A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Compositional shape analysis by means of bi-abduction
2009
SIGPLAN notices
The analysis rests on a generalized form of abduction (inference of explanatory hypotheses) which we call bi-abduction. ...
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. ...
The authors acknowledge the support of the Smallfoot project funded by the UK EPSRC. Diste ...
doi:10.1145/1594834.1480917
fatcat:qp673bju6bahfaucp5voqbkmtm
Compositional shape analysis by means of bi-abduction
2008
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '09
The analysis rests on a generalized form of abduction (inference of explanatory hypotheses) which we call bi-abduction. ...
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. ...
The authors acknowledge the support of the Smallfoot project funded by the UK EPSRC. Diste ...
doi:10.1145/1480881.1480917
dblp:conf/popl/CalcagnoDOY09
fatcat:awkmfsvz3rg55eq2dsnsurf7bq
Compositional Shape Analysis by Means of Bi-Abduction
2011
Journal of the ACM
The analysis rests on a generalized form of abduction (inference of explanatory hypotheses) which we call bi-abduction. ...
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. ...
The authors acknowledge the support of the Smallfoot project funded by the UK EPSRC. Diste ...
doi:10.1145/2049697.2049700
fatcat:hjbrnwfa5nexngy3ibif4rf664
Attacking Large Industrial Code with Bi-abductive Inference
[chapter]
2009
Lecture Notes in Computer Science
This extended abstract briefly surveys the key concepts and describes our experience in the application of bi-abduction to real-world applications and systems programs of over one million lines of code ...
In joint work with Cristiano Calcagno, Peter O'Hearn, and Hongseok Yang, we have introduced bi-abductive inference and its use in reasoning about heap manipulating programs [5] . ...
This work was supported by a Royal Academy of Engineering research fellowship. ...
doi:10.1007/978-3-642-04570-7_1
fatcat:tlaxeou2rzbc5disdlplxw5kge
Memory Leaks Detection in Java by Bi-abductive Inference
[chapter]
2010
Lecture Notes in Computer Science
The algorithm is based on separation logic and exploits the concept of bi-abductive inference for identifying the objects which are reachable but no longer used by the program. ...
This paper describes a compositional analysis algorithm for statically detecting leaks in Java programs. ...
Backward shape analysis is achieved using bi-abduction which allows to construct the analysis in a compositional fashion. ...
doi:10.1007/978-3-642-12029-9_20
fatcat:sokgwuqshjggrnf3fgxv2amxni
Bottom-Up Shape Analysis
[chapter]
2009
Lecture Notes in Computer Science
In this paper we present a new shape analysis algorithm. The key distinguishing aspect of our algorithm is that it is completely compositional, bottom-up and non-iterative. ...
These inference rules are used as the basis for a bottom-up shape analysis of programs. ...
We thank Hongseok Yang and Dino Distefano for introducing us to the idea of abduction and for providing us with benchmark programs. The ...
doi:10.1007/978-3-642-03237-0_14
fatcat:pflph54anvebvca3o7qgouksbi
Bi-Abductive Inference for Shape and Ordering Properties
2019
2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)
In separation logic, bi-abduction -a combination of abductive inference and frame inference -is the key enabler for compositional reasoning, helping to scale up verification significantly. ...
To extend this impact towards the combination of shape and arithmetic domains, in this work, we present a novel one-stage bi-abductive procedure for a combination of data structures and ordering values ...
Second, bi-abduction is a compositional analysis: an analysis in which the final output is the combination of the results of smaller analyses over components of the program, typically procedures. ...
doi:10.1109/iceccs.2019.00031
dblp:conf/iceccs/CurryLQ19
fatcat:36rpqduwfvfnhgwuyxtsjszx3u
Bi-Abduction with Pure Properties for Specification Inference
[chapter]
2013
Lecture Notes in Computer Science
The power of our new bi-abductive entailment procedure is significantly enhanced by its collection of proof obligations over uninterpreted relations (functions). ...
In this paper, we propose a novel approach, called pure bi-abduction, for inferring pure information for pre/post specifications, using the result from a prior shape analysis step. ...
