显示样式： 排序： IF:  GO 导出

Certifying Findel derivatives for blockchain J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210212
Andrei ArusoaieFindel is a composable DSL for financial derivatives that can be executed on the blockchain. The language is simple and expressive enough to express complex derivatives. However, compared to its competitors, Findel does not guarantee that contracts progress properly. There is no default refund mechanism, and the economic enforcement is not handled by the language itself. Given the immutability of the

Scalable optimal deployment in the cloud of componentbased applications using optimization modulo theory, mathematical programming and symmetry breaking J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210210
Mădălina Eraşcu; Flavia Micota; Daniela ZaharieAutomated deployment of componentbased applications in the Cloud consists in the allocation of virtual machines (VMs) offers from various Cloud Providers such that the constraints induced by the interactions between components and by the components hardware/software requirements are satisfied and the performance objectives are optimized (e.g. costs are minimized). It can be formulated as a constraint

A dynamic epistemic logic analysis of equality negation and other epistemic covering tasks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210204
Hans van Ditmarsch; Éric Goubault; Marijana Lazić; Jérémy Ledent; Sergio RajsbaumIn this paper we study the solvability of the equality negation task in a simple waitfree model where two processes communicate by reading and writing shared variables or exchanging messages. In this task, the two processes start with a private input value in the set {0,1,2}, and after communicating, each one must decide a binary output value, so that the outputs of the processes are the same if and

Simpler proofs with decentralized invariants J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210128
JeanChristophe FilliâtreWhen verifying programs where the data have some recursive structure, it is natural to make use of global invariants that are themselves recursively defined. Though this is mathematically elegant, this makes the proofs more complex, as the preservation of these invariants now requires induction. In particular, this makes the proofs less amenable to automation. An alternative is to use local invariants

Verification of dynamic bisimulation theorems in Coq J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210127
Raul Fervari; Francisco Trucco; Beta ZilianiOver the last years, the study of logics that can update a model while evaluating a formula has gained in interest. Motivated by many examples in practice such as hybrid logics, separation logics and dynamic epistemic logics, the ability to update a model has been investigated from a more general point of view. In this work, we formalize and verify in the proof assistant Coq, the bisimulation theorems

Schreier split extensions of preordered monoids J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210126
Nelson MartinsFerreira; Manuela SobralProperties of preordered monoids are investigated and important subclasses of such structures are studied. The corresponding full subcategories are related between them by appropriate functors as well as with the categories of preordered sets and of monoids. Schreier split extensions are described in the full subcategory of preordered monoids whose preorder is determined by the corresponding positive

ManySorted Hybrid Modal Languages J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210126
Ioana Leuştean; Natalia Moangă; Traian Florin ŞerbănuţăWe continue our investigation into using the hybridization technique on top of the manysorted polyadic modal logic we have previously defined. By adding different operators and binders, we present in this paper several systems we have developed. We briefly discuss the goals we have achieved by developing each system. We identify a fragment of the full hybrid logic, for which we prove its sound and

On checking equivalence of simulation scripts J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210118
Toni Mancini; Federico Mari; Annalisa Massini; Igor Melatti; Enrico TronciTo support Model Based Design of CyberPhysical Systems (CPSs) many simulation based approaches to System Level Formal Verification (SLFV) have been devised. Basically, these are Bounded Model Checking approaches (since simulation horizon is of course bounded) relying on simulators to compute the system dynamics and thereby verify the given system properties. The main obstacle to simulation based SLFV

A fixedpoints based framework for compliance of behavioural contracts J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210119
Maurizio MurgiaWe study compliance relations between behavioural contracts in a syntax independent setting based on Labelled Transition Systems. We introduce a fixedpoint based family of compliance relations, and show that many compliance relations appearing in literature belong to this family. We then study fixcompliance in the context of synchronous and asynchronous session contracts.

