Filters








2,972 Hits in 10.2 sec

A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes [chapter]

Mourad Debbabi, Abdelkader Benzakour, Béchir Ktari
1998 Lecture Notes in Computer Science  
In this paper, we present a formal verification framework for higherorder value-passing process algebra. This framework stems from an established synergy between type inference and model-checking.  ...  The logic is an extension of the modal µ-calculus for handling higher-order processes, value-passing and return of results.  ...  We have kept the number of constructs to a bare minimum so as to facilitate a more compact and complete description of our verification framework.  ... 
doi:10.1007/3-540-49253-4_17 fatcat:laam6t24hff4teqodaoxmnsywu

Synergies among Testing, Verification, and Repair for Concurrent Programs (Dagstuhl Seminar 16201)

Julian Dolby, Orna Grumberg, Peter Müller, Omer Tripp, Marc Herbstritt
2016 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 16201 "Synergies among Testing, Verification, and Repair for Concurrent Programs".  ...  This seminar builds upon, and is inspired by, several past seminars on program testing, verification, repair and combinations thereof.  ...  Actor services can specify how parts of a program respond to messages, both in terms of guaranteed future messages, and relations between the program states in which messages are received and responses  ... 
doi:10.4230/dagrep.6.5.56 dblp:journals/dagstuhl-reports/DolbyGMT16 fatcat:3ou6mdvytrfnfhjf542sbpn6lm

An industrially effective environment for formal hardware verification

C.-J.H. Seger, R.B. Jones, J.W. O'Leary, T. Melham, M.D. Aagaard, C. Barrett, D. Syme
2005 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
theorem proving in higher-order logic.  ...  The design philosophy behind Forte is presented and the elements of the verification methodology that make it effective in practice are also described.  ...  The authors are particularly grateful to the users of Forte at Intel and to the Intel design teams who supplied case studies for their own example verifications.  ... 
doi:10.1109/tcad.2005.850814 fatcat:rxashd5osrhcjky5mgq2jsodk4

Playing cupid: The IDE as a matchmaker for plug-ins

Todd W. Schiller, Brandon Lucia
2012 2012 Second International Workshop on Developing Tools as Plug-Ins (TOPI)  
To illustrate the power of the formalism, we describe several synergies between existing plug-ins (and tools) made possible by the ecosystem.  ...  We describe a composable, data-driven, plug-in ecosystem for IDEs. Inspired by Unix's and Windows Power-Shell's pipeline communication models, each plug-in declares data-driven capabilities.  ...  ACKNOWLEDGMENTS We thank Colin Gordon for his comments on an early draft of this paper.  ... 
doi:10.1109/topi.2012.6229805 dblp:conf/icse/SchillerL12 fatcat:khkeiivzavgtfa4ohfb62uodea

From LCF to Isabelle/HOL

Lawrence C. Paulson, Tobias Nipkow, Makarius Wenzel
2019 Formal Aspects of Computing  
Then we consider the task of supporting higher-order logic, which required the introduction of type classes (Sect. 4).  ...  It is generic, supporting a number of different formal calculi, but by far the most important of these is its instantiation to higher-order logic: Isabelle/HOL.  ...  Acknowledgements We thank the referees, Jasmin Blanchette, Michael Norrish and Andrei Popescu for valuable comments on drafts of this paper.  ... 
doi:10.1007/s00165-019-00492-1 fatcat:rv5zmo22fjedvjxjz4lm22v6de

Typestate Checking of Machine Code [chapter]

Zhichen Xu, Thomas Reps, Barton P. Miller
2001 Lecture Notes in Computer Science  
at trusted boundaries, inferring information about the sizes and types of stack-allocated arrays, and a symbolic range analysis for propagating information about array bounds.  ...  The resulting speedup for the globalverification phase of the system ranges from -0.4% to 63% (with a median of 37%).  ...  The consequence of this rule is that it is valid for a program to pass a structure in a place where a supertype of its first member is expected. 1. Note that the subtype ordering is conventional.  ... 
doi:10.1007/3-540-45309-1_22 fatcat:h6tm7fcri5agpjmyrdtrxghmca

Using Probabilistic Analysis for the Certification of Machine Control Systems [chapter]

Atif Mashkoor, Osman Hasan, Wolfgang Beer
2013 Lecture Notes in Computer Science  
The synergy of probabilistic analysis and expressiveness of higher-order logic theorem proving results into convincing modelling and reasoning of several stringent safety cases that contribute towards  ...  Traditional testing techniques often reach their limits when employed for the assessment of critical Machine Control Systems as they contain a large amount of random and unpredictable components.  ...  Fund for Regional Development as well as the State of Upper Austria.  ... 
doi:10.1007/978-3-642-40588-4_21 fatcat:e4fjb4edtzhzvcqbvydhpt5b6u

Combining Model Checking and Testing [chapter]

Patrice Godefroid, Koushik Sen
2018 Handbook of Model Checking  
Model checking and testing have a lot in common.  ...  One way to do this consists of adapting model checking into a form of systematic testing that is applicable to industrial-size software.  ...  A tighter integration between static and dynamic software model checking is proposed in a series of algorithms named Synergy [61] , Dash [6] and Smash [59] , and implemented in the Yogi tool [89]  ... 
doi:10.1007/978-3-319-10575-8_19 fatcat:o7z7rus4ebesdlatlvgockypjy

Extending Source Code Generators for Evidence-Based Software Certification

Ewen Denney, Bernd Fischer
2006 Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006)  
We also describe how additionally provided links are used to trace between the code and the safety artifacts.  ...  Traditional process-oriented approaches to certification thus require that the generator be verified to the same level of assurance as the generated code, but this is infeasible for realistic generators  ...  CONCLUSIONS We believe that there is a natural synergy between code generation and evidence-based certification.  ... 
doi:10.1109/isola.2006.76 dblp:conf/isola/DenneyF06 fatcat:b4kmwijpsjdobdtzmpr4wbmp3y

An overview of Ciao and its design philosophy [article]

M. V. Hermenegildo, F. Bueno, M. Carro, P. López-García, E. Mera, J. F. Morales, G. Puebla
2011 arXiv   pre-print
Thus, a given module may be using, e.g., higher order functions and constraints, while another module may be using assignment, predicates, Prolog meta-programming, and concurrency.  ...  paradigms and styles, and that the use of each of these features (including those of Prolog) can be turned on and off at will for each program module.  ...  The development of the Ciao system has been supported by a number of European, Spanish, and other international projects; currently by the European IST-215483 S-CUBE and FET IST-231620 HATS projects, the  ... 
arXiv:1102.5497v1 fatcat:o4yw2fjccvfevmrbt2cqusqizm

Software model checking

Ranjit Jhala, Rupak Majumdar
2009 ACM Computing Surveys  
Initially, the focus of program verification research was on manual reasoning, and the development of axiomatic semantics and logics for reasoning about programs provided a means to treat programs as logical  ...  This trend has continued since: the goal of software model checking research is to expand the scope of automated techniques for program reasoning, both in the scale of programs handled and in the richness  ...  We thank Jay Misra and Tony Hoare for encouraging us to write this survey and several useful comments along the way.  ... 
doi:10.1145/1592434.1592438 fatcat:hxexhmlpxjbx3hqlfh3o4bzz4u

Usable Verification of Object-Oriented Programs by Combining Static and Dynamic Techniques [chapter]

Julian Tschannen, Carlo A. Furia, Martin Nordio, Bertrand Meyer
2011 Lecture Notes in Computer Science  
The paper discusses the general principles behind the integration of heterogeneous verification tools; the peculiar challenges involved in combining static proofs and dynamic testing techniques; and how  ...  The Eve verification environment contributes to this goal by seamlessly integrating a static prover and an automatic testing tool into a development environment.  ...  Another related synergy between static and dynamic techniques is the static verification of dynamically guessed contracts.  ... 
doi:10.1007/978-3-642-24690-6_26 fatcat:cfxyt53qvbd5dbyx7m377qmos4

Model-Based Safety and Security Engineering [article]

Vivek Nigam and Alexander Pretschner and Harald Ruess
2019 arXiv   pre-print
impact the confidence of safety assessments; (3) We propose a collaborative development process where safety and security assessments are built by incrementally taking into account safety and security  ...  We conclude pointing out that these are the first steps towards a wide range of techniques to support Safety and Security Engineering.  ...  We also thank the AF3 team for helping us with the implementation of features in AF3. Finally, we also thank the fortiss Safety and Security Reading group.  ... 
arXiv:1810.04866v2 fatcat:b5szqz755vdj7bfgh4xsluqyyy

An overview of Ciao and its design philosophy

M. V. HERMENEGILDO, F. BUENO, M. CARRO, P. LÓPEZ-GARCÍA, E. MERA, J. F. MORALES, G. PUEBLA
2011 Theory and Practice of Logic Programming  
Thus, a given module may be using, e.g., higher order functions and constraints, while another module may be using assignment, predicates, Prolog meta-programming, and concurrency.  ...  paradigms and styles and that the use of each of these features (including those of Prolog) can be turned on and off at will for each program module.  ...  Ciao is free software protected to remain so by the GNU LGPL license, and can be used freely to develop both free and commercial applications.  ... 
doi:10.1017/s1471068411000457 fatcat:wopdr753tvfdbbh23rhirgvow4

Emerging Biometrics: Deep Inference and Other Computational Intelligence [article]

Svetlana Yanushkevich, Shawn Eastwood, Kenneth Lai, Vlad Shmerko
2020 arXiv   pre-print
This paper aims at identifying emerging computational intelligence trends for the design and modeling of complex biometric-enabled infrastructure and systems.  ...  Computational intelligence applications that cover a wide spectrum of biometric tasks using physiological and behavioral traits are chosen for illustration.  ...  Acknowledgment This project was partially supported by Natural Sciences and Engineering Research Council of Canada (NSERC) through the grant "Biometric intelligent interfaces".  ... 
arXiv:2006.11971v1 fatcat:k6aunuoxc5apbb347vy2lj7bsq
« Previous Showing results 1 — 15 out of 2,972 results