Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Frédéric Prost is active.

Publication


Featured researches published by Frédéric Prost.


principles and practice of declarative programming | 2005

Security policy in a declarative style

Rachid Echahed; Frédéric Prost

We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. In this paper, we first propose a way to define security policies as confluent and terminating rewrite systems. Such policies define how the privacy levels of information evolve. Then, we provide a formal definition of secure processes with respect to a given security policy. We also define an actual verification algorithm of secure processes based on constraint solving.


Electronic Notes in Theoretical Computer Science | 2007

Modeling Pointer Redirection as Cyclic Term-graph Rewriting

Dominique Duval; Rachid Echahed; Frédéric Prost

We tackle the problem of data-structure rewriting including global and local pointer redirections. Each basic rewrite step may perform three kinds of actions: (i) Local redirection, the aim of which is to redirect specific pointers determined by means of a pattern; (ii) Replacement, that may add new information to data-structures; (iii) Global redirection, which is aimed at redirecting all pointers targeting a node towards another one. We define a new framework, following the double-pushout approach, where graph rewrite rules may mix these three kinds of actions in a row. We define first the category of graphs we consider and then we define rewrite rules as pairs of graph homomorphisms of the form L R. In our setting, graph K is not arbitrary, it is used to encode pointer redirection. Furthermore, pushouts do not always exist and complement pushouts, when they exist, are not unique. Despite these concerns, our definition of rewriting steps is such that a rewrite rule can always be fired, once a matching is found.


workshop on information technologies and systems | 2005

Handling declared information leakage: extended abstract

Rachid Echahed; Frédéric Prost

We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define formal tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. We propose to define security policies as rewriting systems. Such policies define how the privacy levels of information evolve. A formal definition of secure processes with respect to a given security policy is given.


practical aspects of declarative languages | 2005

Specializing narrowing for timetable generation: a case study

Nadia Brauner; Rachid Echahed; Gerd Finke; Hanns Gregor; Frédéric Prost

An important property of strategies used to solve goals in functional logic programming (FLP) languages is the complete exploration of the solution space. Integrating constraints into FLP proved to be useful in many cases, as the resulting constraint functional logic programming (CFLP) offers more facilities and more efficient operational semantics. CFLP can be achieved by means of conditional rewrite systems with a narrowing-based operational semantics. A common idea to improve the efficiency of such operational semantics is to use specific algorithms from operations research as constraint solvers. If the algorithm does not return a complete set of solutions, the property of completeness might be lost. We present a real world timetabling problem illustrating this approach. We propose an algorithm, obtained as an integration of three known optimization algorithms for the linear assignment problem (LAP), enumerating solutions to the LAP in order of increasing weight, such that resolution of goals is complete again. We show, how the narrowing process can be tailored to use this algorithm and provide an efficient way to solve the timetable generation problem.


conference on automated deduction | 1999

A formalization of Static Analyses in System F

Frédéric Prost

In this paper, we propose a common theoretical framework for type based static analyses. The aim is the study of relationships between typing and program analysis. We present a variant of Girards System F called F≤:Π. We prove standard properties of F≤:Π. We show how it can be used to formalize various program analyses like binding time and dead code. We relate our work to previous analyses in terms of expressivness (often only simply typed calculi are considered) and power (more information can be inferred). F≤:Π features polymorphism as well as subtyping at the level of universe extending previous author work where only universe polymorphism (on a simply typed calculus) was considered.


rewriting techniques and applications | 2007

Adjunction for garbage collection with application to graph rewriting

Dominique Duval; Rachid Echahed; Frédéric Prost

We investigate garbage collection of unreachable parts of rooted graphs from a categorical point of view. First, we define this task as the right adjoint of an inclusion functor. We also show that garbage collection may be stated via a left adjoint, hence preserving colimits, followed by two right adjoints. These three adjoints cope well with the different phases of a traditional garbage collector. Consequently, our results should naturally help to better formulate graph transformation steps in order to get rid of garbage (unwanted nodes). We illustrate this point on a particular class of graph rewriting systems based on a double pushout approach and featuring edge redirection. Our approach gives a neat rewriting step akin to the one on terms, where garbage never appears in the reduced term.


types for proofs and programs | 1996

Detecting and Removing Dead-Code using Rank 2 Intersection

Ferruccio Damiani; Frédéric Prost


arXiv: Logic in Computer Science | 2009

Graph rewriting with polarized cloning

Dominique Duval; Rachid Echahed; Frédéric Prost


Archive | 2004

A complete Assignment Algorithm and Its Application in Constraint Declarative Languages

Nadia Brauner; Rachid Echahed; Gerd Finke; H. Gregor; Frédéric Prost


arXiv: Logic in Computer Science | 2014

AGREE -- Algebraic Graph Rewriting with Controlled Embedding (Long Version)

Anadrea Corradini; Dominique Duval; Rachid Echahed; Frédéric Prost; Leila Ribeiro

Collaboration


Dive into the Frédéric Prost's collaboration.

Top Co-Authors

Avatar

Rachid Echahed

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Dominique Duval

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Gerd Finke

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Nadia Brauner

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Leila Ribeiro

Universidade Federal do Rio Grande do Sul

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrzej Duda

Grenoble Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dominique Duval

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge