Program Development through Proof Transformation

نویسندگان

  • Frank Pfenning
  • F. PFENNING
چکیده

We present a methodology for deriving veri ed programs that combines theorem proving and proof transformation steps. It extends the paradigm employed in systems like NuPrl where a program is developed and veri ed through the proof of the speci cation in a constructive type theory. We illustrate our methodology through an extended example | a derivation of Warshall's algorithm for graph reachability. We also outline how our framework supports the de nition, implementation, and use of abstract data types.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proof Planning with Schema Frameworks ?

Recently, schema-based program transformation and synthesis techniques have received a lot of attention, especially at LOPSTR. It seems that schema-based techniques often fall into one of two categories: either they are pragmatic, designed for carrying out real program transformation or synthesis operations, but lacking the logical basis that they need to ensure that they really do synthesise/t...

متن کامل

Transformation Management in the Program of development and Innovation in Medical Science Education: A Survey of Experts' Viewpoints

Background and Purpose:The program of development and innovation in medical education with realistic understanding of the current situation of health education, has developed clever strategies for development of health education system. This research has been done to investigate the management status of this program. Method:Thiscross-sectional study was descriptive-analytic.The population were ...

متن کامل

Secure Multi-Execution through Static Program Transformation

Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell, SME enforces security by running one execution of the program per security level, and by reinterpreting input/output operations w.r.t. their associated security level. SME is sound, in the sense that the execution of a program under SME is non-interfering, and precise, in the sense that for pro...

متن کامل

Secure multi-execution through static program transformation: extended version

Secure multi-execution (SME) is a dynamic technique to ensure secure information ow. In a nutshell, SME enforces security by running one execution of the program per security level, and by reinterpreting input/output operations w.r.t. their associated security level. SME is sound, in the sense that the execution of a program under SME is non-interfering, and precise, in the sense that for progr...

متن کامل

Herbrand’s theorem and extractive proof theory

Proof theory has its historic origin in foundational issues centered around (relative) consistency proofs (Hilbert’s program). Since the 1950’s Georg Kreisel pushed for a shift of emphasis in proof theory towards the use of proof theoretic transformations (as developed in the course of Hilbert’s program) to analyze given proofs P e.g. of ineffectively proved ∀∃-statements C with the aim to extr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990