamin Lion, Francesco SantiniWe revise soft constraint automata, wherein transitions are weighted and each action has an associated preference value. We first relax the underlying algebraic structure to allow bipolar preferences. We then equip automata with memory locations, that is, with an internal state to remember and update information from transition to transition. We furthermore revise automata operators, such as composition

Runtime verification for dynamic architectures J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201022
Diego Marmsoler, Ana PetrovskaThe architecture of a system captures important design decisions for the system. Over time, changes in a system's implementation may lead to violations of specific design decisions. This problem is common in industry and known as architectural erosion. Since it may have severe consequences on the quality of a system, research has focused on the development of tools and techniques to address the presented

(Co)inductive proof systems for compositional proofs in reachability logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201029
Vlad Rusu, David NowakReachability Logic is a formalism that can be used, among others, for expressing partialcorrectness properties of transition systems. In this paper we present three proof systems for this formalism, all of which are sound and complete and inherit the coinductive nature of the logic. The proof systems differ, however, in several aspects. First, they use induction and coinduction in different proportions

A navigational logic for reasoning about graph properties J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201012
Marisa Navarro, Fernando Orejas, Elvira Pino, Leen LambersGraphs play an important role in many areas of Computer Science. In particular, our work is motivated by modeldriven software development and by graph databases. For this reason, it is very important to have the means to express and to reason about the properties that a given graph may satisfy. With this aim, in this paper we present a visual logic that allows us to describe graph properties, including

Actorbased model checking for SoftwareDefined Networks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201012
Elvira Albert, Miguel GómezZamalloa, Miguel Isabel, Albert Rubio, Matteo Sammartino, Alexandra SilvaSoftwareDefined Networking (SDN) is a networking paradigm that has become increasingly popular in the last decade. The unprecedented control over the global behaviour of the network it provides opens a range of new opportunities for formal methods and much work has appeared in the last few years on providing bridges between SDN and verification. This article advances this research line and provides

Free Kleene algebras with domain J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200925
Brett McLeanFirst we identify the free algebras of the class of algebras of binary relations equipped with the composition and domain operations. Elements of the free algebras are pointed labelled finite rooted trees. Then we extend to the analogous case when the signature includes all the Kleene algebra with domain operations; that is, we add union and reflexive transitive closure to the signature. In this second

On the group memory complexity of extended finite automata over groups J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200917
Fernando Arroyo, Victor Mitrana, Andrei Păun, Mihaela Păun, Jose Ramon Sanchez CousoWe define and investigate a complexity measure defined for extended finite automata over groups (EFA). Roughly, an EFA is a finite automaton augmented with a register storing an element of a group, initially the identity element. When a transition is performed, not only the state, but the register contents are updated. A word is accepted if, after reading completely the word, the automaton reached

Relation algebras of Sugihara, Belnap, Meyer, and Church J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200912
R.L. Kramer, R.D. MadduxAlgebras introduced by, or attributed to, Sugihara, Belnap, Meyer, and Church are representable as algebras of binary relations with settheoretically defined operations. They are definitional reducts or subreducts of proper relation algebras. The representability of Sugihara matrices yields sound and complete settheoretical semantics for Rmingle.

Relational characterisations of paths J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200817
Rudolf Berghammer, Hitoshi Furusawa, Walter Guttmann, Peter HöfnerBinary relations are one of the standard ways to encode, characterise and reason about graphs. Relation algebras provide equational axioms for a large fragment of the calculus of binary relations. Although relations are standard tools in many areas of mathematics and computing, researchers usually fall back to pointwise reasoning when it comes to arguments about paths in a graph. We present a purely

Calculational relationalgebraic proofs in the teaching tool CalcCheck J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200720
Wolfram KahlThe proof checker CALCCHECK has been developed for teaching calculational proofs in the style of Gries and Schneider's textbook classic “A Logical Approach to Discrete Math”. While originally only ACrewriting was supported, we now added also support for operators that are only associative, which is essential for convenience in reasoning about composition of (in particular) relations. We demonstrate

Specifying reversibility with TLA+ J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200715
Tatjana KapusIn the past, actionbased, processalgebraic formalisms for the description and analysis of concurrent reversible computations were mainly developed. In this paper, we present a statebased approach to the specification of concurrent systems in which forwardexecuted actions may either be executed in reverse in a causalconsistent uncontrolled fashion or are irreversible. The basic underlying system

Replacement freeness: A criterion for separating process calculi J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200707
Rosario Pugliese, Francesco TiezziWe introduce a new criterion to discern the relative expressiveness of process calculi. Intuitively, a calculus is replacement free if replacing a subprocess that cannot perform any visible action by an arbitrary one never affects the capability of the resulting process to perform a visible action. By relying on two slightly different formulations of our criterion we partition the set of process calculi

Preface to the special issue on Formal Approaches to Parallel and Distributed Systems 2018 J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200707
Frédéric LoulergueThis special issue contains extended versions of selected papers from the 5th International Symposium on Formal Approaches to Parallel and Distributed Systems (4PAD 2018). The symposium was held in Orléans, France on July 19th, 2020 in conjunction with the 2018 International Conference on High Performance Computing & Simulation (HPCS 2018).

From global choreographies to verifiable efficient distributed implementations J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200701
Mohamad Jaber, Yliès Falcone, Paul Attie, AlAbbass Khalil, Rayan Hallal, Antoine ElHokayemWe define a method to automatically synthesize efficient distributed implementations from highlevel global choreographies. A global choreography describes the execution and communication logic between a set of provided processes which are described by their interfaces. At the choreography level, the operations include multiparty communications, choice, loop, and branching. A choreography is master

Algebraic solution of minimax singlefacility constrained location problems with Chebyshev and rectilinear distances J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200630
Nikolai KrivulinWe consider location problems to find the optimal sites of placement of a new facility, which minimize the maximum weighted Chebyshev or rectilinear distance to existing facilities under constraints on a feasible location domain. We examine Chebyshev location problems in multidimensional space to represent and solve the problems in the framework of tropical (idempotent) algebra, which deals with the

Preface to the special issue on the 12th International Conference on Graph Transformation J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200608
Esther Guerra, Fernando OrejasThis special issue contains extended versions of four selected papers from the 12th International Conference on Graph Transformation (ICGT 2019). The articles cover a method for graph pattern matching, the use of graph hierarchies for knowledge representation, the construction of constraint preserving transformation rules, and the definition of a formal framework, extending the theory DPO rewriting

Doublepushoutrewriting in SCartesian functor categories: Rewriting theory and application to partial triple graphs J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200527
Jens Kosiol, Lars Fritsche, Andy Schürr, Gabriele TaentzerA variety of restricted functor categories has been investigated independently and for different purposes to provide doublepushoutrewriting in the areas of modeldriven development and graph transformation. We introduce Scartesian functor categories as a unifying formal framework for these different examples. Scartesian functor categories are certain subcategories of functor categories that preserve

Constructing optimized constraintpreserving application conditions for model transformation rules J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200527
Nebras Nassar, Jens Kosiol, Thorsten Arendt, Gabriele TaentzerThere is an increasing need for model transformations ensuring valid result models w.r.t. a given constraint. In model refactoring, for example, each performed refactoring should yield a valid model again. Given a constraint, if a model transformation rule always produces valid output, it is called constraintguaranteeing; if only when applied to an already valid model, it is called constraintpreserving

Hybrid search plan generation for generalized graph pattern matching J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200527
Matthias Barkowsky, Holger GieseIn recent years, the increased interest in application areas such as social networks has resulted in a rising popularity of graphbased approaches for storing and processing large amounts of interconnected data. To extract useful information from the growing network structures, efficient querying techniques are required. In this paper, we propose an approach for graph pattern matching that allows a

A collaborative access control framework for online social networks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200525
Hanaa Alshareef, Raúl Pardo, Gerardo Schneider, Pablo PicazoSanchezMost Online Social Networks allow users to set their privacy settings concerning posting information, but current implementations do not allow a fine grained enforcement in case the posted item concerns other users. In this paper we propose a new collaborative access control framework that takes into account the relation of multiple users for viewing as well as for sharing items, eventually solving