-
1
-
-
0001460029
-
Automorphism groups, isomorphism, reconstruction
-
[Babai 1994], University of Chicago, Department of Computer Science
-
[Babai 1994] Babai, L.: "Automorphism groups, isomorphism, reconstruction"; Technical Report TR-94-10, University of Chicago, Department of Computer Science (1994).
-
(1994)
Technical Report TR-94-10
-
-
Babai, L.1
-
2
-
-
0004145084
-
-
chapter 27, North-Holland
-
Also as chapter 27 of the "Handbook of Combinatorics", North-Holland (1995).
-
(1995)
Handbook of Combinatorics
-
-
-
4
-
-
0021520840
-
Equivalence relations, invariants, and normal forms
-
[Blass and Gurevich 1984]
-
[Blass and Gurevich 1984] Blass, A., Gurevich, Y.: "Equivalence relations, invariants, and normal forms"; SIAM Journal on Computing, 13, 4 (1984), 682-689.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 682-689
-
-
Blass, A.1
Gurevich, Y.2
-
5
-
-
0023646410
-
Does co-NP have short interactive proofs?
-
[Boppana et al. 1987]
-
[Boppana et al. 1987] Boppana, R. B., Hastad, J., Zachos, S.: "Does co-NP have short interactive proofs?" Information Processing Letters, 25, 2 (1987), 127-132.
-
(1987)
Information Processing Letters
, vol.25
, Issue.2
, pp. 127-132
-
-
Boppana, R.B.1
Hastad, J.2
Zachos, S.3
-
6
-
-
0003209126
-
Fundamental Algorithms for Permutation groups
-
[Butler 1991], Springer-Verlag, Berlin
-
[Butler 1991] Butler, G.: "Fundamental Algorithms for Permutation groups"; volume 559 of Lecture Notes in Computer Science, Springer-Verlag, Berlin (1991).
-
(1991)
Lecture Notes in Computer Science
, vol.559
-
-
Butler, G.1
-
7
-
-
84863922302
-
Symmetry reductions in model checking
-
[Clarke et al. 1998]; "Computer Aided Verification (CAV'98)", eds. Hu, A. J. and Vardi, M. Y., Springer, Berlin 147-158.
-
[Clarke et al. 1998] Clarke, E. M., Emerson, E. A., Jha, S., Sistla, A. P.: "Symmetry reductions in model checking"; in "Computer Aided Verification (CAV'98)", eds. Hu, A. J. and Vardi, M. Y., volume 1427 of Lecture Notes in Computer Science, Springer, Berlin (1998), 147-158.
-
(1998)
Lecture Notes in Computer Science
, vol.1427
-
-
Clarke, E.M.1
Emerson, E.A.2
Jha, S.3
Sistla, A.P.4
-
8
-
-
0030212139
-
Exploiting symmetry in temporal logic model checking
-
[Clarke et al. 1996]
-
[Clarke et al. 1996] Clarke, E, M., Enders, R., Filkorn, T., Jha, S.: "Exploiting symmetry in temporal logic model checking"; Formal Methods in System Design, 9, 1/2 (1996), 77-104.
-
(1996)
Formal Methods in System Design
, vol.9
, Issue.1-2
, pp. 77-104
-
-
Clarke, E.M.1
Enders, R.2
Filkorn, T.3
Jha, S.4
-
9
-
-
0030215699
-
Symmetry and model checking
-
[Emerson and Sistla 1996]
-
[Emerson and Sistla 1996] Emerson, E.A., Sistla, A.P.: "Symmetry and model checking"; Formal Methods in System Design, 9, 1/2 (1996), 105-131.
-
(1996)
Formal Methods in System Design
, vol.9
, Issue.1-2
, pp. 105-131
-
-
Emerson, E.A.1
Sistla, A.P.2
-
10
-
-
0010225535
-
Decidability and complexity of Petri net problems -an introduction
-
[Esparza 1998]; "Lectures on Petri Nets I: Basic Models", Reisig, W., Rozenberg, G., eds., Springer
-
[Esparza 1998] Esparza, J.: "Decidability and complexity of Petri net problems -an introduction"; in "Lectures on Petri Nets I: Basic Models", Reisig, W., Rozenberg, G., eds., volume 1491 of Lecture Notes in Computer Science, Springer (1998), 374-428.
-
(1998)
Lecture Notes in Computer Science
, vol.1491
, pp. 374-428
-
-
Esparza, J.1
-
12
-
-
85034444003
-
Polynomial-time algorithms for permutation groups
-
[Furst et al. 1980], IEEE
-
[Furst et al. 1980] Furst, M., Hopcroft, J., Luks, E.: "Polynomial-time algorithms for permutation groups"; Proc. 21st Annual Symposium on Foundations of Computer Science, IEEE (1980), 36-41.
-
(1980)
Proc. 21st Annual Symposium on Foundations of Computer Science
, pp. 36-41
-
-
Furst, M.1
Hopcroft, J.2
Luks, E.3
-
14
-
-
0040629117
-
Predicate/transition nets
-
[Genrich 1991]; Jensen, K., Rozenberg, G., eds., Springer-Verlag
-
[Genrich 1991] Genrich, H. J.: "Predicate/transition nets"; in "High-level Petri Nets; Theory and Application", Jensen, K., Rozenberg, G., eds., Springer-Verlag (1991), 3-43.
-
(1991)
High-level Petri Nets; Theory and Application
, pp. 3-43
-
-
Genrich, H.J.1
-
15
-
-
0022914590
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
[Goldreich et al. 1986], IEEE
-
[Goldreich et al. 1986] Goldreich, O., Micali, S., Wigderson, A.: "Proofs that yield nothing but their validity and a methodology of cryptographic protocol design"; Proc. 27th Annual Symposium on Foundations of Computer Science, IEEE (1986), 174-187.
-
(1986)
Proc. 27th Annual Symposium on Foundations of Computer Science
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
0042263349
-
On-the-fly model checking under fairness that exploits symmetry
-
[Gyuris and Sistla 1999]
-
[Gyuris and Sistla 1999] Gyuris, V., Sistla, A. P.: "On-the-fly model checking under fairness that exploits symmetry"; Formal Methods in System Design, 15, 3 (1999), 217-238.
-
(1999)
Formal Methods in System Design
, vol.15
, Issue.3
, pp. 217-238
-
-
Gyuris, V.1
Sistla, A.P.2
-
17
-
-
0002990353
-
Towards reachability trees for high-level Petri nets
-
[Huber et al. 1984]; "Advances in Petri Nets 1984", Rozenberg, G., ed., Springer-Verlag
-
[Huber et al. 1984] Huber, P., Jensen, A. M., Jepsen, L. O., Jensen, K.: "Towards reachability trees for high-level Petri nets"; in "Advances in Petri Nets 1984", Rozenberg, G., ed., volume 188 of Lecture Notes in Computer Science Springer-Verlag (1985), 215-233.
-
(1985)
Lecture Notes in Computer Science
, vol.188
, pp. 215-233
-
-
Huber, P.1
Jensen, A.M.2
Jepsen, L.O.3
Jensen, K.4
-
18
-
-
33947239973
-
Reachability trees for high-level Petri nets
-
[Huber et al. 1991], Jensen, K., Rozenberg, G., eds., Springer-Verlag
-
[Huber et al. 1991] Huber, P., Jensen, A. M., Jepsen, L. O., Jensen, K.: "Reachability trees for high-level Petri nets"; in "High-level Petri Nets; Theory and Application", Jensen, K., Rozenberg, G., eds., Springer-Verlag (1991), 319-350.
-
(1991)
High-level Petri Nets; Theory and Application
, pp. 319-350
-
-
Huber, P.1
Jensen, A.M.2
Jepsen, L.O.3
Jensen, K.4
-
19
-
-
0030211668
-
Better verification through symmetry
-
[Ip and Dill 1996]
-
[Ip and Dill 1996] Ip, C. N. and Dill, D. L.: "Better verification through symmetry"; Formal Methods in System Design, 9, 1/2 (1996), 41-76.
-
(1996)
Formal Methods in System Design
, vol.9
, Issue.1-2
, pp. 41-76
-
-
Ip, C.N.1
Dill, D.L.2
-
20
-
-
0003871155
-
Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use: Volume 2, Analysis Methods
-
[Jensen 1995], Springer-Verlag
-
[Jensen 1995] Jensen, K.: "Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use: Volume 2, Analysis Methods"; Monographs in Theoretical Computer Science, Springer-Verlag (1995).
