Rigorous. Development. Software. Program Verification. & Springer. An Introduction to. Jorge Sousa Pinto. Jose Bacelar Almeida Maria Joao Frade


 Gwen Miller
 1 years ago
 Views:
Transcription
1 Jose Bacelar Almeida Maria Joao Frade Jorge Sousa Pinto Simao Melo de Sousa Rigorous Software Development An Introduction to Program Verification & Springer
2 Contents 1 Introduction A Formal Approach to Software Engineering Test and SimulationBased Reliability An Alternative Approach: Formal Methods Requirements: Functional, Security, and Safety Formal Methods and Industrial Norms From Classic Software Engineering to Formal Software Engineering This Book 11 References 12 2 An Overview of Formal Methods Tools and Techniques The Central Problem Some Existing Formal Methods Taxonomies This Overview Specifying and Analysing ModelBased Specification Algebraic Specification Declarative Modelling Specifying and Proving Logic in a Nutshell Proof Tools Model Checking Program Logics and Program Annotation Specifying and Deriving Refinement Extraction Execution Specifying and Transforming Conclusions Are Formal Methods Tools Ready for Industry? Is Industry Ready to Use Formal Methods? 39 ix
3 Conients 2.7 To Learn More 39 References 40 Prepositional Logic Syntax Semantics Proof System Soundness and Completeness Validity Checking: Semantic Methods Normal Forms in Propositional Logic Validity of CNF Formulas Satisfiability of CNF Formulas Validity Checking: Deductive Methods To Learn More Exercises 76 References 78 FirstOrder Logic Syntax Semantics Proof System Soundness and Completeness Validity Checking Negation and Prenex Normal Forms Herbrand/Skolem Normal Forms and SemiDecidability Decidable Fragments Variations and Extensions FirstOrder Logic with Equality ManySorted FirstOrder Logic SecondOrder Logic FirstOrder Theories Equality Natural Numbers Integers Arrays Other Theories Combining Theories To Learn More Exercises 124 References 127 Hoare Logic Annotated While Programs Program Seman tics The While'"'Programming Language Specifications and Hoare Triples 136
4 Contents xi 5.3 Loop Invariants Hoare Calculus The Whilearray Programming Language A Rule of Hoare Logic for Array Assignment Loop Termination and Total Correctness Adaptation To Learn More Exercises 155 References Generating Verification Conditions Mechanising Hoare Logic The Weakest Precondition Strategy An Architecture for Program Verification A VCGen Algorithm Calculating the Weakest Precondition Calculating Verification Conditions Putting It All Together Verification Conditions for Whilearray Programs To Learn More Exercises 178 References Safety Properties Error Semantics and Safe Programs While"" with Errors SafetySensitive Calculus and VCGen Safe Whileint Programs Bounded Arrays: The Whilearray N Language Safe Whilearray N Programs An Alternative Formalisation of Bounded Arrays To Learn More Exercises 193 References Procedures and Contracts Procedures and Recursion The "Notation Recursive Procedures Procedure Calls in System Contracts and Mutual Recursion Programming with Contracts Inference System for Parameterless Procedures Verification Conditions for Parameterless Procedures Frame Conditions Procedures with Parameters 208