A structural approach to graph transformation based on symmetric Petri nets J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210112
Lorenzo CapraGraph Transformation Systems (GTS) and Petri Nets (PN) are two central, theoretically sound, formal models for concurrent or distributed systems. A lot of papers have focused on the relationship between GTS and PN. It is generally accepted that PN are instances of GTS due to the lack of ability to adapt or reconfigure their structure. In this paper, which extends a recent one, we reverse this perspective

Matching logic explained J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20210114
Xiaohong Chen; Dorel Lucanu; Grigore RoşuMatching logic was recently proposed as a unifying logic for specifying and reasoning about static structure and dynamic behavior of programs. In matching logic, patterns and specifications are used to uniformly represent mathematical domains (such as numbers and Boolean values), datatypes, and transition systems, whose properties can be reasoned about using one fixed matching logic proof system. In

A messagepassing interpretation of adjoint logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201228
Klaas Pruiksma; Frank PfenningWe present a system of session types based on adjoint logic which generalizes standard binary session types. Our system allows us to uniformly capture several new behaviors in the space of asynchronous messagepassing communication, including multicast, where a process sends a single message to multiple clients, replicable services, which have multiple clients and replicate themselves ondemand to

Computer says no: Verdict explainability for runtime monitors using a local proof system J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201209
Adrian Francalanza; Clare CiniMonitors in Runtime Verification are often constructed as black boxes: they provide verdicts on whether a property is satisfied or violated by the executing system under scrutiny, without much explanation as to why this is the case. In the best of cases, monitors might also return the trace observed, still leaving it up to the user to figure out the logic employed to reach the declared verdict from

Deciding the consistency of nonlinear real arithmetic constraints with a conflict driven search using cylindrical algebraic coverings J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201127
Erika Ábrahám; James H. Davenport; Matthew England; Gereon KremerWe present a new algorithm for determining the satisfiability of conjunctions of nonlinear polynomial constraints over the reals, which can be used as a theory solver for satisfiability modulo theory (SMT) solving for nonlinear real arithmetic. The algorithm is a variant of Cylindrical Algebraic Decomposition (CAD) adapted for satisfiability, where solution candidates (sample points) are constructed

Wellstructuredness, safeness and soundness: A formal classification of BPMN collaborations J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201126
Flavio Corradini; Andrea Morichetta; Chiara Muzi; Barbara Re; Francesco TiezziThe BPMN standard has a huge uptake in modelling business processes within the same organisation or collaborations involving multiple interacting participants. It is widely accepted by the Business Process Management community that a solid formal framework for the notation can help designers to properly understand their BPMN models as well as to state and verify model properties. With this aim in mind

Synthesis of sorting algorithms using multisets in Theorema J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201203
Isabela Drămnesc; Tudor JebeleanUsing multisets, we develop novel techniques for mechanizing the proofs of the synthesis conjectures for list–sorting algorithms, and we demonstrate them in the Theorema system. We use the classical principle of extracting the algorithm as a set of rewrite rules based on the witnesses found in the proof of the synthesis conjecture produced from the specification of the desired function (input and output

Semantics of multiway dataflow constraint systems J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201203
Magne Haveraaen; Jaakko JärviMultiway dataflow constraint systems (MDCS) is a programming model where statements are not executed in a predetermined order. Rather, individual methods are selected from specific method sets and then executed to achieve a desired global state. The selection is done by a planner, which typically bases the choice of methods on the history of updates to the global state. MDCS is well suited for describing

Semantics of temporal constrained objects J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201125
Jinesh M. Kannimoola; Bharat Jayaraman; Krishnashree AchuthanThis paper presents the declarative and operational semantics for the paradigm of temporal constrained objects (TCOB). This modeling paradigm is an extension of basic constrained objects where objects specify the structure of a system and constraints specify its behavior. Temporal constrained objects have been shown to provide a clear and highlevel declarative specification of the timedependent behavior

Conflict vs causality in event structures J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201125
Daniele Gorla; Ivano SalvoEvent structures are one of the best known models for concurrency. Many variants of the basic model and many possible notions of equivalence for them have been devised in the literature. In this paper, we study how the spectrum of equivalences for Labeled Prime Event Structures built by Van Glabbeek and Goltz changes if we consider two simplified notions of event structures: the first one is obtained

Checking deadlockfreedom of parametric componentbased systems J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201113
Marius Bozga; Radu Iosif; Joseph SifakisWe propose an automated method for computing inductive invariants used to proving deadlock freedom of parametric componentbased systems. The method generalizes the approach for computing structural trap invariants from bounded to parametric systems with general architectures. It symbolically extracts trap invariants from interaction formulae defining the system architecture. The paper presents the

The Cπcalculus: A model for confidential name passing J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201117
Ivan Prokić; Hugo Torres VieiraSharing confidential information in distributed systems is often a necessity in the context of many applications, however, it opens the problem of controlling information sharing even among trusted parties. In this paper, we present a formal model in which dissemination of information, in particular information forwarding, is not allowed. Namely, we introduce a fragment of the πcalculus where forwarding

Composition and decomposition of multiparty sessions J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201104
Franco Barbanera; Mariangiola DezaniCiancaglini; Ivan Lanese; Emilio TuostoMultiparty sessions are systems of concurrent processes, which allow several participants to communicate by sending and receiving messages. Their overall behaviour can be described by means of global types. Typable multiparty sessions enjoy lockfreedom. We look at multiparty sessions as open systems by allowing one to compose multiparty sessions by transforming two of their participants into a pair

Soft constraint automata with memory J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201021
Kasper Dokter; Fabio Gadducci; Benjamin Lion; Francesco SantiniWe revise soft constraint automata, wherein transitions are weighted and each action has an associated preference value. We first relax the underlying algebraic structure to allow bipolar preferences. We then equip automata with memory locations, that is, with an internal state to remember and update information from transition to transition. We furthermore revise automata operators, such as composition

Runtime verification for dynamic architectures J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201022
Diego Marmsoler; Ana PetrovskaThe architecture of a system captures important design decisions for the system. Over time, changes in a system's implementation may lead to violations of specific design decisions. This problem is common in industry and known as architectural erosion. Since it may have severe consequences on the quality of a system, research has focused on the development of tools and techniques to address the presented

(Co)inductive proof systems for compositional proofs in reachability logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201029
Vlad Rusu; David NowakReachability Logic is a formalism that can be used, among others, for expressing partialcorrectness properties of transition systems. In this paper we present three proof systems for this formalism, all of which are sound and complete and inherit the coinductive nature of the logic. The proof systems differ, however, in several aspects. First, they use induction and coinduction in different proportions

A navigational logic for reasoning about graph properties J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201012
Marisa Navarro; Fernando Orejas; Elvira Pino; Leen LambersGraphs play an important role in many areas of Computer Science. In particular, our work is motivated by modeldriven software development and by graph databases. For this reason, it is very important to have the means to express and to reason about the properties that a given graph may satisfy. With this aim, in this paper we present a visual logic that allows us to describe graph properties, including

Actorbased model checking for SoftwareDefined Networks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20201012
Elvira Albert; Miguel GómezZamalloa; Miguel Isabel; Albert Rubio; Matteo Sammartino; Alexandra SilvaSoftwareDefined Networking (SDN) is a networking paradigm that has become increasingly popular in the last decade. The unprecedented control over the global behaviour of the network it provides opens a range of new opportunities for formal methods and much work has appeared in the last few years on providing bridges between SDN and verification. This article advances this research line and provides

Free Kleene algebras with domain J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200925
Brett McLeanFirst we identify the free algebras of the class of algebras of binary relations equipped with the composition and domain operations. Elements of the free algebras are pointed labelled finite rooted trees. Then we extend to the analogous case when the signature includes all the Kleene algebra with domain operations; that is, we add union and reflexive transitive closure to the signature. In this second

On the group memory complexity of extended finite automata over groups J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200917
Fernando Arroyo; Victor Mitrana; Andrei Păun; Mihaela Păun; Jose Ramon Sanchez CousoWe define and investigate a complexity measure defined for extended finite automata over groups (EFA). Roughly, an EFA is a finite automaton augmented with a register storing an element of a group, initially the identity element. When a transition is performed, not only the state, but the register contents are updated. A word is accepted if, after reading completely the word, the automaton reached

Relation algebras of Sugihara, Belnap, Meyer, and Church J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200912
R.L. Kramer; R.D. MadduxAlgebras introduced by, or attributed to, Sugihara, Belnap, Meyer, and Church are representable as algebras of binary relations with settheoretically defined operations. They are definitional reducts or subreducts of proper relation algebras. The representability of Sugihara matrices yields sound and complete settheoretical semantics for Rmingle.

