Results 1  10
of
106,929
Detection of Global State Predicates
 In Proc. 5th Int'l. Workshop on Distributed Algorithms (WDAG '91
, 1991
"... those of the authors and should not be construed as an official Department of Defense position, policy, or decision. Author's address: Cornell University ..."
Abstract

Cited by 44 (6 self)
 Add to MetaCart
those of the authors and should not be construed as an official Department of Defense position, policy, or decision. Author's address: Cornell University
Automatic predicate abstraction of C programs
 IN PROC. ACM PLDI
, 2001
"... Model checking has been widely successful in validating and debugging designs in the hardware and protocol domains. However, statespace explosion limits the applicability of model checking tools, so model checkers typically operate on abstractions of systems. Recently, there has been significant in ..."
Abstract

Cited by 488 (33 self)
 Add to MetaCart
interest in applying model checking to software. For infinitestate systems like software, abstraction is even more critical. Techniques for abstracting software are a prerequisite to making software model checking a reality. We present the first algorithm to automatically construct a predicate abstraction
Construction of abstract state graphs with PVS
, 1997
"... We describe in this paper a method based on abstract interpretation which, from a theoretical point of view, is similar to the splitting methods proposed in [DGG93, Dam96] but the weaker abstract transition relation we use, allows us to construct automatically abstract state graphs paying a reasonab ..."
Abstract

Cited by 742 (10 self)
 Add to MetaCart
reasonable price. We consider a particular set of abstract states: the set of the monomials on a set of state predicates ' 1 ; :::; ' ` . The successor of an abstract state m for a transition ø of the program is the least monomial satisfied by all successors via ø of concrete states satisfying m
Symbolic Model Checking for Realtime Systems
 INFORMATION AND COMPUTATION
, 1992
"... We describe finitestate programs over realnumbered time in a guardedcommand language with realvalued clocks or, equivalently, as finite automata with realvalued clocks. Model checking answers the question which states of a realtime program satisfy a branchingtime specification (given in an ..."
Abstract

Cited by 578 (50 self)
 Add to MetaCart
in an extension of CTL with clock variables). We develop an algorithm that computes this set of states symbolically as a fixpoint of a functional on state predicates, without constructing the state space. For this purpose, we introduce a calculus on computation trees over realnumbered time. Unfortunately
Aspectual coercion and the typology of change of state predicates1
, 2006
"... The point of departure of this paper is the consideration of how words with the meanings of property concept states (states that are lexicalized as adjectives in ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
The point of departure of this paper is the consideration of how words with the meanings of property concept states (states that are lexicalized as adjectives in
Access path selection in a relational database management system
, 1979
"... ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated nonprocedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user specificatio ..."
Abstract

Cited by 587 (1 self)
 Add to MetaCart
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated nonprocedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user
The fundamental properties of natural numbers
 Journal of Formalized Mathematics
, 1989
"... Summary. Some fundamental properties of addition, multiplication, order relations, exact division, the remainder, divisibility, the least common multiple, the greatest common divisor are presented. A proof of Euclid algorithm is also given. MML Identifier:NAT_1. WWW:http://mizar.org/JFM/Vol1/nat_1.h ..."
Abstract

Cited by 688 (73 self)
 Add to MetaCart
. The scheme Ind concerns a unary predicate P, and states that: For every natural number k holdsP[k] provided the parameters satisfy the following conditions: • P[0], and • For every natural number k such thatP[k] holdsP[k+1]. The scheme Nat Ind concerns a unary predicateP, and states that: For every natural
The complexity of theoremproving procedures
 IN STOC
, 1971
"... It is shown that any recognition problem solved by a polynomial timebounded nondeterministic Turing machine can be “reduced” to the problem of determining whether a given propositional formula is a tautology. Here “reduced ” means, roughly speaking, that the first problem can be solved deterministi ..."
Abstract

Cited by 1050 (5 self)
 Add to MetaCart
of two given graphs is isomorphic to a subgraph of the second. Other examples are discussed. A method of measuring the complexity of proof procedures for the predicate calculus is introduced and discussed. Throughout this paper, a set of strings 1 means a set of strings on some fixed, large, finite
The inductive approach to verifying cryptographic protocols
 Journal of Computer Security
, 1998
"... Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinitestate systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as ..."
Abstract

Cited by 480 (29 self)
 Add to MetaCart
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinitestate systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can
CHANGEOFSTATE PREDICATES AND THEIR USE IN EXPRESSING THE FUTURE: THE CASE OF LIVONIAN1
"... Abstract. The present article considers changeofstate predicates in Livonian and their possible development into future copulas. The focus is on the verbs īedõ ‘remain, stay; become’, sǭdõ ‘get; become’, and līdõ (synchronically a future copula), but also the verbs tūlda ‘come ’ and lǟdõ ‘go ’ are ..."
Abstract
 Add to MetaCart
Abstract. The present article considers changeofstate predicates in Livonian and their possible development into future copulas. The focus is on the verbs īedõ ‘remain, stay; become’, sǭdõ ‘get; become’, and līdõ (synchronically a future copula), but also the verbs tūlda ‘come ’ and lǟdõ ‘go
Results 1  10
of
106,929