Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Analysing logic programs by reasoning backwards
One recent advance in program development has been the application of abstract
interpretation to verify the partial correctness of a (constraint) logic program. Traditionally …
interpretation to verify the partial correctness of a (constraint) logic program. Traditionally …
Inferring definite counterexamples through under-approximation
J Brauer, A Simon - NASA Formal Methods Symposium, 2012 - Springer
Abstract interpretation for proving safety properties summarizes concrete traces into abstract
states, thereby trading the ability to distinguish traces for tractability. Given a violation of a …
states, thereby trading the ability to distinguish traces for tractability. Given a violation of a …
Abduction of linear arithmetic constraints
MJ Maher - International Conference on Logic Programming, 2005 - Springer
Abduction is usually carried out on partially-defined predicates. In this paper we investigate
abduction applied to fully-defined predicates, specifically linear arithmetic constraints over …
abduction applied to fully-defined predicates, specifically linear arithmetic constraints over …
Proofs you can believe in: proving equivalences between prolog semantics in Coq
Basing program analyses on formal semantics has a long and successful tradition in the
logic programming paradigm. These analyses rely on results about the relative correctness …
logic programming paradigm. These analyses rely on results about the relative correctness …
A program transformation for backwards analysis of logic programs
JP Gallagher - International Symposium on Logic-Based Program …, 2003 - Springer
The input to backwards analysis is a program together with properties that are required to
hold at given program points. The purpose of the analysis is to derive initial goals or pre …
hold at given program points. The purpose of the analysis is to derive initial goals or pre …
[PDF][PDF] Logic For Exploit Detection: Utilizing Proof Search for Exploitability Detection in Compact Software Systems
KE Miandoab - 2024 - digital.wpi.edu
Compact, yet complex systems and software are widely utilized, both on administrative,
organizational, and personal levels, for the processing of large amounts of data. These …
organizational, and personal levels, for the processing of large amounts of data. These …
Backward pair sharing analysis
This paper presents a backward sharing analysis for logic programs. The analysis computes
pre-conditions for a query that guarantee a given post-condition is satisfied after the query is …
pre-conditions for a query that guarantee a given post-condition is satisfied after the query is …
Mutual exclusion by interpolation
J Kriener, A King - International Symposium on Functional and Logic …, 2012 - Springer
The question of what constraints must hold for a predicate to behave as a (partial) function,
is key to understanding the behaviour of a logic program. It has been shown how this …
is key to understanding the behaviour of a logic program. It has been shown how this …
[PDF][PDF] Proofs You Can Believe In
J Kriener, A King, S Blazy - … between Prolog semantics in Coq. In: 15th …, 2013 - Citeseer
Basing program analyses on formal semantics has a long and successful tradition in the
logic programming paradigm. These analyses rely on results about the relative correctness …
logic programming paradigm. These analyses rely on results about the relative correctness …
Inverting abstract unification for set-sharing
X Li, L Lu - Proceedings of the 7th ACM SIGPLAN international …, 2005 - dl.acm.org
This paper presents an inversion of the abstract unification operator for forward set-sharing
analysis of logic programs. The inverted operator, called a backward abstract unification …
analysis of logic programs. The inverted operator, called a backward abstract unification …