• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 233
Next 10 →

A Framework for Defining Logics

by Robert Harper , Furio Honsell, Gordon Plotkin - JOURNAL OF THE ASSOCIATION FOR COMPUTING MACHINERY , 1993
"... The Edinburgh Logical Framework (LF) provides a means to define (or present) logics. It is based on a general treatment of syntax, rules, and proofs by means of a typed -calculus with dependent types. Syntax is treated in a style similar to, but more general than, Martin-Lof's system of ariti ..."
Abstract - Cited by 795 (42 self) - Add to MetaCart
conditions and leads to a uniform treatment of rules and proofs whereby rules are viewed as proofs of higher-order judgements and proof checking is reduced to type checking. The practical benefit of our treatment of formal systems is that logic-independent tools such as proof editors and proof checkers

Validating SAT solvers using an independent resolution-based checker: Practical implementations and other applications

by Lintao Zhang, Sharad Malik - IN PROCEEDINGS OF DATE , 2003
"... As the use of SAT solvers as core engines in EDA applications grows, it becomes increasingly important to validate their correctness. In this paper, we describe the implementation of an independent resolution-based checking procedure that can check the validity of unsatisfiable claims produced by th ..."
Abstract - Cited by 136 (6 self) - Add to MetaCart
As the use of SAT solvers as core engines in EDA applications grows, it becomes increasingly important to validate their correctness. In this paper, we describe the implementation of an independent resolution-based checking procedure that can check the validity of unsatisfiable claims produced

CVC: a Cooperating Validity Checker

by Aaron Stump, Clark W. Barrett, David L. Dill - In 14th International Conference on Computer-Aided Verification , 2002
"... Decision procedures for decidable logics and logical theories have proven to be useful tools in verification. This paper describes the CVC ("Cooperating Validity Checker") decision procedure. CVC implements a framework for combining subsidiary decision procedures for certain logical theori ..."
Abstract - Cited by 122 (22 self) - Add to MetaCart
Decision procedures for decidable logics and logical theories have proven to be useful tools in verification. This paper describes the CVC ("Cooperating Validity Checker") decision procedure. CVC implements a framework for combining subsidiary decision procedures for certain logical

PRISM 4.0: Verification of Probabilistic Real-time Systems

by Marta Kwiatkowska, Gethin Norman, David Parker
"... Abstract. This paper describes a major new release of the PRISM probabilistic model checker, adding, in particular, quantitative verification of (priced) probabilistic timed automata. These model systems exhibiting probabilistic, nondeterministic and real-time characteristics. In many application do ..."
Abstract - Cited by 236 (45 self) - Add to MetaCart
Abstract. This paper describes a major new release of the PRISM probabilistic model checker, adding, in particular, quantitative verification of (priced) probabilistic timed automata. These model systems exhibiting probabilistic, nondeterministic and real-time characteristics. In many application

Certifying model checkers

by Kedar S. Namjoshi - Proc of CAV ’01 , 2001
"... Abstract. Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time prop-erties, a model checker produces a counterexample computation if the check fails. This computation acts as a \certicate " of failure, as it can be checked easil ..."
Abstract - Cited by 45 (3 self) - Add to MetaCart
easily and independently of the model checker by simulating it on the program. On the other hand, no such certicate is produced if the check succeeds. In this paper, we show how this asymmetry can be eliminated with a certifying model checker. The key idea is that, with some extra bookkeeping, a model

Sub-problem finder and instance checker, two cooperating preprocessors for theorem provers

by Dennis De Champeaux - In Proceedings of the 6th International Joint Conference on Artijicial Intelligence (Tokyo , 1979
"... Abstract. Properties are proved about INSTANCE, a theorem prover module that recognizes that a formula is a special case and/or an alphabetic variant of another formula, and about INSURER, another theorem prover module that decomposes a problem, represented by a formula, into independent subproblems ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract. Properties are proved about INSTANCE, a theorem prover module that recognizes that a formula is a special case and/or an alphabetic variant of another formula, and about INSURER, another theorem prover module that decomposes a problem, represented by a formula, into independent

Proving Security Protocols With Model Checkers By Data Independence Techniques

by A. W. Roscoe, P. J. Broadfoot , 1999
"... Model checkers such as FDR have been extremely effective in checking for, and finding, attacks on cryptographic protocols -- see, for example [16, 20] and many of the papers in [7]. Their use in proving protocols has, on the other hand, generally been limited to showing that a given small instanc ..."
Abstract - Cited by 62 (10 self) - Add to MetaCart
Model checkers such as FDR have been extremely effective in checking for, and finding, attacks on cryptographic protocols -- see, for example [16, 20] and many of the papers in [7]. Their use in proving protocols has, on the other hand, generally been limited to showing that a given small

Detecting BGP Configuration Faults with Static Analysis

by Nick Feamster, Hari Balakrishnan - in Proc. Networked Systems Design and Implementation , 2005
"... The Internet is composed of many independent autonomous systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. ..."
Abstract - Cited by 188 (15 self) - Add to MetaCart
The Internet is composed of many independent autonomous systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers

independence

by A. W. Roscoe, P. J. Broadfoot , 1999
"... security protocols with model checkers by data ..."
Abstract - Add to MetaCart
security protocols with model checkers by data

CloniZER Spell Checker Adaptive, Language Independent Spell Checker

by unknown authors
"... CloniZER spell checker is an adaptive, language independent and 'built-in error pattern free ' spell checker tool which is based on 'Ternary Search Tree ' data structure. It suggests the proper form of the misspelled words using nondeterministic traverse. In other words the probl ..."
Abstract - Add to MetaCart
CloniZER spell checker is an adaptive, language independent and 'built-in error pattern free ' spell checker tool which is based on 'Ternary Search Tree ' data structure. It suggests the proper form of the misspelled words using nondeterministic traverse. In other words
Next 10 →
Results 1 - 10 of 233
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University