Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–17 of 17 results for author: Praveen, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.16637  [pdf, other

    cs.LO

    Formally Verifying the Safety of Pipelined Moonshot Consensus Protocol

    Authors: M. Praveen, Raghavendra Ramesh, Isaac Doidge

    Abstract: Decentralized Finance (DeFi) has emerged as a contemporary competitive as well as complementary to traditional centralized finance systems. As of 23rd January 2024, per Defillama approximately USD 55 billion is the total value locked on the DeFi applications on all blockchains put together. A Byzantine Fault Tolerant (BFT) State Machine Replication (SMR) protocol, popularly known as the consensu… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    ACM Class: C.2.2; F.4.1

  2. arXiv:2311.15431  [pdf, ps, other

    cs.FL

    On the piecewise complexity of words and periodic words

    Authors: M. Praveen, Philippe Schnoebelen, Isa Vialard, Julien Veron

    Abstract: The piecewise complexity $h(u)$ of a word is the minimal length of subwords needed to exactly characterise $u$. Its piecewise minimality index $ρ(u)$ is the smallest length $k$ such that $u$ is minimal among its order-$k$ class $[u]_k$ in Simon's congruence. We study these two measures and provide efficient algorithms for computing $h(u)$ and $ρ(u)$. We also provide efficient algorithms for the… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

  3. arXiv:2209.04244  [pdf, ps, other

    cs.FL

    Window Expressions for Stream Data Processing

    Authors: M. Praveen, S. Hitarth

    Abstract: Traditional ways of storing and querying data do not work well in scenarios where data is being generated continuously and quick decisions need to be taken. For example, in hospital intensive care units, signals from multiple devices need to be monitored and the occurrence of any anomaly should raise alarms immediately. A typical design would take the average from a window of say 10 seconds (time-… ▽ More

    Submitted 1 March, 2024; v1 submitted 9 September, 2022; originally announced September 2022.

  4. arXiv:2207.06708  [pdf, other

    cs.LO cs.FL math.LO

    Realizability Problem for Constraint LTL

    Authors: Ashwin Bhaskar, M. Praveen

    Abstract: Constraint linear-time temporal logic (CLTL) is an extension of LTL that is interpreted on sequences of valuations of variables over an infinite domain. The atomic formulas are interpreted as constraints on the valuations. The atomic formulas can constrain valuations over a range of positions along a sequence, with the range being bounded by a parameter depending on the formula. The satisfiability… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: 26 pages

    ACM Class: F.4.1

  5. arXiv:2005.02596  [pdf, other

    cs.FL

    What You Must Remember When Transforming Datawords

    Authors: M. Praveen

    Abstract: Streaming Data String Transducers (SDSTs) were introduced to model a class of imperative and a class of functional programs, manipulating lists of data items. These can be used to write commonly used routines such as insert, delete and reverse. SDSTs can handle data values from a potentially infinite data domain. The model of Streaming String Transducers (SSTs) is the fragment of SDSTs where the i… ▽ More

    Submitted 13 December, 2020; v1 submitted 6 May, 2020; originally announced May 2020.

  6. arXiv:1909.11369  [pdf, ps, other

    cs.LO cs.DB

    Query Preserving Watermarking Schemes for Locally Treelike Databases

    Authors: Agnishom Chattopadhyay, M. Praveen

    Abstract: Watermarking is a way of embedding information in digital documents. Much research has been done on techniques for watermarking relational databases and XML documents, where the process of embedding information shouldn't distort query outputs too much. Recently, techniques have been proposed to watermark some classes of relational structures preserving first-order and monadic second order queries.… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  7. Verification of Flat FIFO Systems

    Authors: Alain Finkel, M. Praveen

    Abstract: The decidability and complexity of reachability problems and model-checking for flat counter machines have been explored in detail. However, only few results are known for flat (lossy) FIFO machines, only in some particular cases (a single loop or a single bounded expression). We prove, by establishing reductions between properties, and by reducing SAT to a subset of these properties that many ver… ▽ More

    Submitted 12 October, 2020; v1 submitted 20 August, 2019; originally announced August 2019.

    MSC Class: Theory of computation - Parallel computing models

    Journal ref: Logical Methods in Computer Science, Volume 16, Issue 4 (October 14, 2020) lmcs:5999

  8. On Functions Weakly Computable by Pushdown Petri Nets and Related Systems

    Authors: J. Leroux, M. Praveen, Ph. Schnoebelen, G. Sutre

    Abstract: We consider numerical functions weakly computable by grammar-controlled vector addition systems (GVASes, a variant of pushdown Petri nets). GVASes can weakly compute all fast growing functions $F_α$ for $α<ω^ω$, hence they are computationally more powerful than standard vector addition systems. On the other hand they cannot weakly compute the inverses $F_α^{-1}$ or indeed any sublinear function. T… ▽ More

    Submitted 17 December, 2019; v1 submitted 8 April, 2019; originally announced April 2019.

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 4 (December 18, 2019) lmcs:5362

  9. Playing with Repetitions in Data Words Using Energy Games

    Authors: Diego Figueira, Anirban Majumdar, M. Praveen

    Abstract: We introduce two-player games which build words over infinite alphabets, and we study the problem of checking the existence of winning strategies. These games are played by two players, who take turns in choosing valuations for variables ranging over an infinite data domain, thus generating multi-attributed data words. The winner of the game is specified by formulas in the Logic of Repeating Value… ▽ More

    Submitted 2 July, 2020; v1 submitted 21 February, 2018; originally announced February 2018.

    ACM Class: F.1.1; F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 16, Issue 3 (July 3, 2020) lmcs:4898

  10. Reasoning about Data Repetitions with Counter Systems

    Authors: Stephane Demri, Diego Figueira, M Praveen

    Abstract: We study linear-time temporal logics interpreted over data words with multiple attributes. We restrict the atomic formulas to equalities of attribute values in successive positions and to repetitions of attribute values in the future or past. We demonstrate correspondences between satisfiability problems for logics and reachability-like decision problems for counter systems. We show that allowing/… ▽ More

    Submitted 29 July, 2016; v1 submitted 11 April, 2016; originally announced April 2016.

    Comments: 54 pages

    ACM Class: F.3.1; F.4.1; F.4.3

    Journal ref: Logical Methods in Computer Science, Volume 12, Issue 3 (August 4, 2016) lmcs:1645

  11. arXiv:1603.00658  [pdf, ps, other

    cs.LO cs.DB cs.FL

    Nesting Depth of Operators in Graph Database Queries: Expressiveness Vs. Evaluation Complexity

    Authors: M. Praveen, B. Srivathsan

    Abstract: Designing query languages for graph structured data is an active field of research, where expressiveness and efficient algorithms for query evaluation are conflicting goals. To better handle dynamically changing data, recent work has been done on designing query languages that can compare values stored in the graph database, without hard coding the values in the query. The main idea is to allow va… ▽ More

    Submitted 5 May, 2016; v1 submitted 2 March, 2016; originally announced March 2016.

    Comments: Improvements from ICALP 2016 review comments

    ACM Class: F.1.3; F.4.3; H.2.3

  12. arXiv:1412.4463  [pdf, ps, other

    cs.DB

    Defining relations on graphs: how hard is it in the presence of node partitions?

    Authors: M. Praveen, B. Srivathsan

    Abstract: Designing query languages for graph structured data is an active field of research. Evaluating a query on a graph results in a relation on the set of its nodes. In other words, a query is a mechanism for defining relations on a graph. Some relations may not be definable by any query in a given language. This leads to the following question: given a graph, a query language and a relation on the gra… ▽ More

    Submitted 27 April, 2015; v1 submitted 15 December, 2014; originally announced December 2014.

    Comments: Small corrections based on reviews from PODS 2015, results unchanged

    ACM Class: F.4.3, H.2.3

  13. arXiv:1301.6572  [pdf, ps, other

    cs.LO

    ω-Petri nets

    Authors: Gilles Geeraerts, Alexander Heußner, M. Praveen, Jean-François Raskin

    Abstract: We introduce ω-Petri nets (ωPN), an extension of plain Petri nets with ω-labeled input and output arcs, that is well-suited to analyse parametric concurrent systems with dynamic thread creation. Most techniques (such as the Karp and Miller tree or the Rackoff technique) that have been proposed in the setting of plain Petri nets do not apply directly to ωPN because ωPN define transition systems tha… ▽ More

    Submitted 28 January, 2013; originally announced January 2013.

    Comments: 37 pages, 6 figures, submitted

  14. arXiv:1109.5615  [pdf, ps, other

    cs.FL cs.CC cs.DS

    A Regularity Measure for Context Free Grammars

    Authors: M. Praveen

    Abstract: Parikh's theorem states that every Context Free Language (CFL) has the same Parikh image as that of a regular language. A finite state automaton accepting such a regular language is called a Parikh-equivalent automaton. In the worst case, the number of states in any non-deterministic Parikh-equivalent automaton is exponentially large in the size of the Context Free Grammar (CFG). We associate a re… ▽ More

    Submitted 26 September, 2011; originally announced September 2011.

    MSC Class: 68W01 ACM Class: F.2.2; F.4.2; F.4.3

  15. arXiv:1106.2122  [pdf, ps, other

    cs.LO cs.CC cs.DS cs.FL

    Parameterized complexity results for 1-safe Petri nets

    Authors: M. Praveen, Kamal Lodaya

    Abstract: We associate a graph with a 1-safe Petri net and study the parameterized complexity of various problems with parameters derived from the graph. With treewidth as the parameter, we give W[1]-hardness results for many problems about 1-safe Petri nets. As a corollary, this proves a conjecture of Downey et. al. about the hardness of some graph pebbling problems. We consider the parameter benefit depth… ▽ More

    Submitted 10 June, 2011; originally announced June 2011.

    Comments: Full version of the paper appearing in CONCUR 2011

    ACM Class: F.1.1; F.2.2; F.4.1

  16. Small Vertex Cover makes Petri Net Coverability and Boundedness Easier

    Authors: M. Praveen

    Abstract: The coverability and boundedness problems for Petri nets are known to be Expspace-complete. Given a Petri net, we associate a graph with it. With the vertex cover number k of this graph and the maximum arc weight W as parameters, we show that coverability and boundedness are in ParaPspace. This means that these problems can be solved in space O(ef(k,W)poly(n)), where ef(k,W) is some exponential fu… ▽ More

    Submitted 14 September, 2010; originally announced September 2010.

    Comments: Full version of the paper appearing in IPEC 2010

    MSC Class: 68R10 ACM Class: F.2.2; F.4.1

  17. Does Treewidth Help in Modal Satisfiability?

    Authors: M. Praveen

    Abstract: Many tractable algorithms for solving the Constraint Satisfaction Problem (CSP) have been developed using the notion of the treewidth of some graph derived from the input CSP instance. In particular, the incidence graph of the CSP instance is one such graph. We introduce the notion of an incidence graph for modal logic formulae in a certain normal form. We investigate the parameterized complexity… ▽ More

    Submitted 11 January, 2011; v1 submitted 12 June, 2010; originally announced June 2010.

    Comments: Full version of the paper appearing in MFCS 2010. Change from v1: improved section 5 to avoid exponential blow-up in formula size

    ACM Class: F.2.2; F.4.1