Abductor [3] is a tool implementing a compositional shape analysis based on bi-abduction, which was used to check memory safety of large open source codebases [5] . ...
doi:10.1007/978-3-319-03542-0_8
fatcat:6gscubin45glzlpbnmjlmxbzra
Automated specification inference in a combined domain via user-defined predicates
2017
Science of Computer Programming
This task is further complicated by an expressive domain that combines shape, numerical and bag information. ...
The analysis does not only infer memory safety properties, but also finds relationships between pure and shape domains towards full functional correctness of programs. ...
This work was supported in part by the EPSRC project EP/G042322/2 and the NSFC project 61373033. ...
doi:10.1016/j.scico.2017.05.007
fatcat:uufvxrd4kbc53cgzumtd6ctj7i
Infer: An Automatic Program Verifier for Memory Safety of C Programs
[chapter]
2011
Lecture Notes in Computer Science
It attempts to build a compositional proof of the program at hand by composing proofs of its constituent modules (functions/procedures). Bugs are extracted from failures of proof attempts. ...
We describe the main features of Infer and some of the main ideas behind it. ...
Infer
Bi-Abduction and Compositional Analysis The theoretical notion used by Infer to automatically synthesize specifications is bi-abductive inference [5] . ...
doi:10.1007/978-3-642-20398-5_33
fatcat:yssdnsh65rgbrh4ak7pne25kba
Bi-abductive Resource Invariant Synthesis
[chapter]
2009
Lecture Notes in Computer Science
This synthesis employs bi-abductive inference to identify the footprints of different parts of the program and decide what invariant each lock protects. ...
We demonstrate our algorithm on several small (yet intricate) examples which are out of the reach of other automatic analyses in the literature. ...
Calcagno was supported by an EPSRC Advanced Fellowship and Distefano by a Royal Academy of Engineering research fellowship. ...
doi:10.1007/978-3-642-10672-9_19
fatcat:bvxhlkqjbbb3jdrmwyour33oku
Bottom-up shape analysis using LISF
2011
ACM Transactions on Programming Languages and Systems
We utilize an extension of separation logic, described later, to achieve this. Composition via Strong Bi-Abduction. ...
In this paper we present a new shape analysis algorithm. The key distinguishing aspect of our algorithm is that it is completely compositional, bottom-up and non-iterative. ...
The ideas in the appendix are motivated by the suggestions made by one of the reviewers of earlier draft. ...
doi:10.1145/2039346.2039349
fatcat:qzb4p7mnnbg23awkhetsifkarq
Bi-Abduction for Shapes with Ordered Data
[article]
2020
arXiv
pre-print
Enabled by separation logic, bi-abduction - a combination of abductive inference and frame inference - is the key enabler for compositional reasoning, helping to scale up verification significantly. ...
The integration of separation logic into shape analyses has improved the effectiveness of the techniques, but the most significant advancement in this area is bi-abductive inference. ...
By means of compositional analysis, we send the following query to the bi-abductive procedure: . ...
arXiv:2006.10439v1
fatcat:7sb2rpqvzrfwbhe4fxadh6gpfq
Maximal specification synthesis
2016
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016
Many problems in program analysis, verification, and synthesis require inferring specifications of unknown procedures. ...
We formulate the novel notion of multi-abduction as a generalization of classical logical abduction and present an algorithm for solving multi-abduction problems. ...
The second author is funded by NSF Award #1453386 and FA 8750-14-2-0270. ...
doi:10.1145/2837614.2837628
dblp:conf/popl/AlbarghouthiDG16
fatcat:5fzfvkyujrbvbpugk4jzb6hdnq
How cultural knowledge shapes core design thinking—a situation specific analysis
2017
CoDesign - International Journal of CoCreation in Design and the Arts
The results show that cultural knowledge, either as shared by the cross-cultural team or group specific knowledge of some team members, shape the reasoning patterns in the design thinking process across ...
We illustrate the framework with a qualitative analysis of 16 episodes of design related conversations, which are part of a design case study. ...
How cultural knowledge shapes abduction and framing To illustrate how abductive design thinking is shaped by cultural knowledge, we have chosen to focus on abduction 2 and framing in an analysis of episode ...
doi:10.1080/15710882.2017.1399146
fatcat:aprv6eythbbanf3gzvjctafatm
« Previous
Showing results 1 — 15 out of 2,253 results