Relational characterisations of paths J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200817
Rudolf Berghammer, Hitoshi Furusawa, Walter Guttmann, Peter HöfnerBinary relations are one of the standard ways to encode, characterise and reason about graphs. Relation algebras provide equational axioms for a large fragment of the calculus of binary relations. Although relations are standard tools in many areas of mathematics and computing, researchers usually fall back to pointwise reasoning when it comes to arguments about paths in a graph. We present a purely

Calculational relationalgebraic proofs in the teaching tool CalcCheck J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200720
Wolfram KahlThe proof checker CALCCHECK has been developed for teaching calculational proofs in the style of Gries and Schneider's textbook classic “A Logical Approach to Discrete Math”. While originally only ACrewriting was supported, we now added also support for operators that are only associative, which is essential for convenience in reasoning about composition of (in particular) relations. We demonstrate

Specifying reversibility with TLA+ J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200715
Tatjana KapusIn the past, actionbased, processalgebraic formalisms for the description and analysis of concurrent reversible computations were mainly developed. In this paper, we present a statebased approach to the specification of concurrent systems in which forwardexecuted actions may either be executed in reverse in a causalconsistent uncontrolled fashion or are irreversible. The basic underlying system

Replacement freeness: A criterion for separating process calculi J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200707
Rosario Pugliese, Francesco TiezziWe introduce a new criterion to discern the relative expressiveness of process calculi. Intuitively, a calculus is replacement free if replacing a subprocess that cannot perform any visible action by an arbitrary one never affects the capability of the resulting process to perform a visible action. By relying on two slightly different formulations of our criterion we partition the set of process calculi

Preface to the special issue on Formal Approaches to Parallel and Distributed Systems 2018 J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200707
Frédéric LoulergueThis special issue contains extended versions of selected papers from the 5th International Symposium on Formal Approaches to Parallel and Distributed Systems (4PAD 2018). The symposium was held in Orléans, France on July 19th, 2020 in conjunction with the 2018 International Conference on High Performance Computing & Simulation (HPCS 2018).

From global choreographies to verifiable efficient distributed implementations J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200701
Mohamad Jaber, Yliès Falcone, Paul Attie, AlAbbass Khalil, Rayan Hallal, Antoine ElHokayemWe define a method to automatically synthesize efficient distributed implementations from highlevel global choreographies. A global choreography describes the execution and communication logic between a set of provided processes which are described by their interfaces. At the choreography level, the operations include multiparty communications, choice, loop, and branching. A choreography is master

Algebraic solution of minimax singlefacility constrained location problems with Chebyshev and rectilinear distances J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200630
Nikolai KrivulinWe consider location problems to find the optimal sites of placement of a new facility, which minimize the maximum weighted Chebyshev or rectilinear distance to existing facilities under constraints on a feasible location domain. We examine Chebyshev location problems in multidimensional space to represent and solve the problems in the framework of tropical (idempotent) algebra, which deals with the

Preface to the special issue on the 12th International Conference on Graph Transformation J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200608
Esther Guerra, Fernando OrejasThis special issue contains extended versions of four selected papers from the 12th International Conference on Graph Transformation (ICGT 2019). The articles cover a method for graph pattern matching, the use of graph hierarchies for knowledge representation, the construction of constraint preserving transformation rules, and the definition of a formal framework, extending the theory DPO rewriting

Doublepushoutrewriting in SCartesian functor categories: Rewriting theory and application to partial triple graphs J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200527
Jens Kosiol, Lars Fritsche, Andy Schürr, Gabriele TaentzerA variety of restricted functor categories has been investigated independently and for different purposes to provide doublepushoutrewriting in the areas of modeldriven development and graph transformation. We introduce Scartesian functor categories as a unifying formal framework for these different examples. Scartesian functor categories are certain subcategories of functor categories that preserve

Constructing optimized constraintpreserving application conditions for model transformation rules J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200527
Nebras Nassar, Jens Kosiol, Thorsten Arendt, Gabriele TaentzerThere is an increasing need for model transformations ensuring valid result models w.r.t. a given constraint. In model refactoring, for example, each performed refactoring should yield a valid model again. Given a constraint, if a model transformation rule always produces valid output, it is called constraintguaranteeing; if only when applied to an already valid model, it is called constraintpreserving

Hybrid search plan generation for generalized graph pattern matching J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200527
Matthias Barkowsky, Holger GieseIn recent years, the increased interest in application areas such as social networks has resulted in a rising popularity of graphbased approaches for storing and processing large amounts of interconnected data. To extract useful information from the growing network structures, efficient querying techniques are required. In this paper, we propose an approach for graph pattern matching that allows a

A collaborative access control framework for online social networks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200525
Hanaa Alshareef, Raúl Pardo, Gerardo Schneider, Pablo PicazoSanchezMost Online Social Networks allow users to set their privacy settings concerning posting information, but current implementations do not allow a fine grained enforcement in case the posted item concerns other users. In this paper we propose a new collaborative access control framework that takes into account the relation of multiple users for viewing as well as for sharing items, eventually solving

Knowledge representation and update in hierarchies of graphs J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200525
Russ Harmer, Eugenia OshurkoA mathematical theory is presented for the representation of knowledge in the form of a directed acyclic hierarchy of objects in a category where all paths between any given pair of objects are required to be equal. The conditions under which knowledge update, in the form of the sesquipushout rewriting of an object in a hierarchy, can be propagated to the rest of the hierarchy, in order to maintain

Replicated data types that unify eventual consistency and observable atomic consistency J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200522
Xin Zhao, Philipp HallerStrong consistency is widely used in systems such as relational databases. In a distributed system, strong consistency ensures that all clients observe consistent data updates atomically on all servers. However, such systems need to sacrifice availability when synchronization occurs. We propose a new consistency protocol, the observable atomic consistency protocol (OACP) to make writedominant applications

Realizable causalconsistent reversible choreographies for systems with firstinfirstout communication channels J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200521
Monika KapusKolarWe reengineer a pomsetbased abstract semantics (and the associated semantic constraints) recently proposed for compositionally specified choreographies for systems of components communicating over firstinfirstout channels. We prove that the original semantics overspecifies components' behaviour and that for this (but not only this) reason, the original semantic constraints are insufficient for

Specifying with syntactic theory functors J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200402
Magne Haveraaen, Markus RoggenbachWe propose a framework, syntactic theory functors (STFs), for creating syntactic structuring mechanisms for specification languages. Good support for common reuse patterns is important for systematically developing specifications for large systems. Though immaterial to foundational theory, lack of support otherwise causes lengthy writing of boilerplate code or repeated adaptation from one context to

Instantaneous reactiontime in dynamic consistency checking of conditional simple temporal networks J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200319
Massimo Cairo, Carlo Comin, Romeo RizziConditional Simple Temporal Networks (CSTNs) is a constraint based graphformalism for conditional temporal planning. Three notions of consistency arise for CSTNs: weak, strong, and dynamic. DynamicConsistency (DC) is the most interesting notion, but it is also the most challenging. In order to address the DCChecking problem, Comin and Rizzi [12] introduced εDC (a refined, more realistic, notion

Intervalvalued fuzzy reasoning method based on similarity measure J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200312
Minxia Luo, Yajing Wang, Ruirui ZhaoIn this paper, a new similarity measure of intervalvalued fuzzy sets is introduced. Meanwhile, intervalvalued fuzzy reasoning method based on similarity measure for Fuzzy Modus Ponens and Fuzzy Modus Tollens are proposed, and the solutions of intervalvalued fuzzy reasoning method based on similarity measure are given. Moreover, the robustness of intervalvalued fuzzy reasoning method based on similarity

Twenty years of coordination technologies: COORDINATION contribution to the state of art J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200224
Giovanni Ciatto, Stefano Mariani, Giovanna Di Marzo Serugendo, Maxime Louvel, Andrea Omicini, Franco ZambonelliComplexity of intra and intersystems interactions is steadily increasing in modern application scenarios such as the Internet of Things, therefore coordination technologies are required to take a crucial step forward towards full maturity. In this paper we look back at the history of the COORDINATION conference series with the goal of shedding light on the current status of the coordination technologies

On the expressiveness of multiplicities in databased coordination languages J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200219
Denis Darquennes, JeanMarie Jacquet, Isabelle LindenCoordination languages and models have proved to be well suited to program the interaction of a wide variety of dataintensive distributed systems. Building upon previous work by the authors, this paper aims at exploring how the addition of multiplicity information to tuples increases the expressiveness of Lindalike languages. It proposes a set of languages integrating the multiplicity in different

