Skip to main content

Publications

What type of publication do you want to show?

2024

Machine Learning Discovers Invariants of Braids and Flat Braids

Lisitsa, A., Salles, M., & Vernitski, A. (2024). Machine Learning Discovers Invariants of Braids and Flat Braids. Advances in Applied Clifford Algebras, 34(5). doi:10.1007/s00006-024-01349-4

DOI
10.1007/s00006-024-01349-4
Journal article

2023

2022

2021

2020

2019

Modular Verification of Autonomous Space Robotics

Farrell, M., Cardoso, R. C., Dennis, L. A., Dixon, C., Fisher, M., Kourtis, G., . . . Webster, M. (2019). Modular Verification of Autonomous Space Robotics. Retrieved from http://arxiv.org/abs/1908.10738v1

Conference Paper

Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations

Alsaadi, M., Lisitsa, A., Khalaf, M., & Qasaimeh, M. (2019). Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations. In Unknown Conference (pp. 581-592). Springer International Publishing. doi:10.1007/978-3-030-26766-7_53

DOI
10.1007/978-3-030-26766-7_53
Conference Paper

Penetration Testing for Internet of Things and Its Automation

Chu, G., & Lisitsa, A. (2018). Penetration Testing for Internet of Things and Its Automation. In IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS) (pp. 1479-1484). doi:10.1109/HPCC/SmartCity/DSS.2018.00244

DOI
10.1109/HPCC/SmartCity/DSS.2018.00244
Conference Paper

Analysing Security Protocols Using Scenario Based Simulation

Al-Shareefi, F., Lisitsa, A., & Dixon, C. (2019). Analysing Security Protocols Using Scenario Based Simulation. In VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, VECOS 2019 Vol. 11847 (pp. 47-62). doi:10.1007/978-3-030-35092-5_4

DOI
10.1007/978-3-030-35092-5_4
Conference Paper

Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database

Almarwani, M., Konev, B., & Lisitsa, A. (2019). Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database. In PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (pp. 606-614). doi:10.5220/0007582506060614

DOI
10.5220/0007582506060614
Conference Paper

2018

Poster: Agent-based (BDI) modeling for automation of penetration testing

Chu, G., & Lisitsa, A. (2018). Poster: Agent-based (BDI) modeling for automation of penetration testing. In 2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) (pp. 327-328). Retrieved from https://www.webofscience.com/

Conference Paper

POSTER: A Re-evaluation of Intrusion Detection Accuracy: an Alternative Evaluation Strategy

Al-Riyami, S., Coenen, F., & Lisitsa, A. (2018). POSTER: A Re-evaluation of Intrusion Detection Accuracy: an Alternative Evaluation Strategy. In PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (pp. 2195-2197). doi:10.1145/3243734.3278490

DOI
10.1145/3243734.3278490
Conference Paper

Dihedral semigroups, their defining relations and an application to describing knot semigroups of rational links

Vernitski, A., Tunsi, L., Ponchel, C., & Lisitsa, A. (2018). Dihedral semigroups, their defining relations and an application to describing knot semigroups of rational links. SEMIGROUP FORUM, 97(1), 75-86. doi:10.1007/s00233-018-9918-5

DOI
10.1007/s00233-018-9918-5
Journal article

Querying Encrypted Graph Databases

Aburawi, N., Lisitsa, A., & Coenen, F. (2018). Querying Encrypted Graph Databases. In ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (pp. 447-451). doi:10.5220/0006660004470451

DOI
10.5220/0006660004470451
Conference Paper

2017

On The Mining and Usage of Movement Patterns in Large Traffic Networks

Al-Zeyadi, M., Coenen, F., & Lisitsa, A. (2017). On The Mining and Usage of Movement Patterns in Large Traffic Networks. In 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP) (pp. 135-142). Retrieved from https://www.webofscience.com/

Conference Paper

Proceedings Fifth International Workshop on Verification and Program Transformation Uppsala, Sweden, 29th April 2017 Preface

Lisitsa, A., Nemytykh, A. P., & Proietti, M. (2017). Proceedings Fifth International Workshop on Verification and Program Transformation Uppsala, Sweden, 29th April 2017 Preface. In ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE (pp. 1-+). Retrieved from https://www.webofscience.com/

Conference Paper

User-to-User Recommendation using the Concept of Movement Patterns: A Study using a Dating Social Network

Al-Zeyadi, M., Coenen, F., & Lisitsa, A. (2017). User-to-User Recommendation using the Concept of Movement Patterns: A Study using a Dating Social Network. In Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (pp. 173-180). SCITEPRESS - Science and Technology Publications. doi:10.5220/0006494601730180

DOI
10.5220/0006494601730180
Conference Paper

2016

Performance Analysis of Molecular Communication Model

Juhi, A., Kowalski, D. R., & Lisitsa, A. (2016). Performance Analysis of Molecular Communication Model. In 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO) (pp. 826-829). Retrieved from https://www.webofscience.com/

Conference Paper

Automated verification of programs and Web systems

ter Beek, M. H., Lisitsa, A., Nemytykh, A. P., & Ravara, A. (2016). Automated verification of programs and Web systems. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 85(5), 653-654. doi:10.1016/j.jlamp.2016.06.005

DOI
10.1016/j.jlamp.2016.06.005
Journal article

A Statistical Approach to The Detection of HTML Attribute Permutation.

Coenen, F. P., lisitsa., & sedeeq. (2016). A Statistical Approach to The Detection of HTML Attribute Permutation..

Conference Paper

A Statistical Approach to the Detection of HTML Attribute Permutation Steganography

Iman, S., Frans, C., & Alexei, L. (2016). A Statistical Approach to the Detection of HTML Attribute Permutation Steganography. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (pp. 522-527). SCITEPRESS - Science and and Technology Publications. doi:10.5220/0005801705220527

DOI
10.5220/0005801705220527
Conference Paper

Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT

Fish, A., Lisitsa, A., Stanovsky, D., & Swartwood, S. (2016). Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT. In MATHEMATICAL SOFTWARE, ICMS 2016 Vol. 9725 (pp. 51-58). doi:10.1007/978-3-319-42432-3_7

DOI
10.1007/978-3-319-42432-3_7
Conference Paper

Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes

Al-Zeyadi, M., Coenen, F., & Lisitsa, A. (2016). Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes. In Unknown Conference (pp. 53-67). Springer International Publishing. doi:10.1007/978-3-319-47175-4_4

DOI
10.1007/978-3-319-47175-4_4
Conference Paper

Proceedings of the Fourth International Workshop on Verification and Program Transformation Eindhoven, The Netherlands, 2nd April 2016 Preface

Hamilton, G., Lisitsa, A., & Nemytykh, A. P. (2016). Proceedings of the Fourth International Workshop on Verification and Program Transformation Eindhoven, The Netherlands, 2nd April 2016 Preface. In ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE (pp. 1-+). Retrieved from https://www.webofscience.com/

Conference Paper

2015

Lisitsa, A., Nemytykh, A. P., & Pettorossi, A. (Eds.) (n.d.). Unknown Title. In Unknown Book (Vol. 199). Open Publishing Association. doi:10.4204/eptcs.199

DOI
10.4204/eptcs.199
Chapter

Computer-aided proof of Erdős discrepancy properties

Konev, B., & Lisitsa, A. (2015). Computer-aided proof of Erdős discrepancy properties. Artificial Intelligence, 224, 103-118. doi:10.1016/j.artint.2015.03.004

DOI
10.1016/j.artint.2015.03.004
Journal article

A Combinatorial Approach to Knot Recognition

Fish, A., Lisitsa, A., & Stanovsky, D. (2015). A Combinatorial Approach to Knot Recognition. EMBRACING GLOBAL COMPUTING IN EMERGING ECONOMIES, EGC 2015, 514, 64-78. doi:10.1007/978-3-319-25043-4_7

DOI
10.1007/978-3-319-25043-4_7
Journal article

A Combinatorial Approach to Knot Recognition.

