International audienceTree Walking Automata (TWA) have lately received renewed interest thanks to their tight connection to XML. This paper introduces the notion of tree overloops, which is closely related to tree loops, and investigates the use of both for the following common operations on TWA: testing membership, transformation into a Bottom-Up Tree Automaton (BUTA), and testing emptiness. Notably, we argue that transformation into a BUTA is slightly less straightforward than was assumed, show that using overloops yields much smaller BUTA in the deterministic case, and provide a polynomial over-approximation of this construction which detects emptiness with surprising accuracy against randomly generated TWA
The pebble tree automaton and the pebble tree transducer are enhanced by additionally allowing an un...
Two variants of pebble tree-walking automata on binary trees are considered that were introduced in ...
International audienceThis paper describes an effective verification procedure for imperative progra...
International audienceTree-Walking Automata (TWA) have lately received renewed interest thanks to th...
AbstractTree-Walking Automata (TWA) have lately received renewed interest thanks to their tight conn...
International audienceTree-Walking Automata (TWA) have lately received renewed interest thanks to th...
International audienceTree Walking Automata (TWA) have lately received renewed interest thanks to th...
Abstract. Tree-walking automata (TWAs) recently received new attention in the fields of formal langu...
AbstractTree-walking automata (TWAs) recently received new attention in the fields of formal languag...
AbstractAlternating tree automata and AND/OR graphs provide elegant formalisms that enable branching...
International audienceTree automata with one memory have been introduced in 2001. They generalize bo...
Tree automata with one memory have been introduced in 2001. They generalizeboth pushdown (word) auto...
We consider various kinds of deterministic tree-walking automata, with and without pebbles, over ran...
International audienceThis paper describes a verification framework for Hoare-style pre-and post-con...
We consider various kinds of deterministic tree-walking automata, with and without pebbles, over ran...
The pebble tree automaton and the pebble tree transducer are enhanced by additionally allowing an un...
Two variants of pebble tree-walking automata on binary trees are considered that were introduced in ...
International audienceThis paper describes an effective verification procedure for imperative progra...
International audienceTree-Walking Automata (TWA) have lately received renewed interest thanks to th...
AbstractTree-Walking Automata (TWA) have lately received renewed interest thanks to their tight conn...
International audienceTree-Walking Automata (TWA) have lately received renewed interest thanks to th...
International audienceTree Walking Automata (TWA) have lately received renewed interest thanks to th...
Abstract. Tree-walking automata (TWAs) recently received new attention in the fields of formal langu...
AbstractTree-walking automata (TWAs) recently received new attention in the fields of formal languag...
AbstractAlternating tree automata and AND/OR graphs provide elegant formalisms that enable branching...
International audienceTree automata with one memory have been introduced in 2001. They generalize bo...
Tree automata with one memory have been introduced in 2001. They generalizeboth pushdown (word) auto...
We consider various kinds of deterministic tree-walking automata, with and without pebbles, over ran...
International audienceThis paper describes a verification framework for Hoare-style pre-and post-con...
We consider various kinds of deterministic tree-walking automata, with and without pebbles, over ran...
The pebble tree automaton and the pebble tree transducer are enhanced by additionally allowing an un...
Two variants of pebble tree-walking automata on binary trees are considered that were introduced in ...
International audienceThis paper describes an effective verification procedure for imperative progra...