The complexity of identifying characteristic formulae J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200217
Luca Aceto, Antonis Achilleos, Adrian Francalanza, Anna IngólfsdóttirWe introduce the completeness problem for Modal Logic (possibly with fixpoint operators) and examine its complexity. A formula is called complete, if any two satisfying processes are bisimilar. The completeness problem is closely connected to the characterization problem, which asks whether a given formula characterizes a given process up to bisimulation equivalence. We discover that completeness,

A verified proof checker for higherorder logic J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200217
Oskar AbrahamssonWe present a computer program for checking proofs in higherorder logic (HOL) that is verified to accept only valid proofs. The proof checker is defined as functions in HOL and synthesized to CakeML code, and uses the Candle theorem prover kernel to check logical inferences. The checker reads proofs in the OpenTheory article format, which means proofs produced by various HOL proof assistants are supported

Process calculi as a tool for studying coordination, contracts and session types J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200217
Mario Bravetti, Gianluigi ZavattaroWe recall techniques, mainly based on the theory of process calculi, that we used to prove results in twenty years of research, spanning across the old and the new millennium, on the expressiveness of coordination languages and on behavioural contracts for ServiceOriented Computing. Then, we show how such techniques recently contributed to the clarification of aspects that were unclear about session

Spreading nets: A uniform approach to unfoldings J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200214
G. Michele Pinna, Eric FabreThis paper is devoted to the study of the notion of spread net. A spread net is a (safe) Petri nets where each place is annotated with some information, taken from a suitable information domain, about how such place can get marked. Spread nets generalize various kinds of nets used to represent the non sequential behaviours of a safe net, like unfoldings, merged processes or trellis processes. The spreading

Preface to the special issue on the 11th International Conference on Graph Transformation J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20200124
Leen Lambers, Jens WeberThis special issue contains extended versions of four selected papers from the 11th International Conference on Graph Transformation (ICGT 2018). The articles cover a tool for computing core graphs via SAT/SMT solvers (graph language definition), graph transformation through graph surfing in reaction systems (a new graph transformation formalism), the essence and initiality of conflicts in Madhesive

Determinizing monitors for HML with recursion J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20191231
Luca Aceto, Antonis Achilleos, Adrian Francalanza, Anna Ingólfsdóttir, Sævar Örn KjartanssonWe examine the determinization of monitors for HML with recursion. We demonstrate that every monitor is equivalent to a deterministic one, which is at most doubly exponential in size with respect to the original monitor. When monitors are described as CCSlike processes, this doubly exponential bound is optimal. When (deterministic) monitors are described as finite automata (or as their labeled transition

Abstracting models of strong normalization for classical calculi J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20191220
Paul Downen, Philip JohnsonFreyd, Zena M. AriolaModern programming languages have effects and mix multiple calling conventions, and their core calculi should too. We characterize calling conventions by their “substitution discipline” that says what variables stand for, and design calculi for mixing disciplines in a single program. Building on variations of the reducibility candidates method, including biorthogonality and symmetric candidates which

Ground confluence of ordersorted conditional specifications modulo axioms J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20191126
Francisco Durán, José Meseguer, Camilo RochaTerminating functional programs should be deterministic, i.e., should evaluate to a unique result, regardless of the evaluation order. For equational functional programs such determinism is exactly captured by the ground confluence property. For operationally terminating conditional equations this is equivalent to ground local confluence, which follows from local confluence. Checking local confluence

A formal approach to the engineering of domainspecific distributed systems J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20191126
Rocco De Nicola, Gianluigi Ferrari, Rosario Pugliese, Francesco TiezziWe review some results regarding specification, programming and verification of different classes of distributed systems which stemmed from the research of the Concurrency and Mobility Group at University of Firenze. More specifically, we examine the distinguishing features of networkaware programming, serviceoriented computing, autonomic computing, and collective adaptive systems programming. We

A partial evaluation framework for ordersorted equational programs modulo axioms J. Log. Algebr. Methods Program. (IF 0.685) Pub Date : 20191031
M. Alpuente, A. CuencaOrtega, S. Escobar, J. MeseguerPartial evaluation is a powerful and general program optimization technique with many successful applications. Existing PE schemes do not apply to expressive rulebased languages like Maude, CafeOBJ, OBJ, ASF+SDF, and ELAN, which support: 1) rich type structures with sorts, subsorts, and overloading; and 2) equational rewriting modulo various combinations of axioms such as associativity, commutativity