Skip to main content

Showing 1–8 of 8 results for author: Boreale, M

Searching in archive cs. Search in all archives.
.
  1. An implicit function theorem for the stream calculus

    Authors: Michele Boreale, Luisa Collodi, Daniele Gorla

    Abstract: In the context of the stream calculus, we present an Implicit Function Theorem (IFT) for polynomial systems, and discuss its relations with the classical IFT from calculus. In particular, we demonstrate the advantages of the stream IFT from a computational point of view, and provide a few example applications where its use turns out to be valuable.

    Submitted 17 June, 2024; v1 submitted 21 March, 2023; originally announced March 2023.

    Journal ref: Logical Methods in Computer Science, Volume 20, Issue 2 (June 18, 2024) lmcs:11103

  2. Algebra and coalgebra of stream products

    Authors: Michele Boreale, Daniele Gorla

    Abstract: We study connections among polynomials, differential equations and streams over a field K, in terms of algebra and coalgebra. We first introduce the class of (F,G)-products on streams, those where the stream derivative of a product can be expressed as a polynomial of the streams themselves and their derivatives. Our first result is that, for every (F,G)-product, there is a canonical way to constru… ▽ More

    Submitted 9 July, 2021; originally announced July 2021.

    Journal ref: Proc. of CONCUR, LIPIcs, Volume 203, pp. 19:1-19:17, 2021

  3. Approximate Model Counting, Sparse XOR Constraints and Minimum Distance

    Authors: Michele Boreale, Daniele Gorla

    Abstract: The problem of counting the number of models of a given Boolean formula has numerous applications, including computing the leakage of deterministic programs in Quantitative Information Flow. Model counting is a hard, #P-complete problem. For this reason, many approximate counters have been developed in the last decade, offering formal guarantees of confidence and accuracy. A popular approach is ba… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

    Journal ref: Lecture Notes in Computer Science, vol 11760, pp 363-378, 2019

  4. Algebra, coalgebra, and minimization in polynomial differential equations

    Authors: Michele Boreale

    Abstract: We consider reasoning and minimization in systems of polynomial ordinary differential equations (ode's). The ring of multivariate polynomials is employed as a syntax for denoting system behaviours. We endow this set with a transition system structure based on the concept of Lie-derivative, thus inducing a notion of L-bisimulation. We prove that two states (variables) are L-bisimilar if and only if… ▽ More

    Submitted 14 February, 2019; v1 submitted 23 October, 2017; originally announced October 2017.

    Comments: 27 pages, extended and revised version of FOSSACS 2017 paper

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 1 (February 15, 2019) lmcs:4009

  5. Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial ODEs

    Authors: Michele Boreale

    Abstract: A system of polynomial ordinary differential equations (ODEs) is specified via a vector of multivariate polynomials, or vector field, $F$. A safety assertion $ψ\rightarrow[F]φ$ means that the trajectory of the system will lie in a subset $φ$ (the postcondition) of the state-space, whenever the initial state belongs to a subset $ψ$ (the precondition). We consider the case when $φ$ and $ψ$ are algeb… ▽ More

    Submitted 29 March, 2020; v1 submitted 17 August, 2017; originally announced August 2017.

    Comments: 19 pages

    Report number: DISIA WORKING PAPER 2018/03 ACM Class: F.3.1

    Journal ref: Science of Computer Programming 193 (2020) 102441

  6. Quantitative information flow under generic leakage functions and adaptive adversaries

    Authors: M. Boreale, Francesca Pampaloni

    Abstract: We put forward a model of action-based randomization mechanisms to analyse quantitative information flow (QIF) under generic leakage functions, and under possibly adaptive adversaries. This model subsumes many of the QIF models proposed so far. Our main contributions include the following: (1) we identify mild general conditions on the leakage function under which it is possible to derive general… ▽ More

    Submitted 9 November, 2015; v1 submitted 21 July, 2015; originally announced July 2015.

    Comments: Revised and extended version of conference paper with the same title appeared in Proc. of FORTE 2014, LNCS

    Journal ref: Logical Methods in Computer Science, Volume 11, Issue 4 (November 10, 2015) lmcs:1606

  7. arXiv:0910.4420   

    cs.CR cs.LO cs.PL

    Proceedings 7th International Workshop on Security Issues in Concurrency

    Authors: Michele Boreale, Steve Kremer

    Abstract: This volume contains the proceedings of the 7th Workshop on Security Issues in Concurrency (SecCo'09). The workshop was held in Bologna, Italy on September 5th 2009, as a satellite workshop of CONCUR'09. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on com… ▽ More

    Submitted 22 October, 2009; originally announced October 2009.

    Journal ref: EPTCS 7, 2009

  8. arXiv:cs/0610137  [pdf, ps, other

    cs.LO cs.DC

    A Concurrent Calculus with Atomic Transactions

    Authors: Lucia Acciai, Michele Boreale, Silvano Dal Zilio

    Abstract: The Software Transactional Memory (STM) model is an original approach for controlling concurrent accesses to ressources without the need for explicit lock-based synchronization mechanisms. A key feature of STM is to provide a way to group sequences of read and write actions inside atomic blocks, similar to database transactions, whose whole effect should occur atomically. In this paper, we inves… ▽ More

    Submitted 24 October, 2006; originally announced October 2006.

    Comments: 29 pages