Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–26 of 26 results for author: Goharshady, A K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.03796  [pdf, other

    cs.LO cs.PL

    PolyHorn: A Polynomial Horn Clause Solver

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady, Mehrdad Karrabi, Milad Saadat, Maximilian Seeliger, Đorđe Žikelić

    Abstract: Polynomial Horn clauses with existentially and universally quantified variables arise in many problems of verification and program analysis. We present PolyHorn which is a tool for solving polynomial Horn clauses in which variables on both sides of the implication are real valued or unbounded integers. Our tool provides a unified framework for polynomial Horn clause solving problems that arise in… ▽ More

    Submitted 14 October, 2024; v1 submitted 7 August, 2024; originally announced August 2024.

  2. arXiv:2403.05386  [pdf, other

    cs.PL cs.LO

    Sound and Complete Witnesses for Template-based Verification of LTL Properties on Polynomial Programs

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady, Mehrdad Karrabi, Đorđe Žikelić

    Abstract: We study the classical problem of verifying programs with respect to formal specifications given in the linear temporal logic (LTL). We first present novel sound and complete witnesses for LTL verification over imperative programs. Our witnesses are applicable to both verification (proving) and refutation (finding bugs) settings. We then consider LTL formulas in which atomic propositions can be po… ▽ More

    Submitted 1 July, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2305.15104  [pdf, other

    cs.DS

    Automated Tail Bound Analysis for Probabilistic Recurrence Relations

    Authors: Yican Sun, Hongfei Fu, Krishnendu Chatterjee, Amir Kafshdar Goharshady

    Abstract: Probabilistic recurrence relations (PRRs) are a standard formalism for describing the runtime of a randomized algorithm. Given a PRR and a time limit $κ$, we consider the classical concept of tail probability $\Pr[T \ge κ]$, i.e., the probability that the randomized runtime $T$ of the PRR exceeds the time limit $κ$. Our focus is the formal analysis of tail bounds that aims at finding a tight asymp… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 46 pages, 15 figures

  4. arXiv:2303.13279  [pdf, other

    cs.DS cs.CC cs.DM

    Parameterized Algorithms for Topological Indices in Chemistry

    Authors: Giovanna K. Conrado, Amir K. Goharshady, Harshit J. Motwani, Sergei Novozhilov

    Abstract: We have developed efficient parameterized algorithms for the enumeration problems of graphs arising in chemistry. In particular, we have focused on the following problems: enumeration of Kekulé structures, computation of Hosoya index, computation of Merrifield-Simmons index, and computation of graph entropy based on matchings and independent sets. All these problems are known to be $\# P$-complete… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  5. Template-based Program Synthesis using Stellensätze

    Authors: Amir Kafshdar Goharshady, S. Hitarth, Fatemeh Mohammadi, Harshit J Motwani

    Abstract: Template-based synthesis, also known as sketching, is a localized approach to program synthesis in which the programmer provides not only a specification, but also a high-level ``sketch'' of the program. The sketch is basically a partial program that models the general intuition of the programmer, while leaving the low-level details as unimplemented ``holes''. The role of the synthesis engine is t… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

  6. arXiv:2110.09857  [pdf, other

    cs.CR cs.DM cs.GT

    Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain

    Authors: Amir Kafshdar Goharshady

    Abstract: Suppose that Alice plans to buy a physical good from Bob over a programmable Blockchain. Alice does not trust Bob, so she is not willing to pay before the good is delivered off-chain. Similarly, Bob does not trust Alice, so he is not willing to deliver the good before getting paid on-chain. Moreover, they are not inclined to use the services of a trusted third-party. Traditionally, such scenarios… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

    Comments: To appear in the IEEE International Conference on Blockchain (Blockchain 2021), Melbourne, Australia

  7. arXiv:2011.14617  [pdf, other

    cs.PL

    Quantitative Analysis of Assertion Violations in Probabilistic Programs

    Authors: Jinyi Wang, Yican Sun, Hongfei Fu, Krishnendu Chatterjee, Amir Kafshdar Goharshady

    Abstract: In this work, we consider the fundamental problem of deriving quantitative bounds on the probability that a given assertion is violated in a probabilistic program. We provide automated algorithms that obtain both lower and upper bounds on the assertion violation probability in exponential forms. The main novelty of our approach is that we prove new and dedicated fixed-point theorems which serve as… ▽ More

    Submitted 1 December, 2020; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: 25 pages

  8. arXiv:2008.00425  [pdf, other

    cs.PL cs.DS

    Concentration-Bound Analysis for Probabilistic Programs and Probabilistic Recurrence Relations

    Authors: Jinyi Wang, Yican Sun, Hongfei Fu, Mingzhang Huang, Amir Kafshdar Goharshady, Krishnendu Chatterjee

    Abstract: Analyzing probabilistic programs and randomized algorithms are classical problems in computer science. The first basic problem in the analysis of stochastic processes is to consider the expectation or mean, and another basic problem is to consider concentration bounds, i.e. showing that large deviations from the mean have small probability. Similarly, in the context of probabilistic programs and r… ▽ More

    Submitted 11 August, 2020; v1 submitted 2 August, 2020; originally announced August 2020.

    Comments: 28 pages

    ACM Class: F.3.1

  9. arXiv:2007.14259  [pdf

    cs.PL cs.LO cs.SE

    Inductive Reachability Witnesses

    Authors: Ali Asadi, Krishnendu Chatterjee, Hongfei Fu, Amir Kafshdar Goharshady, Mohammad Mahdavi

    Abstract: In this work, we consider the fundamental problem of reachability analysis over imperative programs with real variables. The reachability property requires that a program can reach certain target states during its execution. Previous works that tackle reachability analysis are either unable to handle programs consisting of general loops (e.g. symbolic execution), or lack completeness guarantees (e… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

  10. arXiv:2004.08828  [pdf, other

    cs.DS cs.DM

    Faster Algorithms for Quantitative Analysis of Markov Chains and Markov Decision Processes with Small Treewidth

    Authors: Ali Asadi, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Kiarash Mohammadi, Andreas Pavlogiannis

    Abstract: Discrete-time Markov Chains (MCs) and Markov Decision Processes (MDPs) are two standard formalisms in system analysis. Their main associated quantitative objectives are hitting probabilities, discounted sum, and mean payoff. Although there are many techniques for computing these objectives in general MCs/MDPs, they have not been thoroughly studied in terms of parameterized algorithms, particularly… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  11. arXiv:2001.11070  [pdf, other

    cs.DS cs.DM cs.SE

    Optimal and Perfectly Parallel Algorithms for On-demand Data-flow Analysis

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Rasmus Ibsen-Jensen, Andreas Pavlogiannis

    Abstract: Interprocedural data-flow analyses form an expressive and useful paradigm of numerous static analysis applications, such as live variables analysis, alias analysis and null pointers analysis. The most widely-used framework for interprocedural data-flow analysis is IFDS, which encompasses distributive data-flow functions over a finite domain. On-demand data-flow analyses restrict the focus of the a… ▽ More

    Submitted 14 April, 2020; v1 submitted 29 January, 2020; originally announced January 2020.

    Comments: A conference version appeared in ESOP 2020

  12. arXiv:1902.07986  [pdf

    cs.GT cs.CR cs.PL

    Probabilistic Smart Contracts: Secure Randomness on the Blockchain

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Arash Pourdamghani

    Abstract: In today's programmable blockchains, smart contracts are limited to being deterministic and non-probabilistic. This lack of randomness is a consequential limitation, given that a wide variety of real-world financial contracts, such as casino games and lotteries, depend entirely on randomness. As a result, several ad-hoc random number generation approaches have been developed to be used in smart co… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: Accepted to the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)

  13. arXiv:1902.04659  [pdf, other

    cs.PL

    Cost Analysis of Nondeterministic Probabilistic Programs

    Authors: Peixin Wang, Hongfei Fu, Amir Kafshdar Goharshady, Krishnendu Chatterjee, Xudong Qin, Wenjun Shi

    Abstract: We consider the problem of expected cost analysis over nondeterministic probabilistic programs, which aims at automated methods for analyzing the resource-usage of such programs. Previous approaches for this problem could only handle nonnegative bounded costs. However, in many scenarios, such as queuing networks or analysis of cryptocurrency protocols, both positive and negative costs are necessar… ▽ More

    Submitted 25 March, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: A conference version will appear in the 40th ACM Conference on Programming Language Design and Implementation (PLDI 2019)

  14. arXiv:1902.04373  [pdf, other

    cs.LO cs.PL

    Polynomial Invariant Generation for Non-deterministic Recursive Programs

    Authors: Krishnendu Chatterjee, Hongfei Fu, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady

    Abstract: We consider the classical problem of invariant generation for programs with polynomial assignments and focus on synthesizing invariants that are a conjunction of strict polynomial inequalities. We present a sound and semi-complete method based on positivstellensaetze, i.e. theorems in semi-algebraic geometry that characterize positive polynomials over a semi-algebraic set. To the best of our knowl… ▽ More

    Submitted 6 April, 2020; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: A conference version of this article appears in PLDI 2020

  15. arXiv:1901.06087  [pdf, other

    cs.LO cs.PL

    Modular Verification for Almost-Sure Termination of Probabilistic Programs

    Authors: Mingzhang Huang, Hongfei Fu, Krishnendu Chatterjee, Amir Kafshdar Goharshady

    Abstract: In this work, we consider the almost-sure termination problem for probabilistic programs that asks whether a given probabilistic program terminates with probability 1. Scalable approaches for program analysis often rely on modularity as their theoretical basis. In non-probabilistic programs, the classical variant rule (V-rule) of Floyd-Hoare logic provides the foundation for modular analysis. Exte… ▽ More

    Submitted 12 August, 2019; v1 submitted 18 January, 2019; originally announced January 2019.

    Comments: Accepted to OOPSLA 2019

  16. arXiv:1806.03108  [pdf, other

    cs.CR cs.GT cs.PL

    Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Rasmus Ibsen-Jensen, Yaron Velner

    Abstract: Crypto-currencies are digital assets designed to work as a medium of exchange, e.g., Bitcoin, but they are susceptible to attacks (dishonest behavior of participants). A framework for the analysis of attacks in crypto-currencies requires (a) modeling of game-theoretic aspects to analyze incentives for deviation from honest behavior; (b) concurrent interactions between participants; and (c) analysi… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

    Comments: Accepted to CONCUR 2018

  17. arXiv:1805.10672  [pdf, ps, other

    cs.AI math.LO

    A note on belief structures and S-approximation spaces

    Authors: Ali Shakiba, Amir Kafshdar Goharshady, MohammadReza Hooshmandasl, Mohsen Alambardar Meybodi

    Abstract: We study relations between evidence theory and S-approximation spaces. Both theories have their roots in the analysis of Dempster's multivalued mappings and lower and upper probabilities and have close relations to rough sets. We show that an S-approximation space, satisfying a monotonicity condition, can induce a natural belief structure which is a fundamental block in evidence theory. We also de… ▽ More

    Submitted 28 March, 2020; v1 submitted 27 May, 2018; originally announced May 2018.

    Comments: 12 pages

    MSC Class: 03B42

    Journal ref: Iranian Journal of Mathematical Sciences and Informatics (IJMSI). 2020; 15 (2):117-128

  18. arXiv:1805.09104  [pdf, other

    cs.CR cs.SE

    Secure Credit Reporting on the Blockchain

    Authors: Amir Kafshdar Goharshady, Ali Behrouz, Krishnendu Chatterjee

    Abstract: We present a secure approach for maintaining and reporting credit history records on the Blockchain. Our approach removes third-parties such as credit reporting agencies from the lending process and replaces them with smart contracts. This allows customers to interact directly with the lenders or banks while ensuring the integrity, unmalleability and privacy of their credit data. Most importantly,… ▽ More

    Submitted 24 May, 2018; v1 submitted 23 May, 2018; originally announced May 2018.

  19. arXiv:1804.08984  [pdf, ps, other

    cs.PL cs.AI math.PR

    Computational Approaches for Stochastic Shortest Path on Succinct MDPs

    Authors: Krishnendu Chatterjee, Hongfei Fu, Amir Kafshdar Goharshady, Nastaran Okati

    Abstract: We consider the stochastic shortest path (SSP) problem for succinct Markov decision processes (MDPs), where the MDP consists of a set of variables, and a set of nondeterministic rules that update the variables. First, we show that several examples from the AI literature can be modeled as succinct MDPs. Then we present computational approaches for upper and lower bounds for the SSP problem: (a)~for… ▽ More

    Submitted 17 July, 2018; v1 submitted 24 April, 2018; originally announced April 2018.

  20. arXiv:1801.03367  [pdf, other

    cs.PL

    Quantitative Analysis of Smart Contracts

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Yaron Velner

    Abstract: Smart contracts are computer programs that are executed by a network of mutually distrusting agents, without the need of an external trusted authority. Smart contracts handle and transfer assets of considerable value (in the form of crypto-currency like Bitcoin). Hence, it is crucial that their implementation is bug-free. We identify the utility (or expected payoff) of interacting with such smart… ▽ More

    Submitted 17 June, 2018; v1 submitted 10 January, 2018; originally announced January 2018.

    Comments: ESOP 2018

  21. arXiv:1712.09692  [pdf, other

    math.CO cs.DM math.PR

    An Efficient Algorithm for Computing Network Reliability in Small Treewidth

    Authors: Amir Kafshdar Goharshady, Fatemeh Mohammadi

    Abstract: We consider the classic problem of Network Reliability. A network is given together with a source vertex, one or more target vertices, and probabilities assigned to each of the edges. Each edge appears in the network with its associated probability and the problem is to determine the probability of having at least one source-to-target path. This problem is known to be NP-hard. We present a linea… ▽ More

    Submitted 19 March, 2019; v1 submitted 27 December, 2017; originally announced December 2017.

    Comments: 14 pages

  22. arXiv:1706.05248  [pdf

    math.CO cs.DM cs.DS

    [1, 2]-sets and [1, 2]-total Sets in Trees with Algorithms

    Authors: Amir Kafshdar Goharshady, Mohammad Reza Hooshmandasl, Mohsen Alambardar Meybodi

    Abstract: A set $S \subseteq V$ of the graph $G = (V, E)$ is called a $[1, 2]$-set of $G$ if any vertex which is not in $S$ has at least one but no more than two neighbors in $S$. A set $S \subseteq V$ is called a $[1, 2]$-total set of $G$ if any vertex of $G$, no matter in $S$ or not, is adjacent to at least one but not more than two vertices in $S$. In this paper we introduce a linear algorithm for findin… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

  23. arXiv:1705.00317  [pdf, ps, other

    cs.PL

    Non-polynomial Worst-Case Analysis of Recursive Programs

    Authors: Krishnendu Chatterjee, Hongfei Fu, Amir Kafshdar Goharshady

    Abstract: We study the problem of developing efficient approaches for proving worst-case bounds of non-deterministic recursive programs. Ranking functions are sound and complete for proving termination and worst-case bounds of nonrecursive programs. First, we apply ranking functions to recursion, resulting in measure functions. We show that measure functions provide a sound and complete approach to prove wo… ▽ More

    Submitted 30 April, 2017; originally announced May 2017.

    Comments: 54 Pages, Full Version to CAV 2017

  24. arXiv:1604.07169  [pdf, ps, other

    cs.PL

    Termination Analysis of Probabilistic Programs through Positivstellensatz's

    Authors: Krishnendu Chatterjee, Hongfei Fu, Amir Kafshdar Goharshady

    Abstract: We consider nondeterministic probabilistic programs with the most basic liveness property of termination. We present efficient methods for termination analysis of nondeterministic probabilistic programs with polynomial guards and assignments. Our approach is through synthesis of polynomial ranking supermartingales, that on one hand significantly generalizes linear ranking supermartingales and on t… ▽ More

    Submitted 25 April, 2016; originally announced April 2016.

    Comments: A conference version will appear in CAV 2016

  25. arXiv:1602.00998  [pdf, other

    math.AT cs.DM

    A combinatorial approach to certain topological spaces based on minimum complement S-approximation spaces

    Authors: M. R. Hooshmandasl, M. Alambardar Meybodi, A. K. Goharshady, A. Shakiba

    Abstract: An S-approximation space is a novel approach to study systems with uncertainty that are not expressible in terms of inclusion relations. In this work, we further examined these spaces, mostly from a topological point of view by a combinatorial approach. This work also identifies a subclass of these approximation spaces, called $S_\mathcal{MC}$-approximations. Topological properties of this subclas… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: This paper is presented in 8th International Seminar on Geometry and Topology at Amirkabir University of Technology (Iran)

    MSC Class: 54F99; 68P01

  26. arXiv:1510.07565  [pdf, other

    cs.PL cs.DS

    Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components

    Authors: Krishnendu Chatterjee, Amir Kafshdar Goharshady, Rasmus Ibsen-Jensen, Andreas Pavlogiannis

    Abstract: We study algorithmic questions for concurrent systems where the transitions are labeled from a complete, closed semiring, and path properties are algebraic with semiring operations. The algebraic path properties can model dataflow analysis problems, the shortest path problem, and many other natural problems that arise in program analysis. We consider that each component of the concurrent system is… ▽ More

    Submitted 26 October, 2015; originally announced October 2015.

    ACM Class: F.3.2