-
(1995)
Monographs in Theoretical Computer Science
-
-
Jensen, K.1
-
21
-
-
0030215698
-
Condensed state spaces for symmetrical coloured Petri nets
-
[Jensen 1996]
-
[Jensen 1996] Jensen, K.: "Condensed state spaces for symmetrical coloured Petri nets"; Formal Methods in System Design, 9, 1/2 (1996), 7-40.
-
(1996)
Formal Methods in System Design
, vol.9
, Issue.1-2
, pp. 7-40
-
-
Jensen, K.1
-
22
-
-
0041046589
-
A Compact Representation for Permutation Groups
-
[Jerrum 1986]
-
[Jerrum 1986] Jerrum, M.: "A Compact Representation for Permutation Groups"; Journal of Algorithms, 7, 1 (1986), 60-78.
-
(1986)
Journal of Algorithms
, vol.7
, Issue.1
, pp. 60-78
-
-
Jerrum, M.1
-
23
-
-
0012382503
-
Detecting and exploiting data type symmetries of algebraic system nets during reachability analysis
-
[Junttila 1999], Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland
-
[Junttila 1999] Junttila, T.: "Detecting and exploiting data type symmetries of algebraic system nets during reachability analysis"; Research Report A57, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Espoo, Finland (1999).
-
(1999)
Research Report A57
-
-
Junttila, T.1
-
24
-
-
0000223972
-
Parallel Program Schemata
-
[Karp and Miller 1969]
-
[Karp and Miller 1969] Karp, R. M., Miller, R. E.: "Parallel Program Schemata"; Journal of Computer and System Sciences, 3, 2 (1969). 147-195.
-
(1969)
Journal of Computer and System Sciences
, vol.3
, Issue.2
, pp. 147-195
-
-
Karp, R.M.1
Miller, R.E.2
-
25
-
-
0003666118
-
The Graph Isomorphism Problem: Its Structural Complexity
-
[Köbler et al. 1993], Birkhäuser, Boston
-
[Köbler et al. 1993] Köbler, J., Schöning, U., Torán, J.: "The Graph Isomorphism Problem: Its Structural Complexity"; Progress in Theoretical Computer Science, Birkhäuser, Boston (1993).
-
(1993)
Progress in Theoretical Computer Science
-
-
Köbler, J.1
Schöning, U.2
Torán, J.3
-
26
-
-
0003460091
-
-
[Kreher and Stinson 1999]; CRC Press, Boca Raton, Florida
-
[Kreher and Stinson 1999] Kreher, D. L., Stinson, D. R.: "Combinatorial Algorithms: Generation, Enumeration and Search"; CRC Press, Boca Raton, Florida (1999).
-
(1999)
Combinatorial Algorithms: Generation, Enumeration and Search
-
-
Kreher, D.L.1
Stinson, D.R.2
-
27
-
-
0024020188
-
The complexity of optimization problems
-
[Krentel 1988]
-
[Krentel 1988] Krentel, M. W.: "The complexity of optimization problems"; Journal of Computer and System Sciences, 36, 3 (1988). 490-509.
-
(1988)
Journal of Computer and System Sciences
, vol.36
, Issue.3
, pp. 490-509
-
-
Krentel, M.W.1
-
28
-
-
0001057196
-
Permutation groups and polynomial-time computation
-
[Luks 1993], Department of Computer and Information Science, University of Oregon
-
[Luks 1993] Luks, E. M.: "Permutation groups and polynomial-time computation"; Technical Report CIS 93-01, Department of Computer and Information Science, University of Oregon (1993).
-
(1993)
Technical Report CIS 93-01
-
-
Luks, E.M.1
-
30
-
-
0004010079
-
Nauty user's guide (version 1.5)
-
[McKay 1990], Computer Science Department, Australian National University
-
[McKay 1990] McKay, B. D.: "Nauty user's guide (version 1.5)"; Technical Report TR-CS-90-02, Computer Science Department, Australian National University (1990).
-
(1990)
Technical Report TR-CS-90-02
-
-
McKay, B.D.1
-
31
-
-
0018456478
-
Graph isomorphism, general remarks
-
[Miller 1979]
-
[Miller 1979] Miller, G. L.: "Graph isomorphism, general remarks"; Journal of Computer and System Sciences, 18, 2 (1979), 128-142.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 128-142
-
-
Miller, G.L.1
-
32
-
-
0003897694
-
-
[Papadimitriou 1994]. Addison-Wesley, Reading, Massachusetts
-
[Papadimitriou 1994] Papadimitriou, C. H.: "Computational Complexity". Addison-Wesley, Reading, Massachusetts (1994).
-
(1994)
Computational Complexity
-
-
Papadimitriou, C.H.1
-
33
-
-
0002170173
-
Combining Finkel's and Jensen's reduction techniques to build covering trees for coloured nets
-
[Petrucci 1990]
-
[Petrucci 1990] Petrucci, L.: "Combining Finkel's and Jensen's reduction techniques to build covering trees for coloured nets"; Petri Net Newsletter, 36 (1990), 32-36.
-
(1990)
Petri Net Newsletter
, vol.36
, pp. 32-36
-
-
Petrucci, L.1
-
34
-
-
0039636644
-
How to calculate symmetries of Petri nets
-
[Schmidt 1997], Technische Universität Dresden, Germany
-
[Schmidt 1997] Schmidt, K.: "How to calculate symmetries of Petri nets"; Technical Report MATH-AL-8-1997, Technische Universität Dresden, Germany (1997).
-
(1997)
Technical Report MATH-AL-8-1997
-
-
Schmidt, K.1
-
35
-
-
0034349062
-
How to calculate symmetries of Petri nets
-
[Schmidt 2000a]
-
[Schmidt 2000a] Schmidt, K.: "How to calculate symmetries of Petri nets"; Acta Informatica, 36, 7 (2000), 545-590.
-
(2000)
Acta Informatica
, vol.36
, Issue.7
, pp. 545-590
-
-
Schmidt, K.1
-
36
-
-
84863977794
-
Integrating low level symmetries into reachability analysis
-
[Schmidt 2000b]; "Tools and Algorithms for the Construction and Analysis of Systems; 6th International Conference, TACAS 2000", Graf, S., Schwartzbach, M., eds., Springer
-
[Schmidt 2000b] Schmidt, K.: "Integrating low level symmetries into reachability analysis"; in "Tools and Algorithms for the Construction and Analysis of Systems; 6th International Conference, TACAS 2000", Graf, S., Schwartzbach, M., eds., volume 1785 of Lecture Notes in Computer Science, Springer (2000), 315-330.
-
(2000)
Lecture Notes in Computer Science
, vol.1785
, pp. 315-330
-
-
Schmidt, K.1
-
37
-
-
0002163440
-
An algorithm to compute the symmetries of Petri nets
-
[Schmidt and Starke 1991]
-
[Schmidt and Starke 1991] Schmidt, K., Starke, P. H.: "An algorithm to compute the symmetries of Petri nets"; Petri Net Newsletter, 40 (1991), 25-30.
-
(1991)
Petri Net Newsletter
, vol.40
, pp. 25-30
-
-
Schmidt, K.1
Starke, P.H.2
-
38
-
-
0000418537
-
Reachability analysis of Petri nets using symmetries
-
[Starke 1991]
-
[Starke 1991] Starke, P. H.: "Reachability analysis of Petri nets using symmetries"; Systems Analysis Modelling Simulation, 8, 4/5 (1991), 293-303.
-
(1991)
Systems Analysis Modelling Simulation
, vol.8
, Issue.4-5
, pp. 293-303
-
-
Starke, P.H.1
-
39
-
-
0000974483
-
The state explosion problem
-
[Valmari 1998]; "Lectures on Petri Nets I: Basic Models", Reisig, W., Rozenberg, G., eds., Springer
-
[Valmari 1998] Valmari, A.: "The state explosion problem"; in "Lectures on Petri Nets I: Basic Models", Reisig, W., Rozenberg, G., eds., volume 1491 of Lecture Notes in Computer Science, Springer (1998), 429-528.
-
(1998)
Lecture Notes in Computer Science
, vol.1491
, pp. 429-528
-
-
Valmari, A.1
|