5 xii Contents Parameters Passed by Value Parameters Passed by Reference Aliasing Return Values and Pure Functions To Learn More Exercises 226 References Specifying C Programs An Introduction to ACSL ArrayBased Programs Using Axiomatics Function Calls State Labels and Behaviours To Learn More Exercises 239 References Verifying C Programs Safety Verification Arithmetic Overflow Safety Safety of Array Access Adding Loop Invariants Termination Checking and Loop Variants Safety of Function Calls Functional Correctness: Array Partitioning Functional Correctness: Multiset Preservation A Word of Caution Pointer Variables and Parameters Passed by Reference To Learn More Exercises 255 References 255 Index 258
Rigorous Software Engineering Hoare Logic and Design by Contracts
Rigorous Software Engineering Hoare Logic and Design by Contracts Simão Melo de Sousa RELEASE (UBI), LIACC (Porto) Computer Science Department University of Beira Interior, Portugal 20102011 S. Melo de
More informationRigorous Software Development CSCIGA 3033009
Rigorous Software Development CSCIGA 3033009 Instructor: Thomas Wies Spring 2013 Lecture 11 Semantics of Programming Languages Denotational Semantics Meaning of a program is defined as the mathematical
More informationValidity Checking. Propositional and FirstOrder Logic (part I: semantic methods)
Validity Checking Propositional and FirstOrder Logic (part I: semantic methods) Slides based on the book: Rigorous Software Development: an introduction to program verification, by José Bacelar Almeida,
More informationMAPI Programa Doutoral em Informática. Rigorous Software Development
MAPI Programa Doutoral em Informática Rigorous Software Development Unidade Curricular em Teoria e Fundamentos Theory and Foundations (UCTF) DIUM, DCCFCUP May, 2012 Abstract This text presents a UCTF
More informationAutomated Theorem Proving  summary of lecture 1
Automated Theorem Proving  summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
More informationVerification of Imperative Programs in Theorema
Verification of Imperative Programs in Theorema Laura Ildikó Kovács, Nikolaj Popov, Tudor Jebelean 1 Research Institute for Symbolic Computation, Johannes Kepler University, A4040 Linz, Austria Institute
More informationStaRVOOrS: A Tool for Combined Static and Runtime Verification of Java
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.
More informationApplications of formal verification for secure Cloud environments at CEA LIST
Applications of formal verification for secure Cloud environments at CEA LIST Nikolai Kosmatov joint work with A.Blanchard, F.Bobot, M.Lemerre,... SEC2, Lille, June 30 th, 2015 N. Kosmatov (CEA LIST) Formal
More informationA Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept
More informationJava+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics
: A Verification Tool Based on Hoare Logic and Algebraic Semantics Department of Computer Science University of Illinois at UrbanaChampaign 6th International Workshop on Rewriting Logic and its Applications,
More informationCSE 459/598: Logic for Computer Scientists (Spring 2012)
CSE 459/598: Logic for Computer Scientists (Spring 2012) Time and Place: T Th 10:3011:45 a.m., M109 Instructor: Joohyung Lee (joolee@asu.edu) Instructor s Office Hours: T Th 4:305:30 p.m. and by appointment
More informationFoundational Proof Certificates
An application of proof theory to computer science INRIASaclay & LIX, École Polytechnique CUSO Winter School, Proof and Computation 30 January 2013 Can we standardize, communicate, and trust formal proofs?
More informationExtended Static Checking for Java
Lukas TU München  Seminar Verification 14. Juli 2011 Outline 1 Motivation 2 ESC/Java example 3 ESC/JAVA architecture VC generator Simplify 4 JML + ESC/Java annotation language JML What ESC/Java checks
More informationSpecification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27  Nov.
More informationML for the Working Programmer
ML for the Working Programmer 2nd edition Lawrence C. Paulson University of Cambridge CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface to the Second Edition Preface xiii xv 1 Standard ML 1 Functional Programming
More informationPROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE
International Journal of Computer ScienceandCommunication Vol. 2, No. 1, JanuaryJune2011, pp. 153157 PROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE Neeraj Kumar Singhania University,
More informationWe would like to state the following system of natural deduction rules preserving falsity:
A Natural Deduction System Preserving Falsity 1 Wagner de Campos Sanz Dept. of Philosophy/UFG/Brazil sanz@fchf.ufg.br Abstract This paper presents a natural deduction system preserving falsity. This new
More informationCS510 Software Engineering
CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15cs510se
More informationCHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
More information[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
More informationIntroducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
More informationFormal Verification of Software
Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCCFCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification
More informationFormal Engineering for Industrial Software Development
Shaoying Liu Formal Engineering for Industrial Software Development Using the SOFL Method With 90 Figures and 30 Tables Springer Contents Introduction 1 1.1 Software Life Cycle... 2 1.2 The Problem 4 1.3
More informationOverview presentation, CIEL, Bordeaux, 9 June 2015. Means Eidgenösische Technische Hochschule (German)
Chair of Software Engineering, ETH Zurich Overview presentation, CIEL, Bordeaux, 9 June 2015 Bertrand Meyer 1 ETH Means Eidgenösische Technische Hochschule (German) The only federal university in Switzerland
More informationFixedPoint Logics and Computation
1 FixedPoint Logics and Computation Symposium on the Unusual Effectiveness of Logic in Computer Science University of Cambridge 2 Mathematical Logic Mathematical logic seeks to formalise the process of
More information4 Domain Relational Calculus
4 Domain Relational Calculus We now present two relational calculi that we will compare to RA. First, what is the difference between an algebra and a calculus? The usual story is that the algebra RA is
More informationDo not open this examination paper until instructed to do so. Section A: answer all the questions. Section B: answer all the questions.
N10/5/COMSC/HP1/ENG/TZ0/XX 88107011 Computer science HIGHER level Paper 1 Tuesday 16 November 2010 (afternoon) 2 hours 15 minutes INSTRUCTIONS TO CANDIDATES Do not open this examination paper until instructed
More informationRegression Verification: Status Report
Regression Verification: Status Report Presentation by Dennis Felsing within the Projektgruppe Formale Methoden der Softwareentwicklung 20131211 1/22 Introduction How to prevent regressions in software
More informationAn Approach to Model Checking Ada Programs
An Approach to Model Checking Ada Programs José Miguel Faria 1,2, João Martins 1, and Jorge Sousa Pinto 1 1 Departamento de Informática / CCTC, Universidade do Minho, Braga, Portugal 2 Critical Software,
More informationLogic in general. Inference rules and theorem proving
Logical Agents Knowledgebased agents Logic in general Propositional logic Inference rules and theorem proving First order logic Knowledgebased agents Inference engine Knowledge base Domainindependent
More informationConstructing Contracts: Making Discrete Mathematics Relevant to Beginning Programmers
Constructing Contracts: Making Discrete Mathematics Relevant to Beginning Programmers TIMOTHY S. GEGGHARRISON Winona State University Although computer scientists understand the importance of discrete
More informationRigorous Software Development An introduction
Rigorous Software Development An introduction Simão Melo de Sousa RELEASE (UBI), LIACC (Porto), CCTC (Minho) Computer Science Department University of Beira Interior, Portugal October 2011 S. Melo de Sousa
More informationFunctional Programming. Functional Programming Languages. Chapter 14. Introduction