Fish, A., Lisitsa, A., & Stanovský, D. (2015). A Combinatorial Approach to Knot Recognition.. In R. Horne (Ed.), EGC Vol. 514 (pp. 64-78). Springer. Retrieved from https://doi.org/10.1007/978-3-319-25043-4

Conference Paper

First-order logic for safety verification of hedge rewriting systems

Lisitsa, A. (2015). First-order logic for safety verification of hedge rewriting systems. Electronic Communications of the EASST, 72. doi:10.14279/tuj.eceasst.72.1020.1008

DOI
10.14279/tuj.eceasst.72.1020.1008
Journal article

Verifying Temporal Properties of Reactive Systems by Transformation

Hamilton, G. (n.d.). Verifying Temporal Properties of Reactive Systems by Transformation. In Electronic Proceedings in Theoretical Computer Science Vol. 199 (pp. 33-49). Open Publishing Association. doi:10.4204/eptcs.199.3

DOI
10.4204/eptcs.199.3
Conference Paper

2014

OPTIMIZED NEURAL INCREMENTAL ATTRIBUTE LEARNING FOR CLASSIFICATION BASED ON STATISTICAL DISCRIMINABILITY

WANG, T., GUAN, S. -U., MAN, K. L., TING, T. O., & LISITSA, A. (2014). OPTIMIZED NEURAL INCREMENTAL ATTRIBUTE LEARNING FOR CLASSIFICATION BASED ON STATISTICAL DISCRIMINABILITY. International Journal of Computational Intelligence and Applications, 13(04), 1450019. doi:10.1142/s1469026814500199

DOI
10.1142/s1469026814500199
Journal article

The 'representative' metaheuristic design pattern

Swan, J., Kocsis, Z. A., & Lisitsa, A. (2014). The 'representative' metaheuristic design pattern. In Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation Vol. 43 (pp. 1435-1436). ACM. doi:10.1145/2598394.2609842

DOI
10.1145/2598394.2609842
Conference Paper

Detecting Unknots via Equational Reasoning, I: Exploration

Fish, A., & Lisitsa, A. (2014). Detecting Unknots via Equational Reasoning, I: Exploration. INTELLIGENT COMPUTER MATHEMATICS, CICM 2014, 8543, 76-91. Retrieved from https://www.webofscience.com/

Journal article

A SAT Attack on the Erdos Discrepancy Conjecture

Konev, B., & Lisitsa, A. (2014). A SAT Attack on the Erdos Discrepancy Conjecture. In THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2014 Vol. 8561 (pp. 219-226). Retrieved from https://www.webofscience.com/

Conference Paper

A SAT Attack on the Erdős Discrepancy Conjecture.

Konev, B., & Lisitsa, A. (2014). A SAT Attack on the Erdős Discrepancy Conjecture.. In C. Sinz, & U. Egly (Eds.), SAT Vol. 8561 (pp. 219-226). Springer. Retrieved from https://doi.org/10.1007/978-3-319-09284-3

Conference Paper

Computer-Aided Proof of Erdos Discrepancy Properties.

Konev, B., & Lisitsa, A. (2014). Computer-Aided Proof of Erdos Discrepancy Properties.. CoRR, abs/1405.3097.

Journal article

Detecting Unknots via Equational Reasoning, I: Exploration.

Fish, A., & Lisitsa, A. (2014). Detecting Unknots via Equational Reasoning, I: Exploration.. In S. M. Watt, J. H. Davenport, A. P. Sexton, P. Sojka, & J. Urban (Eds.), CICM Vol. 8543 (pp. 76-91). Springer. Retrieved from https://doi.org/10.1007/978-3-319-08434-3

Conference Paper

Formal Replay of Translation Validation for Highly Optimised C.

Sewell, T. (2014). Formal Replay of Translation Validation for Highly Optimised C.. In A. Lisitsa, & A. P. Nemytykh (Eds.), VPT@CAV Vol. 28 (pp. 99-111). EasyChair. Retrieved from https://easychair.org/publications/volume/VPT_2014

Conference Paper

Local Driving in Higher-Order Positive Supercompilation via the Omega-theorem.

