. We present a method for characterizing the least fixed-points of a certain class of Datalog programs in Presburger arithmetic. The method consists in applying a set of rules that transform general computation paths into "canonical" ones. We use the method for treating the problem of reachability in the field of Petri nets, thus relating some unconnected results and extending them in several directions. Keywords: decomposition, linear arithmetic, least fixed-point, Petri nets, reachability set 1. Introduction The problem of computing fixpoints for arithmetical programs has been investigated from the seventies in an imperative framework. A typical application was to check whether or not array bounds were violated. A pionneering ...
Data structures often use an integer variable to keep track of the number of elements they store. An...
We show that the ellipsoid method for solving linear programs can be implemented in a way that respe...
. We present in this paper a method combining path decomposition and bottom-up computation features ...
In this paper we investigate the theoretical foundation of a new bottom-up semantics for linear logi...
AbstractWe address the question of when the structure of a Datalog program with negation guarantees ...
Motivated by applications in declarative data analysis, we study $Datalog$Z—an extension of positive...
AbstractWe define a new decidable logic for expressing and checking invariants of programs that mani...
This report features an introduction to lattice- and fixpoint theory and a survey of methods and rec...
Abstract. We show that the downward-closure of a Petri net language is effectively computable. This ...
Abstract. In recent work, the second and third authors introduced a technique for reachability check...
AbstractAs an approach to optimization, this paper examines the decomposition of chain Datalog progr...
Non-deterministic computations are conventionally modelled by lists of their outcomes. This approach...
We define a new decidable logic for expressing and checking invariants of programs that manipulate d...
McMillan has presented a deadlock detection method for Petri nets based on finite complete prefixes...
AbstractFrom a declarative programming point of view, Manna and Shamir's optimal fixedpoint semantic...
Data structures often use an integer variable to keep track of the number of elements they store. An...
We show that the ellipsoid method for solving linear programs can be implemented in a way that respe...
. We present in this paper a method combining path decomposition and bottom-up computation features ...
In this paper we investigate the theoretical foundation of a new bottom-up semantics for linear logi...
AbstractWe address the question of when the structure of a Datalog program with negation guarantees ...
Motivated by applications in declarative data analysis, we study $Datalog$Z—an extension of positive...
AbstractWe define a new decidable logic for expressing and checking invariants of programs that mani...
This report features an introduction to lattice- and fixpoint theory and a survey of methods and rec...
Abstract. We show that the downward-closure of a Petri net language is effectively computable. This ...
Abstract. In recent work, the second and third authors introduced a technique for reachability check...
AbstractAs an approach to optimization, this paper examines the decomposition of chain Datalog progr...
Non-deterministic computations are conventionally modelled by lists of their outcomes. This approach...
We define a new decidable logic for expressing and checking invariants of programs that manipulate d...
McMillan has presented a deadlock detection method for Petri nets based on finite complete prefixes...
AbstractFrom a declarative programming point of view, Manna and Shamir's optimal fixedpoint semantic...
Data structures often use an integer variable to keep track of the number of elements they store. An...
We show that the ellipsoid method for solving linear programs can be implemented in a way that respe...
. We present in this paper a method combining path decomposition and bottom-up computation features ...