Registration 8.30 a.m.–9.00 a.m.
9.00 –10.00
Synthesis of Privacy-Preserving Systems
The talk describes a framework for automatic synthesis that addresses the privacy of the system and its environment. In addition to a specification, the user of the synthesis algorithm provides a list of secrets. Both the specification and the secrets describe on-going behaviors, given by LTL formulas. We distinguish between two settings. In the first, values of some input and output signals are hidden from an observer in a way that respects budget constraints on the set of signals that may be hidden. In all environments, the specification should be satisfied and the value of the secrets should be hidden from the observer. In the second setting, the system and the environment hide values of some signals from each other. Here, in all environments, the specification should be satisfied despite the incomplete information, and the satisfaction value of the secrets should be hidden.
Joint work with Ofer Leshkowitz and Naama Shamash-Halevy
Coffee Break ☕ 10:00-10:30
10:30 - 11:30
Short talks: Session 1
10:30 - 10:50
PES University
Quantum Communication Exponentially Speeds Up Structured Circuit Synthesis
We prove an exponential separation between classical and quantum communication complexity for synthesizing quantum circuits with succinct structure. Consider the task where Alice holds a specification of an n-qubit circuit from a structured family (e.g., k-sparse permutations, parameterized fault-tolerant gadgets, or tensor network circuits with bond dimension k), and Bob must synthesize a concrete circuit implementation using his quantum computer. We show that classical communication protocols require Ω(k·polylog(n)) bits, while quantum protocols achieve the same task with O(log k + log n) qubits—an exponential improvement when k = poly(n). The proof uses amplitude encoding combined with quantum parameter extraction via Grover-style query algorithms.
The key insight connects to automata-theoretic games: classical synthesis corresponds to solving reachability games on automata of size 2^Ω(k), while quantum protocols exploit the exponential state-space compression of quantum finite automata. This separation implies that for structured circuits ubiquitous in quantum error correction—where classical synthesis algorithms based on graph games provably require exponential space—quantum communication provides a genuine computational advantage. Our results suggest the "right" model for synthesis in the quantum regime isn't classical automata games, but rather their quantum generalizations.
10:50 - 11:10
Université libre de Bruxelles and Institute of Science and Technology Austria
Extreme Risk-sensitive Equilibria
In multiplayer games played on graphs, as soon as randomness is involved (because the game is stochastic or because the players are allowed to randomise their strategies), deciding the existence of a Nash equilibrium that satisfies a given constraint, for example such that the players' payoffs lie in specified intervals, is undecidable in all reasonable settings. However, these results rely on a definition of Nash equilibria that implies that each player intends to maximise their expected payoff, which is not always the most rational behaviour: their tolerance to risk may vary. In this talk, we consider the pessimistic risk measure, which interprets randomness by considering the worst possible scenario, and its dual, the optimistic risk measure. We define from those notions a new notion of equilibrium, the extreme risk-sensitive equilibrium, and show that the constrained existence problem of such an equilibrium is decidable.
11:10 - 11:30
Tata Institute of Fundamental Research, Mumbai
Optimising Expectation with Guarantees for Window Mean Payoff in Markov Decision Processes
The window mean-payoff objective strengthens the classical mean-payoff objective by computing the mean-payoff over a finite window that slides along an infinite path. In this talk, we will look at the problem of synthesizing strategies in Markov decision processes that maximize the window mean-payoff value in expectation, while also simultaneously guaranteeing that the value is above a certain threshold. We solve the synthesis problem for three different kinds of guarantees: sure (that needs to be satisfied in the worst-case, that is, for an adversarial environment), almost-sure (that needs to be satisfied with probability one), and probabilistic (that needs to be satisfied with at least some given probability p).
This is based on joint work with Shibahsis Guha that was accepted in AAMAS 2025.
11:30 - 11:40
11:40 –12:40
History-Deterministic Parity Automata: what do they look like?
History-deterministic automata are a subclass of nondeterministic automata where runs can be constructed on-the-fly while reading input words. This talk will be a survey of results on history-deterministic parity automata, and will focus on its structural properties.
Lunch 🍽️
12:40-14:00
14:00 - 15:00
Short talks: Session 2
14:00 - 14:20
Chennai Mathematical Institute
Complexity of consistency testing for the release-acquire semantics
In a seminal work, [Gibbons and Korach, '97] studied the complexity of deciding whether an observed sequence of reads and writes of a multi-threaded program admits a sequentially consistent interleaving. They showed the problem to be NP-hard even under strong syntactic restrictions. More recently, [Chakraborty et al., '24] considered the problem for weak memory models and proved that NP-hardness remains even when the number of threads, the number of memory locations, and the value domain are all bounded.
In this paper we revisit the problem for the release–acquire variants of the C11 memory model. Our main positive result is that consistency checking can be done in polynomial-time when each memory location is written by at most one thread (multiple readers are allowed). Notably, this restriction is already NP-hard for sequential consistency. We complement this upper bound with tight hardness results: the problem is NP-hard when two threads may write to the same location, and allowing four writers per location rules out 2^{o(k)} algorithms under the Exponential Time Hypothesis, where k denotes the number of threads.
14:20 - 14:40
IIT Bombay
Logics for cascade decompositions over Mazurkiewikz traces
Mazurkiewikz traces are a well known model of concurrency. I will talk about logics over Mazurkiewikz traces which are amenable to translations to cascade products of simple asynchronous automata.
The results I will talk about are from our:
LICS 2024 paper: "An expressively complete local past propositional dynamic logic over Mazurkiewicz traces and its applications"
and CONCUR 2025 paper : "Characterizations of Fragments of Temporal Logic over Mazurkiewicz Traces"
14:40–15:40
Myhill-Nerode characterizations for subclasses of timed automata
The classical Myhill-Nerode theorem for regular languages provides two key insights: (1) L is regular iff its Nerode equivalence has a finite index, and (2) the automaton constructed from the Nerode equivalence is minimal among all DFAs for L. Automata learning algorithms rely on this theorem to provide theoretical guarantees.
Extending such a theory to timed languages introduces significant challenges. For a start, the Nerode equivalence applied to timed words does not have finite index. This raises a natural question: for timed words, what is an alternative to the Nerode equivalence that leads to a canonical timed automaton?
In this talk, we present Myhill-Nerode style characterizations for languages recognized by one-clock deterministic timed automata, and by the subclass known as integer reset timed automata. These characterizations are based on a new perspective to understand one-clock timed languages. Furthermore, the characterizations lead to new active learning algorithms that learn canonical automata.
Joint work with Kyveli Doveri and Pierre Ganty.
Coffee Break ☕ 15:40-16:10