Functional Programming Languages Chapter 14 Introduction Functional programming paradigm History Features and concepts Examples: Lisp ML 1 2 Functional Programming Functional Programming Languages The
More information1.1 Logical Form and Logical Equivalence 1
Contents Chapter I The Logic of Compound Statements 1.1 Logical Form and Logical Equivalence 1 Identifying logical form; Statements; Logical connectives: not, and, and or; Translation to and from symbolic
More informationComputer Arithmetic Aliasing issues: Call by reference, Pointer programs
Computer Arithmetic Aliasing issues: Call by reference, Pointer programs Claude Marché Cours MPRI 2361 Preuve de Programme 24 janvier 2014 Outline Exercises from last lecture Computer Arithmetic Handling
More informationFirstOrder Logics and Truth Degrees
FirstOrder Logics and Truth Degrees George Metcalfe Mathematics Institute University of Bern LATD 2014, Vienna Summer of Logic, 1519 July 2014 George Metcalfe (University of Bern) FirstOrder Logics
More informationWESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math
Textbook Correlation WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Following Directions Unit FIRST QUARTER AND SECOND QUARTER Logic Unit
More informationStatic Analysis of Dynamic Properties  Automatic Program Verification to Prove the Absence of Dynamic Runtime Errors
Static Analysis of Dynamic Properties  Automatic Program Verification to Prove the Absence of Dynamic Runtime Errors Klaus Wissing PolySpace Technologies GmbH Argelsrieder Feld 22 82234 WesslingOberpfaffenhofen
More informationSafe ObjectOriented Software: The Verified DesignByContract Paradigm
Safe ObjectOriented Software: The Verified DesignByContract Paradigm David Crocker Escher Technologies Ltd. Aldershot, United Kingdom dcrocker@eschertech.com Abstract. In recent years, large sectors
More informationLEVERAGING DEDUCTIVE VERIFICATION IN INDUSTRIAL CONTEXTS
LEVERAGING DEDUCTIVE VERIFICATION IN INDUSTRIAL CONTEXTS CEA S SOFTWARE SAFETY LABORATORY 1995: LEAP FROM DYNAMIC TO STATIC CODE ANALYSIS! CAVEAT: ARCHITECTURE C source code VC Generator Formal specifications
More informationComputational Logic and Cognitive Science: An Overview
Computational Logic and Cognitive Science: An Overview Session 1: Logical Foundations Technical University of Dresden 25th of August, 2008 University of Osnabrück Who we are Helmar Gust Interests: Analogical
More informationA Propositional Dynamic Logic for CCS Programs
A Propositional Dynamic Logic for CCS Programs Mario R. F. Benevides and L. Menasché Schechter {mario,luis}@cos.ufrj.br Abstract This work presents a Propositional Dynamic Logic in which the programs are
More informationKnow or Go Practical Quest for Reliable Software
Know or Go Practical Quest for Reliable Software Dr.Ing. Jörg Barrho Dr.Ing. Ulrich Wünsche AVACS Project meeting 25.09.2014 2014 RollsRoyce Power Systems AG The information in this document is the
More informationWhat's Wrong With Formal Programming Methods? Eric C.R. Hehner
What's Wrong With Formal Programming Methods? Eric C.R. Hehner Department of Computer Science, University of Toronto, Toronto M5S 1A4 Canada The January 1991 issue of Computing Research News includes the
More informationBoundedwidth QBF is PSPACEcomplete
Boundedwidth QBF is PSPACEcomplete Albert Atserias 1 and Sergi Oliva 2 1 Universitat Politècnica de Catalunya Barcelona, Spain atserias@lsi.upc.edu 2 Universitat Politècnica de Catalunya Barcelona, Spain
More informationExtraction of certified programs with effects from proofs with monadic types in Coq
Extraction of certified programs with effects from proofs with monadic types in Coq Marino Miculan 1 and Marco Paviotti 2 1 Dept. of Mathematics and Computer Science, University of Udine, Italy 2 IT University
More informationA Formally Verified Calculus for Full Java Card
A Formally Verified Calculus for Full Java Card Kurt Stenzel Lehrstuhl für Softwaretechnik und Programmiersprachen Institut für Informatik, Universität Augsburg 86135 Augsburg Germany email: stenzel@informatik.uniaugsburg.de
More informationTool Support for Invariant Based Programming
