Program Development through Proof Transformation
نویسندگان
چکیده
We present a methodology for deriving veri ed programs that combines theorem proving and proof transformation steps. It extends the paradigm employed in systems like NuPrl where a program is developed and veri ed through the proof of the speci cation in a constructive type theory. We illustrate our methodology through an extended example | a derivation of Warshall's algorithm for graph reachability. We also outline how our framework supports the de nition, implementation, and use of abstract data types.
منابع مشابه
Proof Planning with Schema Frameworks ?
Recently, schema-based program transformation and synthesis techniques have received a lot of attention, especially at LOPSTR. It seems that schema-based techniques often fall into one of two categories: either they are pragmatic, designed for carrying out real program transformation or synthesis operations, but lacking the logical basis that they need to ensure that they really do synthesise/t...
متن کاملTransformation Management in the Program of development and Innovation in Medical Science Education: A Survey of Experts' Viewpoints
Background and Purpose:The program of development and innovation in medical education with realistic understanding of the current situation of health education, has developed clever strategies for development of health education system. This research has been done to investigate the management status of this program. Method:Thiscross-sectional study was descriptive-analytic.The population were ...
متن کاملSecure Multi-Execution through Static Program Transformation
Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell, SME enforces security by running one execution of the program per security level, and by reinterpreting input/output operations w.r.t. their associated security level. SME is sound, in the sense that the execution of a program under SME is non-interfering, and precise, in the sense that for pro...
متن کاملSecure multi-execution through static program transformation: extended version
Secure multi-execution (SME) is a dynamic technique to ensure secure information ow. In a nutshell, SME enforces security by running one execution of the program per security level, and by reinterpreting input/output operations w.r.t. their associated security level. SME is sound, in the sense that the execution of a program under SME is non-interfering, and precise, in the sense that for progr...
متن کاملHerbrand’s theorem and extractive proof theory
Proof theory has its historic origin in foundational issues centered around (relative) consistency proofs (Hilbert’s program). Since the 1950’s Georg Kreisel pushed for a shift of emphasis in proof theory towards the use of proof theoretic transformations (as developed in the course of Hilbert’s program) to analyze given proofs P e.g. of ineffectively proved ∀∃-statements C with the aim to extr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1990