### Table 5 provides a succinct summary of the various indicators of some

1998

### Table 1: Complexity results for succinct representations. plan evaluation plan existence reference

1997

"... In PAGE 4: ... 1.6 SUMMARY OF RESULTS Table1 summarizes our results, which are explained in more detail in later sections. Table 2 summarizes a set of results for at domains; these are described in our extended technical report (Goldsmith, Littman, amp; Mundhenk 1997).... ..."

Cited by 20

### Table 1: Complexity results for succinct representations. plan evaluation plan existence reference

1997

"... In PAGE 4: ... 1.6 SUMMARY OF RESULTS Table1 summarizes our results, which are explained in more detail in later sections. Table 2 summarizes a set of results for at domains; these are described in our extended technical report (Goldsmith, Littman, amp; Mundhenk 1997).... ..."

Cited by 20

### Table 3. Succinct ow logic for the functional fragment.

1998

"... In PAGE 6: ... We express this as follows: (Rd F ; Rc F ; MF ; SF ; WF ) satis es R; M e : S1 ! S2 amp; W Here the proposed solution consists of the ve caches of Table 2 and the entities R; M; S1; S2 and W: R 2 d Env is the environment in which e is to be analysed, M 2 P(Mem) is the set of contexts in which e is to be analysed, S1 2 d Store is the store that is possible immediately before e, S2 2 d Store is the store that is possible immediately after e, and W 2 c Val is the value that e can evaluate to. Since the ve caches of Table 2 remain \constant quot; throughout the veri cation we shall dispense with listing them when de ning the \ quot; relation in Table3 . Note that the clauses are de ned compositionally and hence clearly are well-de ned.... In PAGE 6: ... Given the caches of Example 4 we may verify the following formula for the program of Example 1 [ ]; f g program : [ ] ! [ ] amp; f( ; (y; 3))g re ecting that the initial environment is empty, that the initial context is the empty call string, that the program does not manipulate the store (which hence is empty) and that the nal value is described by f( ; (y; 3))g. The veri cation will amount to a proof using the clauses of Table3 as rules and axioms; if successful, the proof and the caches constitute the analysis of the program. 2 The clause for variables merely demands that the store after x equals the store possible before x and that the value associated with x in the environment equals... In PAGE 8: ... Containments versus equalities. Since the speci cation in Table3 is concerned with verifying whether or not a proposed solution is acceptable it is sensible that the clause for function application employs a containment like takek(l; M) MF ( ) rather than an equality like takek(l; M) = MF ( ). The reason is that there might be other instances of the clause where the label of the application... In PAGE 9: ... In fact it would be incorrect to replace the containment by an equality: if M 6 = ;, k gt; 0 and li1 6 = li2 then it is impossible to obtain takek(li; M) = MF ( ) for all i. Although the clauses in Table3 contain no explicit equalities they do contain a lot of implicit equalities because the same ow variable is used more than once in the same clause. One can avoid this by introducing new variables and then linking them explicitly by containments as illustrated below.... In PAGE 10: ...F ( )dXl dc(M; W1; )e v Rc F( ) ^ takek(l; M) MF( ) for some R1; M1; S11; S12; W1; R2; M2; S21; S22; W2 Clearly there will be proposed solutions that are acceptable according to the modi ed speci cation but that are not acceptable according to Table3 . This motivates being explicit about what we mean by the best solution.... In PAGE 10: ... In other words, we can change containments to equalities if we \collect quot; all terms de ning the same entity. 3 Attribute Grammar Formulations The ow logic of Table3 can be transformed into an attribute grammar. The basic idea behind attribute grammars is as follows.... In PAGE 10: ... We shall now proceed in two stages. First we show that a minor transformation will turn the speci cation of Table3 into an extended attribute grammar with global attributes and side conditions. The second stage will then transform the extended attribute grammar into an attribute grammar using global attributes and de ning the attributes by containments (rather than equalities).... In PAGE 11: ... The global attributes can be used as constants in the construction of terms for the attributes and their values can be further constrained by explicit conditions associated with the syntactic rules. It is now easy to see that Table 4 can be obtained from Table3 and vice versa by simply changing the notation. Hence it should be clear that the two speci cations admit the same acceptable solutions and therefore that the best solution for one equals the best solution for the other.... In PAGE 15: ... In doing so we shall exploit the presence of labels on all subexpressions. We shall write the analysis of an expression tl as (Rd F ; Rc F ; MF ; SF ; WF ; RL; ML; WL; SL) satis es tl and (as in Table3 ) we shall be explicit about the analysis of subexpressions. Allowing minor changes in notation this results in the speci cation of Table 8.... ..."

Cited by 9

### Table 3: Expressivity and succinctness of XPath dialects.

### Table 5 shows the percentage of all 602 observations that fell into each category.

2005

"... In PAGE 11: ... For each scenario, we described and classified the observation that was made. The categories that we used are summarized in Table5 . As we did for inputs, we separated our observation categories by whether they are applied to the system components, to the harness components, or to the network.... In PAGE 11: ... Table5 : Observation Categories In our initial observation classification, we also produced a succinct summary of each observation. These summaries were then used in a second refinement phase to further categorize each observation category.... ..."

### Table 3: Complexity of Explanations and Partial Explanations: Succinct Representation

"... In PAGE 21: ...olds. This includes, e.g., descriptions of a241 in terms of propositional formulas a86 over a2 such that the models of a86 describe the contexts in a241 . Table3 shows our complexity results for some of the problems in Sections 3 and 4 in the setting where contexts are succinctly represented. More precisely, recognizing explanations and partial explanations in the case of succinct context sets is complete for a60a11a29 a61 (resp.... ..."

### Table 3 Complexity of Explanations and Partial Explanations: Succinct Representation

"... In PAGE 23: ...in terms of propositional formulas a153 over a11 such that the models of a153 describe the contexts in a18 . Table3 shows our complexity results for some of the problems in Sections 3 and 4 in the setting where contexts are succinctly represented. More precisely, recog- nizing explanations and partial explanations in the case of succinct context sets is complete for a67 a34 a68 (resp.... ..."

### Table 1. Summary of tools. \MC quot; abbreviates \model checking. quot; \B quot; indicates that the tool is primarily a bug- nder; \V quot; indicates that the tool is primarily a veri er. Analysis is a rough estimate of how \deep quot; the analysis is, based on, e.g., whether the analysis is more syntactic or semantic. Foundation is a succinct categorization of the main research ideas implemented. Interaction rates the amount of user interaction required to get results. Free indicates whether the tool is available for research use.

2004

Cited by 1

### Table 1: Complexity of problems speci#0Ced succinctly. The list is not

in Complexity of Hierarchically and One-dimensional Periodically-specified Problems I: Hardness Results

"... In PAGE 29: ... Our idea then, is to lift the known reduction from 3SAT to problem #05 when the instance is speci#0Ced non-hierarchically, and thus obtain a suitable reduction from L-3SAT to the problem L-#05. This approach helps one to prove easily many more PSPACE-hardness results for hierarchically speci#0Ced instances #28see Table1 #29. We also point out that most of the reductions are quasi-linear size and quasi-linear time reductions and thus provide tightlower bounds on the deterministic time complexityofthe problem #28under standard complexity theoretic assumptions#29.... In PAGE 33: ...heorem 6.2. The following problems are PSPACE-hard for 1-FPN-or L-speci#0Ced planar graphs of O#28log N #29 bandwidth: 3-COLORING, INDEPEN- DENT SET#28IS#29, DOMINATING SET, VERTEX COVER, PARTITION INTO TRIANGLES and HAMILTONIAN PATH#28HP#29. Table1 contains a sample of the results wehave obtained for succinctly speci#0Ced problems. As another example of the applicability of our results we consider the complexity of the monotone circuit value problem for L- and 1-FPN#28BC#29-speci#0Ced inputs.... In PAGE 33: ... We also outlined how our techniques could be used to prove the PSPACE- hardness of several other L-, 1-FPN-, 1-FPN#28BC#29- or 1-PN-speci#0Ced prob- lems. Table1 contains example of the results for L-, 1-FPN-, 1-FPN#28BC#29- or 1-PN-speci#0Ced problems that can be obtained by the techniques presented here. In the following, we explain the various entries in Table 1 and also... In PAGE 33: ... Table 1 contains example of the results for L-, 1-FPN-, 1-FPN#28BC#29- or 1-PN-speci#0Ced problems that can be obtained by the techniques presented here. In the following, we explain the various entries in Table1 and also... In PAGE 34: ...33 1. An entry 1 and 4 in Table1 denotes that the corresponding problem is PSPACE-hard, even when restricted to L- or 1-PN-speci#0Ccations of O#28log N #29 bandwidth bounded instances. These results have pre- viously not appeared in the literature; 4 implies that the result is proved formally in #5BMH+96#5D.... In PAGE 34: ... 2. An entry 2 in Table1 denotes that the problem L-#05 or the problem 1-PN-#05 was shown to be PSPACE-hard in #5BLW92#5Dor#5BOr82a#5D. This can also be shown by the ideas and techniques of this paper, even when restricted to L and 1-PN-speci#0Ccations of O#28log N #29 bandwidth bounded instances.... In PAGE 34: ... 3. An entry 3 in Table1 denotes that the corresponding problem is polynomial time solvable. This is shown in #5BMH+96#5D.... ..."