A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes
[chapter]
1998
Lecture Notes in Computer Science
In this paper, we present a formal verification framework for higherorder value-passing process algebra. This framework stems from an established synergy between type inference and model-checking. ...
The logic is an extension of the modal µ-calculus for handling higher-order processes, value-passing and return of results. ...
We have kept the number of constructs to a bare minimum so as to facilitate a more compact and complete description of our verification framework. ...
doi:10.1007/3-540-49253-4_17
fatcat:laam6t24hff4teqodaoxmnsywu
Synergies among Testing, Verification, and Repair for Concurrent Programs (Dagstuhl Seminar 16201)
2016
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 16201 "Synergies among Testing, Verification, and Repair for Concurrent Programs". ...
This seminar builds upon, and is inspired by, several past seminars on program testing, verification, repair and combinations thereof. ...
Actor services can specify how parts of a program respond to messages, both in terms of guaranteed future messages, and relations between the program states in which messages are received and responses ...
doi:10.4230/dagrep.6.5.56
dblp:journals/dagstuhl-reports/DolbyGMT16
fatcat:3ou6mdvytrfnfhjf542sbpn6lm
An industrially effective environment for formal hardware verification
2005
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
theorem proving in higher-order logic. ...
The design philosophy behind Forte is presented and the elements of the verification methodology that make it effective in practice are also described. ...
The authors are particularly grateful to the users of Forte at Intel and to the Intel design teams who supplied case studies for their own example verifications. ...
doi:10.1109/tcad.2005.850814
fatcat:rxashd5osrhcjky5mgq2jsodk4
Playing cupid: The IDE as a matchmaker for plug-ins
2012
2012 Second International Workshop on Developing Tools as Plug-Ins (TOPI)
To illustrate the power of the formalism, we describe several synergies between existing plug-ins (and tools) made possible by the ecosystem. ...
We describe a composable, data-driven, plug-in ecosystem for IDEs. Inspired by Unix's and Windows Power-Shell's pipeline communication models, each plug-in declares data-driven capabilities. ...
ACKNOWLEDGMENTS We thank Colin Gordon for his comments on an early draft of this paper. ...
doi:10.1109/topi.2012.6229805
dblp:conf/icse/SchillerL12
fatcat:khkeiivzavgtfa4ohfb62uodea
From LCF to Isabelle/HOL
2019
Formal Aspects of Computing
Then we consider the task of supporting higher-order logic, which required the introduction of type classes (Sect. 4). ...
It is generic, supporting a number of different formal calculi, but by far the most important of these is its instantiation to higher-order logic: Isabelle/HOL. ...
Acknowledgements We thank the referees, Jasmin Blanchette, Michael Norrish and Andrei Popescu for valuable comments on drafts of this paper. ...
doi:10.1007/s00165-019-00492-1
fatcat:rv5zmo22fjedvjxjz4lm22v6de
Typestate Checking of Machine Code
[chapter]
2001
Lecture Notes in Computer Science
at trusted boundaries, inferring information about the sizes and types of stack-allocated arrays, and a symbolic range analysis for propagating information about array bounds. ...
The resulting speedup for the globalverification phase of the system ranges from -0.4% to 63% (with a median of 37%). ...
The consequence of this rule is that it is valid for a program to pass a structure in a place where a supertype of its first member is expected. 1. Note that the subtype ordering is conventional. ...
doi:10.1007/3-540-45309-1_22
fatcat:h6tm7fcri5agpjmyrdtrxghmca
Using Probabilistic Analysis for the Certification of Machine Control Systems
[chapter]
2013
Lecture Notes in Computer Science
The synergy of probabilistic analysis and expressiveness of higher-order logic theorem proving results into convincing modelling and reasoning of several stringent safety cases that contribute towards ...
Traditional testing techniques often reach their limits when employed for the assessment of critical Machine Control Systems as they contain a large amount of random and unpredictable components. ...
Fund for Regional Development as well as the State of Upper Austria. ...
doi:10.1007/978-3-642-40588-4_21
fatcat:e4fjb4edtzhzvcqbvydhpt5b6u
Combining Model Checking and Testing
[chapter]
2018
Handbook of Model Checking
Model checking and testing have a lot in common. ...
One way to do this consists of adapting model checking into a form of systematic testing that is applicable to industrial-size software. ...
A tighter integration between static and dynamic software model checking is proposed in a series of algorithms named Synergy [61] , Dash [6] and Smash [59] , and implemented in the Yogi tool [89] ...
doi:10.1007/978-3-319-10575-8_19
fatcat:o7z7rus4ebesdlatlvgockypjy
Extending Source Code Generators for Evidence-Based Software Certification
2006
Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006)
We also describe how additionally provided links are used to trace between the code and the safety artifacts. ...
Traditional process-oriented approaches to certification thus require that the generator be verified to the same level of assurance as the generated code, but this is infeasible for realistic generators ...
CONCLUSIONS We believe that there is a natural synergy between code generation and evidence-based certification. ...
doi:10.1109/isola.2006.76
dblp:conf/isola/DenneyF06
fatcat:b4kmwijpsjdobdtzmpr4wbmp3y
An overview of Ciao and its design philosophy
[article]
2011
arXiv
pre-print
Thus, a given module may be using, e.g., higher order functions and constraints, while another module may be using assignment, predicates, Prolog meta-programming, and concurrency. ...
paradigms and styles, and that the use of each of these features (including those of Prolog) can be turned on and off at will for each program module. ...
The development of the Ciao system has been supported by a number of European, Spanish, and other international projects; currently by the European IST-215483 S-CUBE and FET IST-231620 HATS projects, the ...
arXiv:1102.5497v1
fatcat:o4yw2fjccvfevmrbt2cqusqizm
Software model checking
2009
ACM Computing Surveys
Initially, the focus of program verification research was on manual reasoning, and the development of axiomatic semantics and logics for reasoning about programs provided a means to treat programs as logical ...
This trend has continued since: the goal of software model checking research is to expand the scope of automated techniques for program reasoning, both in the scale of programs handled and in the richness ...
We thank Jay Misra and Tony Hoare for encouraging us to write this survey and several useful comments along the way. ...
doi:10.1145/1592434.1592438
fatcat:hxexhmlpxjbx3hqlfh3o4bzz4u
Usable Verification of Object-Oriented Programs by Combining Static and Dynamic Techniques
[chapter]
2011
Lecture Notes in Computer Science
The paper discusses the general principles behind the integration of heterogeneous verification tools; the peculiar challenges involved in combining static proofs and dynamic testing techniques; and how ...
The Eve verification environment contributes to this goal by seamlessly integrating a static prover and an automatic testing tool into a development environment. ...
Another related synergy between static and dynamic techniques is the static verification of dynamically guessed contracts. ...
doi:10.1007/978-3-642-24690-6_26
fatcat:cfxyt53qvbd5dbyx7m377qmos4
Model-Based Safety and Security Engineering
[article]
2019
arXiv
pre-print
impact the confidence of safety assessments; (3) We propose a collaborative development process where safety and security assessments are built by incrementally taking into account safety and security ...
We conclude pointing out that these are the first steps towards a wide range of techniques to support Safety and Security Engineering. ...
We also thank the AF3 team for helping us with the implementation of features in AF3. Finally, we also thank the fortiss Safety and Security Reading group. ...
arXiv:1810.04866v2
fatcat:b5szqz755vdj7bfgh4xsluqyyy
An overview of Ciao and its design philosophy
2011
Theory and Practice of Logic Programming
Thus, a given module may be using, e.g., higher order functions and constraints, while another module may be using assignment, predicates, Prolog meta-programming, and concurrency. ...
paradigms and styles and that the use of each of these features (including those of Prolog) can be turned on and off at will for each program module. ...
Ciao is free software protected to remain so by the GNU LGPL license, and can be used freely to develop both free and commercial applications. ...
doi:10.1017/s1471068411000457
fatcat:wopdr753tvfdbbh23rhirgvow4
Emerging Biometrics: Deep Inference and Other Computational Intelligence
[article]
2020
arXiv
pre-print
This paper aims at identifying emerging computational intelligence trends for the design and modeling of complex biometric-enabled infrastructure and systems. ...
Computational intelligence applications that cover a wide spectrum of biometric tasks using physiological and behavioral traits are chosen for illustration. ...
Acknowledgment This project was partially supported by Natural Sciences and Engineering Research Council of Canada (NSERC) through the grant "Biometric intelligent interfaces". ...
arXiv:2006.11971v1
fatcat:k6aunuoxc5apbb347vy2lj7bsq
« Previous
Showing results 1 — 15 out of 2,972 results