Tool Support for Invariant Based Programming RalphJohan Back and Magnus Myreen Abo Akademi University, Department of Computer Science Lemminkainenkatu 14 A, FIN20520 Turku, Finland Email: backrj@abo.fi,
More informationReasoning about Safety Critical Java
Reasoning about Safety Critical Java Chris Marriott 27 th January 2011 Motivation Safety critical systems are becoming part of everyday life Failure can potentially lead to serious consequences Verification
More informationA Systematic Approach. to Parallel Program Verication. Tadao TAKAOKA. Department of Computer Science. Ibaraki University. Hitachi, Ibaraki 316, JAPAN
A Systematic Approach to Parallel Program Verication Tadao TAKAOKA Department of Computer Science Ibaraki University Hitachi, Ibaraki 316, JAPAN Email: takaoka@cis.ibaraki.ac.jp Phone: +81 94 38 5130
More informationInvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPISWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
More informationCertamen 1 de Representación del Conocimiento
Certamen 1 de Representación del Conocimiento Segundo Semestre 2012 Question: 1 2 3 4 5 6 7 8 9 Total Points: 2 2 1 1 / 2 1 / 2 3 1 1 / 2 1 1 / 2 12 Here we show one way to solve each question, but there
More informationThomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science. Unit of Study / Textbook Correlation
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science updated 03/08/2012 Unit 1: JKarel 8 weeks http://www.fcps.edu/is/pos/documents/hs/compsci.htm
More informationStructure of Presentation. Stages in Teaching Formal Methods. Motivation (1) Motivation (2) The Scope of Formal Methods (1)
Stages in Teaching Formal Methods A. J. Cowling Structure of Presentation Introduction to Issues Motivation for this work. Analysis of the Role of Formal Methods Define their scope; Review their treatment
More informationSummary Last Lecture. Automated Reasoning. Outline of the Lecture. Definition sequent calculus. Theorem (Normalisation and Strong Normalisation)
Summary Summary Last Lecture sequent calculus Automated Reasoning Georg Moser Institute of Computer Science @ UIBK Winter 013 (Normalisation and Strong Normalisation) let Π be a proof in minimal logic
More informationFrom Program Verification to Certified Binaries
From Program Verification to Certified Binaries The Quest for the Holy Grail of Software Engineering Angelos Manousaridis, Michalis A. Papakyriakou, and Nikolaos S. Papaspyrou National Technical University
More informationThe Designer's Guide to VHDL
The Designer's Guide to VHDL Third Edition Peter J. Ashenden EDA CONSULTANT, ASHENDEN DESIGNS PTY. LTD. ADJUNCT ASSOCIATE PROFESSOR, ADELAIDE UNIVERSITY AMSTERDAM BOSTON HEIDELBERG LONDON m^^ yj 1 ' NEW
More informationChair of Software Engineering. Software Verification. Assertion Inference. Carlo A. Furia
Chair of Software Engineering Software Verification Assertion Inference Carlo A. Furia Proving Programs Automatically The Program Verification problem: Given: a program P and a specification S = [Pre,
More informationRemarks on NonFregean Logic
STUDIES IN LOGIC, GRAMMAR AND RHETORIC 10 (23) 2007 Remarks on NonFregean Logic Mieczys law Omy la Institute of Philosophy University of Warsaw Poland m.omyla@uw.edu.pl 1 Introduction In 1966 famous Polish
More informationRuntime Verification of Computer Programs and its Application in Programming Education
Runtime Verification of Computer Programs its Application in Programming Education Magdalina V. Todorova, Petar R. Armyanov Abstract The paper presents a technique for runtime program verification its
More informationA Distributed Calculus for RoleBased Access Control
A Distributed Calculus for RoleBased Access Control Chiara Braghin joint work with D. Gorla and V. Sassone MyThS Meeting, Venice, June, 14th, 2004 A Distributed Calculus for RoleBased Access Control
More informationAutomated Program Behavior Analysis
Automated Program Behavior Analysis Stacy Prowell sprowell@cs.utk.edu March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is
More informationStatic Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
More informationConcurrent Programming
Concurrent Programming Principles and Practice Gregory R. Andrews The University of Arizona Technische Hochschule Darmstadt FACHBEREICH INFCRMATIK BIBLIOTHEK InventarNr.:..ZP.vAh... Sachgebiete:..?r.:..\).
More informationTable of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives
Table of Contents Table of Contents Preface Chapter 1 Introduction 1.1 Background 1.2 Problem description 1.3 The role of standardization 1.4 Scope and objectives 1.5 Approach 1.6 Related work 1.7 General
More informationSoftware Verification: InfiniteState Model Checking and Static Program
Software Verification: InfiniteState Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus MüllerOlm 3 1 Uppsala Universitet,
More informationDeductive Program Verification
ORSAY N o d ordre : 1448 UNIVERSITÉ DE PARISSUD 11 CENTRE D ORSAY THÈSE présentée pour obtenir L HABILITATION À DIRIGER DES RECHERCHES DE L UNIVERSITÉ PARISSUD 11 PAR JeanChristophe Filliâtre SUJET
More information3 Extending the Refinement Calculus
Building BSP Programs Using the Refinement Calculus D.B. Skillicorn? Department of Computing and Information Science Queen s University, Kingston, Canada skill@qucis.queensu.ca Abstract. We extend the
More informationSoftware Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF  Sezione STI University of Urbino Carlo Bo Italy 34 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
More informationThe Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
More informationAutomatic Generation of Coq Certificates from Instrumented Static Analyzers
Automatic Generation of Coq Certificates from Instrumented Static Analyzers Manuel Garnacho 1, Michaël Périn 2 1 irit  Université Paul Sabatier (Toulouse III), France 2 Verimag  Université Joseph Fourier
More informationAdversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
More information11QA 1 11QA. Increased cost to distribute modifications Technical reviews. Increased customer support Document reviews
Software Qualities Quality Assurance Maintainer Go Documentation Readable Ce Go Design Functionality Ease of use Ease of learning User Reliability Correctness Efficiency Low Cost Portability Increased
More informationIndexed Types in ObjectOriented Programming
Indexed Types in ObjectOriented Programming Joana Campos and Vasco T. Vasconcelos University of Lisbon, Faculty of Sciences, LaSIGE Abstract. Dependent type systems allow semantic properties to be expressed
More informationA Note on Context Logic
A Note on Context Logic Philippa Gardner Imperial College London This note describes joint work with Cristiano Calcagno and Uri Zarfaty. It introduces the general theory of Context Logic, and has been
More informationSCADE SUITE SOFTWARE VERIFICATION PLAN FOR DO178B LEVEL A & B
SCADE SUITE SOFTWARE VERIFICATION PLAN FOR DO78B LEVEL A & B TABLE OF CONTENTS. INTRODUCTION..... PURPOSE..... RELATED DOCUMENTS..... GLOSSARY... 9.. CONVENTIONS..... RELATION WITH OTHER PLANS....6. MODIFICATION
More informationSoftware Verification and Testing. Lecture Notes: Z I
Software Verification and Testing Lecture Notes: Z I Motivation so far: we have seen that properties of software systems can be specified using firstorder logic, set theory and the relational calculus
More informationParametric Domaintheoretic models of Linear Abadi & Plotkin Logic
Parametric Domaintheoretic models of Linear Abadi & Plotkin Logic Lars Birkedal Rasmus Ejlers Møgelberg Rasmus Lerchedahl Petersen IT University Technical Report Series TR007 ISSN 600 600 February 00
More informationQuery Processing in Data Integration Systems
Query Processing in Data Integration Systems Diego Calvanese Free University of BozenBolzano BIT PhD Summer School Bressanone July 3 7, 2006 D. Calvanese Data Integration BIT PhD Summer School 1 / 152
More informationPath Querying on Graph Databases
Path Querying on Graph Databases Jelle Hellings Hasselt University and transnational University of Limburg 1/38 Overview Graph Databases Motivation Walk Logic Relations with FO and MSO Relations with CTL
More informationFoundations of Logic and Mathematics
Yves Nievergelt Foundations of Logic and Mathematics Applications to Computer Science and Cryptography Birkhäuser Boston Basel Berlin Contents Preface Outline xiii xv A Theory 1 0 Boolean Algebraic Logic
More informationCorrespondence analysis for strong threevalued logic
Correspondence analysis for strong threevalued logic A. Tamminga abstract. I apply Kooi and Tamminga s (2012) idea of correspondence analysis for manyvalued logics to strong threevalued logic (K 3 ).
More informationAdvances in Programming Languages
Advances in Programming Languages Lecture 13: Certifying Correctness Ian Stark School of Informatics The University of Edinburgh Tuesday 4 November 2014 Semester 1 Week 8 http://www.inf.ed.ac.uk/teaching/courses/apl
More informationMathematics. Operating Systems. Institution: Vilniaus kolegija/university of Applied Sciences
Institution: Vilniaus kolegija/university of Applied Sciences Mathematics Provide knowledge of logical laws of Mathematics and theoretical calculations, in order to develop subject and professional competencies.
More informationType Systems. Luca Cardelli. Microsoft Research
Type Systems Luca Cardelli Microsoft Research 1 Introduction The fundamental purpose of a type system is to prevent the occurrence of execution errors during the running of a program. This informal statement
More informationFrom Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
More informationLecture Notes on Linear Search
Lecture Notes on Linear Search 15122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 29, 2013 1 Introduction One of the fundamental and recurring problems in computer science is
More informationModal Proofs as Distributed Programs (Extended Abstract)
Modal Proofs as Distributed Programs (Extended Abstract) Limin Jia and David Walker Princeton University 35 Olden St., Princeton, NJ 08544, USA {ljia,dpw}@cs.princeton.edu Abstract. We develop a new foundation
More informationCCA CYBER SECURITY TRACK
CCA CYBER SECURITY TRACK 20132014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 20132014
More informationINF5140: Specification and Verification of Parallel Systems
Motivation INF5140: Specification and Verification of Parallel Systems Lecture 1 Introduction: Formal Methods Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2009 Outline
More informationChapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
More informationACSL By Example. Towards a Verified C Standard Library. Version 4.2.1 for FramaC Beryllium 2 April 2010
ACSL By Example Towards a Verified C Standard Library Version 4.2.1 for FramaC Beryllium 2 April 2010 Jochen Burghardt Jens Gerlach Kerstin Hartig Hans Pohl Juan Soto This body of work was completed within
More informationADVANCED SCHOOL OF SYSTEMS AND DATA STUDIES (ASSDAS) PROGRAM: CTech in Computer Science
ADVANCED SCHOOL OF SYSTEMS AND DATA STUDIES (ASSDAS) PROGRAM: CTech in Computer Science Program Schedule CTech Computer Science Credits CS101 Computer Science I 3 MATH100 Foundations of Mathematics and
More informationA Modular Representation of a Business Process Planner
A Modular Representation of a Business Process Planner Shahab Tasharrofi and Evgenia Ternovska School of Computing Science Simon Fraser University Canada 1st International Workshop on Knowledgeintensive
More informationFundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
More informationModule 10. Coding and Testing. Version 2 CSE IIT, Kharagpur
Module 10 Coding and Testing Lesson 23 Code Review Specific Instructional Objectives At the end of this lesson the student would be able to: Identify the necessity of coding standards. Differentiate between
More informationAlgorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
More informationINFORMATION SECURITY PRINCIPLES AND PRACTICE
INFORMATION SECURITY PRINCIPLES AND PRACTICE Mark Stamp San Jose State University 'INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION Preface About The Author Acknowledgments xv xix xxi 1 INTRODUCTION
More informationMATHEMATICAL LOGIC FOR COMPUTER SCIENCE
MATHEMATICAL LOGIC FOR COMPUTER SCIENCE Second Edition WORLD SCIENTIFIC SERIES IN COMPUTER SCIENCE 25: Computer Epistemology A Treatise on the Feasibility of the Unfeasible or Old Ideas Brewed New (T Vamos)
More informationA Static Analyzer for Large SafetyCritical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large SafetyCritical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
More information