## Section: Application Domains

### Computations and Dynamical Systems

#### Continuous computation theories

Understanding computation theories for continuous systems leads to studying hardness of veriﬁcation and control of these systems. This has been used to discuss problems in ﬁelds as diverse as veriﬁcation (see e.g. [35] ), control theory (see e.g. [43] ), neural networks (see e.g. [71] ), and so on. We are interested in the formal decidability of properties of dynamical systems, such as reachability [62] , the Skolem-Pisot problem [39] , the computability of the $\omega $-limit set [61] . Those problems are analogous to veriﬁcation of safety properties. Contrary to computability theory, complexity theory over continuous spaces is underdeveloped and not well understood. A central issue is the choice of the representation of objects by discrete data and its effects on the induced complexity notions. As for computability, it is well known that a representation is gauged by the topology it induces. However more structure is needed to capture the complexity notions: topologically equivalent representations may induce different classes of polynomial-time computable objects, e.g. Developing a sound complexity theory over continuous structures would enable us to make abstract computability results more applicable by analysing the corresponding complexity issues. We think that the preliminary step towards such a theory is the development of higher-order complexity, which we are currently carrying out. In contrast with the discrete setting, it is of utmost importance to compare the various models of computation over the reals, as well as their associated complexity theories. In particular, we focus on the General Purpose Analog Computer of Claude Shannon [72] , on recursive analysis [77] , on the algebraic approach [68] and on computability in a probabilistic context [64] . A crucial point for future investigations is to ﬁll the gap between continuous and discrete computational models. This is one deep motivation of our work on computation theories for continuous systems.

#### Analysis and veriﬁcation of adversary systems

The other research direction on dynamical systems we are interested in is the study of properties of adversary systems or programs, i.e. of systems whose behavior is unknown or indistinct, or which do not have classical expected properties. We would like to offer proof and veriﬁcation tools, to guarantee the correctness of such systems. On one hand, we are interested in continuous and hybrid systems. In a mathematical sense, a hybrid system can be seen as a dynamical system, whose transition function does not satisfy the classical regularity hypotheses, like continuity, or continuity of its derivative. The properties to be veriﬁed are often expressed as reachability properties. For example, a safety property is often equivalent to (non-)reachability of a subset of unsure states from an initial conﬁguration, or to stability (with its numerous variants like asymptotic stability, local stability, mortality, etc ...). Thus we will essentially focus on veriﬁcation of these properties in various classes of dynamical systems.

We are also interested in rewriting techniques, used to describe dynamic systems, in particular in the adversary context. As they were initially developed in the context of automated deduction, the rewriting proof techniques, although now numerous, are not yet adapted to the complex framework of modelization and programming. An important stake in the domain is then to enrich them to provide realistic validation tools, both in providing ﬁner rewriting formalisms and their associated proof techniques, and in developing new validation concepts in the adversary case, i.e. when usual properties of the systems like, for example, termination are not veriﬁed. For several years, we have been developing speciﬁc procedures for property proofs of rewriting, for the sake of programming, in particular with an inductive technique, already applied with success to termination under strategies [53] , [54] , [55] , to weak termination [56] , sufﬁcient completeness [57] and probabilistic termination [59] . The last three results take place in the context of adversary computations, since they allow for proving that even a divergent program, in the sense where it does not terminate, can give the expected results. A common mechanism has been extracted from the above works, providing a generic inductive proof framework for properties of reduction relations, which can be parametrized by the property to be proved [58] , [60] . Provided program code can be translated into rule-based speciﬁcations, this approach can be applied to correctness proof of software in a larger context. A crucial element of safety and security of software systems is the problem of resources. We are working in the ﬁeld of Implicit Computational Complexity. Interpretation based methods like Quasi-interpretations (QI) or sup-interpretations, are the approach we have been developing these last years [65] , [66] , [67] . Implicit complexity is an approach to the analysis of the resources that are used by a program. Its tools come essentially from proof theory. The aim is to compile a program while certifying its complexity.