Hamilton, G. W., & Sørensen, M. H. (2014). Local Driving in Higher-Order Positive Supercompilation via the Omega-theorem.. In A. Lisitsa, & A. P. Nemytykh (Eds.), VPT@CAV Vol. 28 (pp. 36-51). EasyChair. Retrieved from https://easychair.org/publications/volume/VPT_2014

Conference Paper

On Unfolding for Programs Using Strings as a Data Type.

Nemytykh, A. P. (2014). On Unfolding for Programs Using Strings as a Data Type.. In A. Lisitsa, & A. P. Nemytykh (Eds.), VPT@CAV Vol. 28 (pp. 66-83). EasyChair. Retrieved from https://easychair.org/publications/volume/VPT_2014

Conference Paper

Program Verification using Constraint Handling Rules and Array Constraint Generalizations.

Angelis, E. D., Fioravanti, F., Pettorossi, A., & Proietti, M. (2014). Program Verification using Constraint Handling Rules and Array Constraint Generalizations.. In A. Lisitsa, & A. P. Nemytykh (Eds.), VPT@CAV Vol. 28 (pp. 3-18). EasyChair. Retrieved from https://easychair.org/publications/volume/VPT_2014

Conference Paper

VPT 2014. Second International Workshop on Verification and Program Transformation, July 17-18, 2014, Vienna, Austria, The workshop is an event of the Vienna Summer of Logic 2014 and it is co-located with the 26th International Conference on Computer Aided Verification CAV 2014

Lisitsa, A., & Nemytykh, A. P. (Eds.) (2014). VPT 2014. Second International Workshop on Verification and Program Transformation, July 17-18, 2014, Vienna, Austria, The workshop is an event of the Vienna Summer of Logic 2014 and it is co-located with the 26th International Conference on Computer Aided Verification CAV 2014. In VPT@CAV Vol. 28. EasyChair.

Conference Paper

2013

Autonomous Asteroid Exploration by Rational Agents

Lincoln, N. K., Veres, S. M., Dennis, L. A., Fisher, M., & Lisitsa, A. (2013). Autonomous Asteroid Exploration by Rational Agents. IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 8(4), 25-38. doi:10.1109/MCI.2013.2279559

DOI
10.1109/MCI.2013.2279559
Journal article

Practical Verification of Decision-Making in Agent-Based Autonomous Systems

Dennis, L., Fisher, M., Lincoln, N. K., Lisitsa, A., & Veres, S. M. (2014). Practical Verification of Decision-Making in Agent-Based Autonomous Systems. Automated Software Engineering, 23(3), 305-359. doi:10.1007/s10515-014-0168-9

DOI
10.1007/s10515-014-0168-9
Journal article

'Bounded multi-hyperset theory and polynomial computability' (under re-working)

Lisitsa, A., & Sazonov, V. (2013). 'Bounded multi-hyperset theory and polynomial computability' (under re-working). Unknown Journal, 50+.

Journal article

FCM verification method for Rewriting Logic

Lisitsa, A. (2013). FCM verification method for Rewriting Logic. TCS.

Journal article

Finite Reasons for Safety

Lisitsa, A. (2013). Finite Reasons for Safety. Journal of Automated Reasoning, 51, Is(4), 431-451. Retrieved from https://owa.liv.ac.uk/

Journal article

First-order theorem proving in the exploration of Andrews-Curtis conjecture.

Lisitsa, A. (2013). First-order theorem proving in the exploration of Andrews-Curtis conjecture.. Tiny Transactions on Computer Science, 2. Retrieved from http://tinytocs.org/papers/tinytocs2-lisitsa.pdf

Journal article

Tackling Fibonacci words puzzles by finite countermodels

Lisitsa, A. (2013). Tackling Fibonacci words puzzles by finite countermodels. In Fun with Formal Methods, Workshop affiliated with CAV 2013 (pp. 1-6). Saint-Petersburg: CAV Workshops. Retrieved from http://cgi.csc.liv.ac.uk/~alexei/Fibonacci_Challenge/fun2013.pdf

Conference Paper

TeStID: A High Performance Temporal Intrusion Detection System

Ahmed, A., Lisitsa, A., & Dixon, C. (2013). TeStID: A High Performance Temporal Intrusion Detection System. In Conference on Internet Monitoring and Protection (pp. unknown). unknown: IARIA.

Conference Paper

VPT 2013. First International Workshop on Verification and Program Transformation

Lisitsa, A., & Nemytykh, A. (Eds.) (2013). VPT 2013. First International Workshop on Verification and Program Transformation. In VPT 2013. First International Workshop on Verification and Program Transformation Vol. 16 (pp. i+87). Manchester: EPiC. Retrieved from http://www.easychair.org/publications/?page=1244513262

Conference Paper

2012

Finite Models vs Tree Automata in Safety Verification.

Lisitsa, A. (2012). Finite Models vs Tree Automata in Safety Verification.. In A. Tiwari (Ed.), RTA 2012 - 23rd International Conference on Rewriting Techniques and Applications (pp. 225-240). Nagoya: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.

Conference Paper

2011

A misuse-based network Intrusion Detection System using Temporal Logic and stream processing

Ahmed, A., Lisitsa, A., & Dixon, C. (2011). A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. In 2011 5th International Conference on Network and System Security (pp. 1-8). IEEE. doi:10.1109/icnss.2011.6059953

DOI
10.1109/icnss.2011.6059953
Conference Paper

Planarity of Knots, Register Automata and LogSpace Computability

Lisitsa, A., Potapov, I., & Saleh, R. (2011). Planarity of Knots, Register Automata and LogSpace Computability. In LANGUAGE AND AUTOMATA THEORY AND APPLICATIONS Vol. 6638 (pp. 366-377). Retrieved from https://www.webofscience.com/

Conference Paper

2010

Satellite Control Using Rational Agent Programming

Dennis, L., Fisher, M., Lisitsa, A., Lincoln, N., & Veres, S. (2010). Satellite Control Using Rational Agent Programming. IEEE INTELLIGENT SYSTEMS, 25(3), 92-97. doi:10.1109/MIS.2010.88

DOI
10.1109/MIS.2010.88
Journal article

On one application of computations with oracle

Lisitsa, A. P., & Nemytykh, A. P. (2010). On one application of computations with oracle. Programming and Computer Software, 36(3), 157-165. doi:10.1134/s0361768810030047

DOI
10.1134/s0361768810030047
Journal article

Automated Technology for Verification and Analysis

Bouajjani, A., & Chin, W. -N. (Eds.) (2010). Automated Technology for Verification and Analysis. In . Springer Berlin Heidelberg. doi:10.1007/978-3-642-15643-4

DOI
10.1007/978-3-642-15643-4
Conference Paper

2009

On the Computational Power of Querying the History

Lisitsa, A., & Potapov, I. (2009). On the Computational Power of Querying the History. FUNDAMENTA INFORMATICAE, 91(2), 395-409. doi:10.3233/FI-2009-0049

DOI
10.3233/FI-2009-0049
Journal article

Automata on Gauss Words

Lisitsa, A., Potapov, I., & Saleh, R. (2009). Automata on Gauss Words. In LANGUAGE AND AUTOMATA THEORY AND APPLICATIONS Vol. 5457 (pp. 505-517). doi:10.1007/978-3-642-00982-2_43

DOI
10.1007/978-3-642-00982-2_43
Conference Paper

Temporal Verification of Fault-Tolerant Protocols

Fisher, M., Konev, B., & Lisitsa, A. (2009). Temporal Verification of Fault-Tolerant Protocols. In METHODS, MODELS AND TOOLS FOR FAULT TOLERANCE Vol. 5454 (pp. 44-56). Retrieved from https://www.webofscience.com/

Conference Paper

Reachability as deducibility, finite countermodels and verification

Lisitsa, A. (2009). Reachability as deducibility, finite countermodels and verification. In L. O'Reilly, & M. Roggenbach (Eds.), Ninth International Workshop on Automated Verification of Critical Systems (pp. 241-244). Gergynog Conference Centre: Swansea University.

Conference Paper

2008

Practical first-order temporal reasoning

Dixon, C., Fisher, M., Konev, B., & Lisitsa, A. (2008). Practical first-order temporal reasoning. In TIME 2008: 15TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS (pp. 156-163). doi:10.1109/TIME.2008.15

DOI
10.1109/TIME.2008.15
Conference Paper

REACHABILITY ANALYSIS IN VERIFICATION VIA SUPERCOMPILATION

LISITSA, A., & NEMYTYKH, A. P. (2008). REACHABILITY ANALYSIS IN VERIFICATION VIA SUPERCOMPILATION. International Journal of Foundations of Computer Science, 19(04), 953-969. doi:10.1142/s0129054108006066

DOI
10.1142/s0129054108006066
Journal article

Extracting Bugs from the Failed Proofs in Verification via Supercompilation

Lisitsa, A., & Nemytykh, A. P. (2008). Extracting Bugs from the Failed Proofs in Verification via Supercompilation. In B. Beckert, & R. Hahnle (Eds.), Tests and Proofs, TAP 2008 Vol. 5 (pp. 49-65). Prato: Univesitat Koblenz-Landau.

Conference Paper

Probabilistic Model Checking in Neural Cryptography. Preliminary report.

Lisitsa, A. (2008). Probabilistic Model Checking in Neural Cryptography. Preliminary report.. In A. Aldini, & C. Baier (Eds.), 6th Workshop on Qunatitative Aspects of Programming Languages (pp. 47-50). Budapest: etaps.

Conference Paper

Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection

Lisitsa, A., & Nemytykh, A. P. (2008). Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection. In First International Workshop on Metacomputation in Russia, META'2008 (pp. 94-112). Pereslavl-Zalessky: Fizmatlit.

Conference Paper

Verification as Specialization of Interpreters with Respect to Data

Lisitsa, A., & Nemytykh, A. P. (2008). Verification as Specialization of Interpreters with Respect to Data. In First International Workshop on Metacomputation in Russia, META'2008 (pp. 94-112). Pereslavl-Zalessky: Fizmatlit.

Conference Paper

2007

Verification as a parameterized testing (experiments with the SCP4 supercompiler)

Lisitsa, A. P., & Nemytykh, A. P. (2007). Verification as a parameterized testing (experiments with the SCP4 supercompiler). Programming and Computer Software, 33(1), 14-23. doi:10.1134/s0361768807010033

DOI
10.1134/s0361768807010033
Journal article

A Note on Specialization of Interpreters

Lisitsa, A., & Nemytykh, A. P. (n.d.). A Note on Specialization of Interpreters. In Unknown Conference (pp. 237-248). Springer Berlin Heidelberg. doi:10.1007/978-3-540-74510-5_25

DOI
10.1007/978-3-540-74510-5_25
Conference Paper

Reachability Analysis in Verification via Supercompilation

Lisitsa, A., & Nemytykh, A. (2007). Reachability Analysis in Verification via Supercompilation. In M. Hirvensalo, V. Halava, I. Potapov, & J. Kari (Eds.), Workshop on Reachability Problems Vol. 45 (pp. 53-67). Turku: Painosalama Oy.

Conference Paper

2006

In time alone: On the computational power of querying the history

Lisitsa, A., & Potapov, I. (2006). In time alone: On the computational power of querying the history. In TIME 2006: THIRTEENTH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS (pp. 42-+). Retrieved from https://www.webofscience.com/

Conference Paper

Logic in Artificial Intelligence

Fisher, M., van der Hoek, W., Konev, B., & Lisitsa, A. (Eds.) (2006). Logic in Artificial Intelligence. In 10th European Conference, JELIA 2006 Vol. 4160 (pp. 516). Berlin, Heidelberg: Springer.

Conference Paper

Logics in Artificial Intelligence

Fisher, M., van der Hoek, W., Konev, B., & Lisitsa, A. (Eds.) (2006). Logics in Artificial Intelligence. In . Springer Berlin Heidelberg. doi:10.1007/11853886

DOI
10.1007/11853886
Conference Paper

Practical Infinite State Verification with Temporal Reasoning

Fisher, M., Lisitsa, A., & Konev, B. (2006). Practical Infinite State Verification with Temporal Reasoning. In E. CLarke, M. Minea, & F. L. Tiplea (Eds.), Verification of Infinite-State Systems with Applications to Security (pp. 91-100). Timisoara: IOS Press.

Conference Paper

2005

On temporal logic between between propositional and first-order

Lisitsa, A., Potapov, I., & et al. (2005). On temporal logic between between propositional and first-order. In S. S. Goncharov (Ed.), The 9th Asian Logic Conference (pp. 101-102). Novosibirsk: Novosibirsk State University. Retrieved from http://www.ict.nsc.ru/ws/ALC-9/index.en.html

Conference Paper

Practical Infinite-State Verification with Temporal Reasoning

Fisher, M., Konev, B., & Lisitsa, A. (2005). Practical Infinite-State Verification with Temporal Reasoning. In E. M. Clarke, M. Minea, & F. L. Tiplea (Eds.), NATO Advanced Research Workshop "Verification of Infinite State Systems with Applications to Security VISSAS 2005" (pp. 91-100). Amsterdam: IOS Press.

Conference Paper

Towards verification via supercompilation

Lisitsa, A., & Nemytykh, A. (2005). Towards verification via supercompilation. In 29th Annual International Computer Software and Applications Conference (COMPSAC'05) (pp. 9-10 Vol. 1). IEEE. doi:10.1109/compsac.2005.159

DOI
10.1109/compsac.2005.159
Conference Paper

Universality in temporal logic extended by predicate abstraction

Lisitsa, A. (2005). Universality in temporal logic extended by predicate abstraction. In J. -Y. Beziau, & A. Costa-Leite (Eds.), UNILOG'05 (pp. 76). Montreux: Swiss Acaemy of Science.

Conference Paper

Verification of parameterized systems using supercompilation

Lisitsa, A., & Nemytykh, A. P. (2005). Verification of parameterized systems using supercompilation. In Third Workshop on Applied Semantics (APPSEM 2005) (pp. 22-32). Frauenchiemsee: University of Munich.

Conference Paper

2004

Temporal logic with predicate λ-abstraction.

Lisitsa, A., & Potapov, I. (2005). Temporal logic with predicate λ-abstraction.. In 12TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS (pp. 147-155). doi:10.1109/TIME.2005.34

DOI
10.1109/TIME.2005.34
Conference Paper

Mathematical Foundations of Computer Science 2004

Fiala, J., Koubek, V., & Kratochvíl, J. (Eds.) (2004). Mathematical Foundations of Computer Science 2004. In . Springer Berlin Heidelberg. doi:10.1007/b99679

DOI
10.1007/b99679
Conference Paper

Monodic ASMs and temporal verification

Fisher, M., & Lisitsa, A. (2004). Monodic ASMs and temporal verification. In ABSTRACT STATE MACHINES 2004: ADVANCES IN THEORY AND PRACTICE, PROCEEDINGS Vol. 3052 (pp. 95-110). Retrieved from https://www.webofscience.com/

Conference Paper

2003

Deductive Verification of Cache Coherence Protocols

Fisher, M., & Lisitsa, A. (2003). Deductive Verification of Cache Coherence Protocols. In M. Leuschel, S. Gruner, & S. Lo Presti (Eds.), AVOCS 2003 (pp. 177-186). Southampton: University of Southampton.

Conference Paper

2002

Searching for invariants using temporal resolution

Brotherston, J., Degtyarev, A., Fisher, M., & Lisitsa, A. (2002). Searching for invariants using temporal resolution. In 9th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR) Vol. 2514 (pp. 16). Tbilisi: Springer-Verlag.

Conference Paper

Degtyarev, A., Fisher, M., & Lisitsa, A. (2002). Unknown Title. Studia Logica, 72(2), 147-156. doi:10.1023/a:1021352309671

DOI
10.1023/a:1021352309671
Journal article