نتایج جستجو برای: verified computation

تعداد نتایج: 210263  

Journal: :Reliable Computing 1996
W. Krämer S. Wedner

We propose a two algorithms for computation of (sharp) enclosures of definite interevals: a lor.rd adaptive dgorid~a (LAA) and a g/oba/ a&,pth~ cdgor92~n (GAA). Both algorithms are based (m Gauss-Legendre ~ladrature. Error terms are bounded using automatic differentiation in combination with interval evah:adons. Several nmnerical examples are presented; these examples include comparis~m with an...

Journal: :Lecture Notes in Computer Science 2023

Abstract Numerical and symbolic methods for optimization are used extensively in engineering, industry, finance. Various to reduce problems of interest ones that amenable solution by these methods. We develop a framework designing applying such reductions, using the Lean programming language interactive proof assistant. Formal verification makes process more reliable, availability an ambient ma...

2005
Borisav Jovanović Milunka Damnjanović

Three algorithm implementations for square root computation are considered in this paper. Newton-Raphson's, iterative, and binary search algorithm implementations are completely designed, verified and compared. The algorithms, entire system-on-chip realisations and their functioning are described.

2013
Srinath Setty Victor Vu Nikhil Panpalia Benjamin Braun Andrew J. Blumberg Michael Walfish

We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses the PCP theorem and cryptographic techniques to implement an efficient argument system (a kind of interactive protocol). GINGER slashes query costs via protocol refinements; broadens the computational model to include (primitiv...

2012
Srinath T. V. Setty Victor Vu Nikhil Panpalia Benjamin Braun Andrew J. Blumberg Michael Walfish

We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses the PCP theorem and cryptographic techniques to implement an efficient argument system (a kind of interactive protocol). GINGER slashes the query size and costs via theoretical refinements that are of independent interest; broa...

2014
Anthony J. Narkawicz César A. Muñoz

Sturm’s Theorem is a well-known result in real algebraic geometry that provides a function that computes the number of roots of a univariate polynomial in a semiopen interval. This paper presents a formalization of this theorem in the PVS theorem prover, as well as a decision procedure that checks whether a polynomial is always positive, nonnegative, nonzero, negative, or nonpositive on any inp...

2013
K. Rustan M. Leino Nadia Polikarpova

Calculational proofs—proofs by stepwise formula manipulation—are praised for their rigor, readability, and elegance. It seems desirable to reuse this style, often employed on paper, in the context of mechanized reasoning, and in particular, program verification. This work leverages the power of SMT solvers to machine-check calculational proofs at the level of detail they are usually written by ...

Journal: :IACR Cryptology ePrint Archive 2012
Srinath T. V. Setty Victor Vu Nikhil Panpalia Benjamin Braun Andrew J. Blumberg Michael Walfish

We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses the PCP theorem and cryptographic techniques to implement an efficient argument system (a kind of interactive protocol). GINGER slashes the query size and costs via theoretical refinements that are of independent interest; broa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید