نتایج جستجو برای: verified computation

تعداد نتایج: 210263  

Journal: :ACM SIGPLAN Notices 2015

Journal: :Proceedings of the ACM on programming languages 2022

Conflict-free replicated data types (CRDTs) are a promising tool for designing scalable, coordination-free distributed systems. However, constructing correct CRDTs is difficult, posing challenge even seasoned developers. As result, CRDT development still largely the domain of academics, with new designs often awaiting peer review and manual proof correctness. In this paper, we present Katara, p...

Journal: :ACM Transactions in Embedded Computing Systems 2021

Dataflow languages allow the specification of reactive systems by mutually recursive stream equations, functions, and boolean activation conditions called clocks. Lustre Scade are dataflow for programming embedded systems. programs compiled a succession passes. This article focuses on normalization pass which rewrites into simpler form required code generation. Vélus is compiler from normalized...

2017
Tobias Nipkow

Andersson introduced general balanced trees, search trees based on the design principle of partial rebuilding: perform update operations naively until the tree becomes too unbalanced, at which point a whole subtree is rebalanced. We define and analyze a functional version of general balanced trees which we call root-balanced trees. Using a lightweight model of execution time, amortized logarith...

Journal: :Concurrency and Computation: Practice and Experience 2001
Gerwin Klein Tobias Nipkow

The Java Virtual Machine (JVM) comprises a typed assembly language, an abstract machine for executing it, and the so-called Bytecode Verifier (BV) for checking the welltypedness of JVM programs. Resource-bounded JVM implementations on smart cards do not provide bytecode verification because of the relatively high space and time consumption. They either do not allow dynamic loading of JVM code a...

2015
Vania Joloboff Jean-François Monin Xiaomu Shi

This paper presents an approach to construct a verified virtual prototyping framework of embedded software. The machine code executed on a simulated target architecture can be proven to provide the same results as the real hardware, and the proof is verified with a theorem prover. The method consists in proving each instruction of the instruction set independently, by proving that the execution...

Journal: :Philosophical transactions. Series A, Mathematical, physical, and engineering sciences 2017
Philippa Gardner

Modern society is faced with a fundamental problem: the reliability of complex, evolving software systems on which society critically depends cannot be guaranteed by the established, non-mathematical computer engineering techniques such as informal prose specification and ad hoc testing. The situation is worsening: modern companies are moving fast, leaving little time for code analysis and test...

2006
Martin Wildmoser

Proof Carrying Code (PCC) is a technique to exclude safety errors in low level code. Instead of runtime tests, it statically checks a proof of safety (a certificate) attached to the code. To guarantee that PCC only accepts safe code, we formalise and verify it in Isabelle/HOL, an interactive theorem prover for higher order logic. In an abstract framework we identify key components and their int...

Journal: :Proceedings of the Royal Society of Medicine 1931

Journal: :Journal of Automated Reasoning 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید