Proof-by-Instance for Embedded Network Design From Prototype to Tool Roadmap. Marc Boyer, Loïc Fejoz. 1, Stephan Merz 3
|
|
- Rosalind Woods
- 5 years ago
- Views:
Transcription
1 Proof-by-Instance for Embedded Network Design From Prototype to Tool Roadmap 2 Marc Boyer, Loïc Fejoz 1 1, Stephan Merz 3 RealTime at Work, Nancy, France 2 ONERA The French aerospace Lab, 3 Inria & LORIA, Nancy, France Congress on Embedded Real-Time Software and Systems (ERTSs 20014) 1/19 Boyer, Fejoz, Merz Proof-by-Instance
2 Outline Certicate-based condence / Proof by instance Encoding in Isabelle Generating and checking traces From Prototype to Tool Roadmap Conclusion 2/19 Boyer, Fejoz, Merz Proof-by-Instance
3 Software qualication/certication Process based quality: Per domain standards: DO 178, ECSS-Q-ST specication, tests, documentation generation/transformation tools verication tools high cost Proof by instance / certicate-based condence product based quality provides arguments to verify computation for o-line computations 3/19 Boyer, Fejoz, Merz Proof-by-Instance
4 Proof by instance Idea: for each run, provide a proof of correctness Benets: requires some automatic proof environment (Isabelle, Coq) requires modelling of the context ( specication) proof/certicate generation while computing result transfers condence from tool to proof environment Checking a solution is simpler than proving full correctness of a program Computing software is used as a black box: Open choice of the programming environment Software can evolve without re-qualication Not exactly a verication tool: based on formal proof checker (verier) help the verication tool to makes the proof 4/19 Boyer, Fejoz, Merz Proof-by-Instance
5 The full picture Research Books Network Calculus Theory Articles Current process Network Topology (flows and servers) Tool Specification Network Calculus Tool Bounds (delay and memory) Network Calculus in Isabelle Computation traces Contribution Isabelle/HOL Tool OK/KO 5/19 Boyer, Fejoz, Merz Proof-by-Instance
6 Outline Certicate-based condence / Proof by instance Encoding in Isabelle Generating and checking traces From Prototype to Tool Roadmap Conclusion 6/19 Boyer, Fejoz, Merz Proof-by-Instance
7 Encoding Objects R S R R b(t) v(r,r ) d(t) R R(t) : amount of data send up to time t h(r,r ) Flow R : R R +, x 0 = R(x) = 0, x < y = R(x) R(y) typedef ndf = { f :: ereal ereal. ( r 0. f r = 0) mono f } Server, input/output relation such that R S R = R R t typedef server = { s :: (ndf ndf ) set. ( in. out. (in, out) s) ( (in, out) s. out in) } 7/19 Boyer, Fejoz, Merz Proof-by-Instance
8 Encoding contracts Real behaviour (R, R ) unknown at design = use of contracts Consider (min, +) convolution (f g)(t) = inf {f (t s) + g(s)} 0 s t Trac contract: arrival curve R α def R R α (1) Service contract: service curve ( ) S β def R S R = R R β (2) 8/19 Boyer, Fejoz, Merz Proof-by-Instance
9 Encoding results Network calculus theorem: if a ow R with arrival curve α goes through a server S of service curve β, its delay is not greater than h(α, β). theorem d-h-bound: assumes in α and S β shows worst-delay-server in S h-dev α β 9/19 Boyer, Fejoz, Merz Proof-by-Instance
10 Outline Certicate-based condence / Proof by instance Encoding in Isabelle Generating and checking traces From Prototype to Tool Roadmap Conclusion 10/19 Boyer, Fejoz, Merz Proof-by-Instance
11 Computing and checking Initial set of hypotheses Successive application of theorems: choose an adequate theorem instantiate variables check hypotheses compute operations (sums, convolutions...) generate new facts 11/19 Boyer, Fejoz, Merz Proof-by-Instance
12 Computing and checking Initial set of hypotheses Successive application of theorems: chose an adequate consider one theorem instantiate variables check hypotheses compute check operations (sums, convolutions...) generate store new facts 12/19 Boyer, Fejoz, Merz Proof-by-Instance
13 Running prototype Generates bounds and proofs Able to handle a realistic industrial network: 8 switches 5000 ows Experiment results: Bound accuracy: 2 times greater (i.e. worse) than state-of-the-art RTaW-PEGASE tool Computation time: computing and generating traces: a few minutes check traces: 8 hours Development eort: 1 for 7KLoc of Java 4 3 for 3KLoc of Isabelle theories 4 overhead 2x-3x for formal condence 13/19 Boyer, Fejoz, Merz Proof-by-Instance
14 Outline Certicate-based condence / Proof by instance Encoding in Isabelle Generating and checking traces From Prototype to Tool Roadmap Conclusion 14/19 Boyer, Fejoz, Merz Proof-by-Instance
15 Extend Isabelle theories More theorems statements into Isabelle: more accurate bounds handle more scheduling policies With or without proofs: Without: condence comes from paper-pencil published proofs still prove that tool respects specication With: increase condence contribution to Isabelle theories 15/19 Boyer, Fejoz, Merz Proof-by-Instance
16 Classes of functions Network calculus handles functions How to represent a function? How to compute operations on functions (sum, convolutions)? Simpler to check result than prove algorithm correctness 16/19 Boyer, Fejoz, Merz Proof-by-Instance
17 Intermediate proof format Network Calculus Tool Computation traces (NC proof format) Converter Converter Human readable proof (LaTeX?) Computation proof (Isabelle) Isabelle/HOL Tool Expert Current tool directly generates Isabelle proofs Plan to dene intermediate format: independence wrt the checker engine more compact, more ecient generate human-readable proofs (certication authorities) 17/19 Boyer, Fejoz, Merz Proof-by-Instance
18 Outline Certicate-based condence / Proof by instance Encoding in Isabelle Generating and checking traces From Prototype to Tool Roadmap Conclusion 18/19 Boyer, Fejoz, Merz Proof-by-Instance
19 Conclusion Proof by instance a way to avoid long, costly and boring development process decouple computation and certication well suited for tools based on formal methods Implementation Prototype developed Proof-of-concept validated Road-map for industrial tool Integration into RTaW-PEGASE 19/19 Boyer, Fejoz, Merz Proof-by-Instance
An efficient and simple class of functions to model arrival curve of packetised flows
simple simple of s to model arrival curve of packetised flows Marc Boyer, Jörn Migge, Nicolas Navet RTSS/WCTT Workshop Nov. 29th, 2011 (ONERA,France) simple WCTT - Nov. 2011 1 / 26 Outline simple 1 2 3
More informationTraversal time for weakly synchronized CAN bus
Traversal time for weakly synchronized CAN bus Hugo Daigmorte, Marc Boyer ONERA The French aerospace lab 24th International Conference on Real-Time Networks and Systems RTNS 206 9th October 206 * RTNS
More informationTraversal time for weakly synchronized CAN bus
Traversal time for weakly synchronized CAN bus Hugo Daigmorte, Marc Boyer ONERA The French aerospace lab ème Séminaire Toulousain en Réseaux (STORE) Travaux présentés dans : H. Daigmorte, M. Boyer, Traversal
More informationSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Simulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks Loïc FEJOZ, RealTime-at-Work (RTaW) Bruno REGNIER, CNES Philippe, MIRAMONT, CNES Nicolas
More informationPEGASE a robust and efficient tool for worst-case network traversal time evaluation on AFDX 1
PEGASE a robust and efficient tool for worst-case network traversal time evaluation on AFDX 1 Authors : Marc Boyer ONERA, The French Aerospace Lab F31055 Toulouse Jörn Migge RealTime-at-Work F54600 Villers-lès-Nancy
More informationReducing CAN latencies by use of weak synchronization between stations
Reducing CAN latencies by use of weak synchronization between stations Hugo Daigmorte 1, Marc Boyer 1, Jörn Migge 2 1 ONERA, Université de Toulouse, France 2 RealTime-at-Work, France Scheduling frames
More informationImporting HOL-Light into Coq
Outlines Importing HOL-Light into Coq Deep and shallow embeddings of the higher order logic into Coq Work in progress Chantal Keller chantal.keller@ens-lyon.fr Bejamin Werner benjamin.werner@inria.fr 2009
More informationOutline INSIGHTS ON THE CONFIGURATION AND PERFORMANCES OF SOME/IP SERVICE DISCOVERY. What is SOME/IP and SOME/IP SD
INSIGHTS ON THE CONFIGURATION AND PERFORMANCES OF SOME/IP SERVICE DISCOVERY Jan R. SEYLER, Daimler A.G, Mercedes Cars Nicolas NAVET, University of Luxembourg Loïc FEJOZ, RealTime-at-Work (RTaW) Outline
More informationProofs and Proof Certification in the TLA + Proof System
Proofs and Proof Certification in the TLA + Proof System Stephan Merz Inria Nancy Grand-Est & LORIA, Villers-lès-Nancy, France Abstract TLA + is a specification language originally designed for specifying
More informationExperimental assessment of timing verification techniques for AFDX 1
Experimental assessment of timing verification techniques for AFDX 1 Marc BOYER ONERA, The French Aerospace Lab F31055 Toulouse Nicolas NAVET INRIA/RealTime-at-Work F54600 Villers-lès-Nancy Marc FUMEY
More informationTiming Analysis of Automotive Architectures and Software. Nicolas Navet University of Luxembourg, founder RealTime-at-Work
Timing Analysis of Automotive Architectures and Software Nicolas Navet University of Luxembourg, founder RealTime-at-Work Outline Focus is not the formalisms but on what to expect from timing analysis
More informationIntroduction to Coq Proof Assistant
Introduction to Coq Proof Assistant Qian Hu, M.Sc McMaster University March 3, 2010 Presentation Outline Overview Computer Assistance in Proofs Proof Assistant Coq Introduction The Coq Proof Assistant
More informationA Coq Framework For Verified Property-Based Testing (part of QuickChick)
A Coq Framework For Verified Property-Based Testing (part of QuickChick) Cătălin Hrițcu INRIA Paris-Rocquencourt (Prosecco team, Place d Italie office) Problem: proving in Coq is very costly My proofs
More informationAssistant for Language Theory. SASyLF: An Educational Proof. Corporation. Microsoft. Key Shin. Workshop on Mechanizing Metatheory
SASyLF: An Educational Proof Assistant for Language Theory Jonathan Aldrich Robert J. Simmons Key Shin School of Computer Science Carnegie Mellon University Microsoft Corporation Workshop on Mechanizing
More informationFunctional Programming with Isabelle/HOL
Functional Programming with Isabelle/HOL = Isabelle λ β HOL α Florian Haftmann Technische Universität München January 2009 Overview Viewing Isabelle/HOL as a functional programming language: 1. Isabelle/HOL
More informationAutomated verification of termination certificates
Automated verification of termination certificates Frédéric Blanqui and Kim Quyen Ly Frédéric Blanqui and Kim Quyen Ly Automated verification of termination certificates 1 / 22 Outline 1 Software certification
More informationCompact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University
Compact Sets James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University September 15, 2017 Outline 1 Closed Sets 2 Compactness 3 Homework Closed Sets
More informationFormal Modeling and Analysis of Stream Processing Systems
Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems
More informationAppendix G: Some questions concerning the representation of theorems
Appendix G: Some questions concerning the representation of theorems Specific discussion points 1. What should the meta-structure to represent mathematics, in which theorems naturally fall, be? There obviously
More informationLecture 15. Lecturer: Prof. Sergei Fedotov Calculus and Vectors. Length of a Curve and Parametric Equations
Lecture 15 Lecturer: Prof. Sergei Fedotov 10131 - Calculus and Vectors Length of a Curve and Parametric Equations Sergei Fedotov (University of Manchester) MATH10131 2011 1 / 5 Lecture 15 1 Length of a
More informationFinite Model Generation for Isabelle/HOL Using a SAT Solver
Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly
More informationProvably Correct Software
Provably Correct Software Max Schäfer Institute of Information Science/Academia Sinica September 17, 2007 1 / 48 The Need for Provably Correct Software BUT bugs are annoying, embarrassing, and cost gazillions
More informationDeductive Verification in Frama-C and SPARK2014: Past, Present and Future
Deductive Verification in Frama-C and SPARK2014: Past, Present and Future Claude Marché (Inria & Université Paris-Saclay) OSIS, Frama-C & SPARK day, May 30th, 2017 1 / 31 Outline Why this joint Frama-C
More informationOutline. Analyse et Conception Formelle. Lesson 7. Program verification methods. Disclaimer. The basics. Definition 2 (Specification)
Outline Analyse et Conception Formelle Lesson 7 Program verification methods 1 Testing 2 Model-checking 3 Assisted proof 4 Static Analysis 5 A word about protoypes/models, accuracy, code generation T.
More informationReconstruction of Filament Structure
Reconstruction of Filament Structure Ruqi HUANG INRIA-Geometrica Joint work with Frédéric CHAZAL and Jian SUN 27/10/2014 Outline 1 Problem Statement Characterization of Dataset Formulation 2 Our Approaches
More informationWindow Flow Controller and Subadditivity
0. Michael A. Beck TU Kaiserslautern WFC and Subadditivity S. 0/20 Window Flow Controller and Subadditivity Michael A. Beck TU Kaiserslautern WoNeCa 2016 Michael A. Beck TU Kaiserslautern WFC and Subadditivity
More informationFormal Verification of a Floating-Point Elementary Function
Introduction Coq & Flocq Coq.Interval Gappa Conclusion Formal Verification of a Floating-Point Elementary Function Inria Saclay Île-de-France & LRI, Université Paris Sud, CNRS 2015-06-25 Introduction Coq
More informationWorst-case Ethernet Network Latency for Shaped Sources
Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................
More informationCertification of Termination for Integer Transition Systems
Certification of Termination for Integer Transition Systems Marc Brockschmidt, Sebastiaan Joosten, René Thiemann and Akihisa Yamada Sebastiaan.Joosten@uibk.ac.at Supported by FWF project Y 757 Reliable
More informationCMPSCI 250: Introduction to Computation. Lecture #22: Graphs, Paths, and Trees David Mix Barrington 12 March 2014
CMPSCI 250: Introduction to Computation Lecture #22: Graphs, Paths, and Trees David Mix Barrington 12 March 2014 Graphs, Paths, and Trees Graph Definitions Paths and the Path Predicate Cycles, Directed
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationCOMP 4161 NICTA Advanced Course. Advanced Topics in Software Verification. Toby Murray, June Andronick, Gerwin Klein
COMP 4161 NICTA Advanced Course Advanced Topics in Software Verification Toby Murray, June Andronick, Gerwin Klein λ 1 Last time... λ calculus syntax free variables, substitution β reduction α and η conversion
More informationNatural Semantics [14] within the Centaur system [6], and the Typol formalism [8] which provides us with executable specications. The outcome of such
A Formal Executable Semantics for Java Isabelle Attali, Denis Caromel, Marjorie Russo INRIA Sophia Antipolis, CNRS - I3S - Univ. Nice Sophia Antipolis, BP 93, 06902 Sophia Antipolis Cedex - France tel:
More informationPrototyping a Formal Verification Platform for SoCs
This work is partially funded by the German Federal Ministry of Education, Science, Research and Technology (BMBF) in the framework of the Verisoft project under grant 01 IS C38. The responsibility for
More informationCollaboration with: Dieter Pfoser, Computer Technology Institute, Athens, Greece Peter Wagner, German Aerospace Center, Berlin, Germany
Towards traffic-aware aware a routing using GPS vehicle trajectories Carola Wenk University of Texas at San Antonio carola@cs.utsa.edu Collaboration with: Dieter Pfoser, Computer Technology Institute,
More informationTowards Robust and Flexible Low-Power Wireless Networking
Towards Robust and Flexible Low-Power Wireless Networking Philip Levis (joint work with Leonidas Guibas) Computer Systems Lab Stanford University 3.vii.2007 Low Power Wireless Low cost, numerous devices
More informationA Formally-Proved Algorithm to Compute the Correct Average of Decimal Floating-Point Numbers
A Formally-Proved Algorithm to Compute the Correct Average of Decimal Floating-Point Numbers Sylvie Boldo, Florian Faissole, and Vincent Tourneur 1 ARITH-25 - June 26th 1 Thanks to the IEEE for the student
More informationChapter 1. Introduction
1 Chapter 1 Introduction An exciting development of the 21st century is that the 20th-century vision of mechanized program verification is finally becoming practical, thanks to 30 years of advances in
More informationPolymorphism. Lecture 19 CS 565 4/17/08
Polymorphism Lecture 19 CS 565 4/17/08 The Limitations of F 1 (simply-typed λ- calculus) In F 1 each function works exactly for one type Example: the identity function id = λx:τ. x : τ τ We need to write
More informationOptimization Methods for Machine Learning (OMML)
Optimization Methods for Machine Learning (OMML) 2nd lecture Prof. L. Palagi References: 1. Bishop Pattern Recognition and Machine Learning, Springer, 2006 (Chap 1) 2. V. Cherlassky, F. Mulier - Learning
More informationTowards A Formally Verified Network-on-Chip
Towards A Formally Verified Network-on-Chip Tom van den Broek 1 Julien Schmaltz 12 1 Institute for Computing and Information Sciences Radboud University Nijmegen The Netherlands 2 School of Computer Science
More informationEmbedding logics in Dedukti
1 INRIA, 2 Ecole Polytechnique, 3 ENSIIE/Cedric Embedding logics in Dedukti Ali Assaf 12, Guillaume Burel 3 April 12, 2013 Ali Assaf, Guillaume Burel: Embedding logics in Dedukti, 1 Outline Introduction
More informationKeyNote: Trust Management for Public-Key. 180 Park Avenue. Florham Park, NJ USA.
KeyNote: Trust Management for Public-Key Infrastructures Matt Blaze 1 Joan Feigenbaum 1 Angelos D. Keromytis 2 1 AT&T Labs { Research 180 Park Avenue Florham Park, NJ 07932 USA fmab,jfg@research.att.com
More informationOn the Expressiveness of Polyadicity in Higher-Order Process Calculi
On the Expressiveness of Polyadicity in Higher-Order Process Calculi Ivan Lanese, Jorge A. Pérez, Davide Sangiorgi (Univ. di Bologna) Alan Schmitt (INRIA Grenoble - Rhône Alpes) ICTCS 09 Cremona, September
More informationIntegration of SMT Solvers with ITPs There and Back Again
Integration of SMT Solvers with ITPs There and Back Again Sascha Böhme and University of Sheffield 7 May 2010 1 2 Features: SMT-LIB vs. Yices Translation Techniques Caveats 3 4 Motivation Motivation System
More informationLecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the
More informationApplication of Network Calculus to the TSN Problem Space
Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch
More informationcapture cumulative changes over an interval, while in the HIOA model, the evolution of the continuous state variables over time is modeled using traje
Developing Strategies for Specialized Theorem Proving about Untimed, Timed, and Hybrid I/O Automata? Sayan Mitra 1 and Myla Archer 2 1 MIT Laboratory for Computer Science, 200 Technology Square, Cambridge,
More informationFormal Verification. Lecture 10
Formal Verification Lecture 10 Formal Verification Formal verification relies on Descriptions of the properties or requirements of interest Descriptions of systems to be analyzed, and rely on underlying
More informationInsights on the performance and configuration of AVB and TSN in automotive applications
Insights on the performance and configuration of AVB and TSN in automotive applications Nicolas NAVET, University of Luxembourg Josetxo VILLANUEVA, Groupe Renault Jörn MIGGE, RealTime-at-Work (RTaW) Marc
More informationLecture 9: (Semi-)bandits and experts with linear costs (part I)
CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems
More informationIntroduction to System F. Lecture 18 CS 565 4/20/09
Introduction to System F Lecture 18 CS 565 4/20/09 The Limitations of F 1 (simply-typed λ- calculus) In F 1 each function works exactly for one type Example: the identity function id = λx:τ. x : τ τ We
More informationII (Sorting and) Order Statistics
II (Sorting and) Order Statistics Heapsort Quicksort Sorting in Linear Time Medians and Order Statistics 8 Sorting in Linear Time The sorting algorithms introduced thus far are comparison sorts Any comparison
More informationSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Simulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks Loïc Fejoz, RealTime-at-Work, France Bruno Régnier, CNES, France Philippe Miramont, CNES,
More informationSize of a problem instance: Bigger instances take
2.1 Integer Programming and Combinatorial Optimization Slide set 2: Computational Complexity Katta G. Murty Lecture slides Aim: To study efficiency of various algo. for solving problems, and to classify
More informationPrograms and Proofs in Isabelle/HOL
Programs and Proofs in Isabelle/HOL Makarius Wenzel http://sketis.net March 2016 = Isabelle λ β α Introduction What is Isabelle? Hanabusa Itcho : Blind monks examining an elephant Introduction 2 History:
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game
More informationFrom Types to Sets in Isabelle/HOL
From Types to Sets in Isabelle/HOL Extented Abstract Ondřej Kunčar 1 and Andrei Popescu 1,2 1 Fakultät für Informatik, Technische Universität München, Germany 2 Institute of Mathematics Simion Stoilow
More informationLambda Calculus and Type Inference
Lambda Calculus and Type Inference Björn Lisper Dept. of Computer Science and Engineering Mälardalen University bjorn.lisper@mdh.se http://www.idt.mdh.se/ blr/ August 17, 2007 Lambda Calculus and Type
More informationRelational Abstract Domains for the Detection of Floating-Point Run-Time Errors
ESOP 2004 Relational Abstract Domains for the Detection of Floating-Point Run-Time Errors Antoine Miné École Normale Supérieure Paris FRANCE This work was partially supported by the ASTRÉE RNTL project
More informationReducibilities relations with applications to symbolic dynamics
Reducibilities relations with applications to symbolic dynamics Part I: Computability E. Jeandel LORIA (Nancy, France) E. Jeandel, CASD, Part I: Computability 1/1 Introduction What is computability? Why
More informationBasic Foundations of Isabelle/HOL
Basic Foundations of Isabelle/HOL Peter Wullinger May 16th 2007 1 / 29 1 Introduction into Isabelle s HOL Why Type Theory Basic Type Syntax 2 More HOL Typed λ Calculus HOL Rules 3 Example proof 2 / 29
More informationChapter 1: Key Concepts of Programming and Software Engineering
Chapter 1: Key Concepts of Programming and Software Engineering Software Engineering Coding without a solution design increases debugging time - known fact! A team of programmers for a large software development
More informationSolutions to Exercises
TDDC36 (LOGIC): EXAM Solutions to Exercises EXERCISE 1 1. Prove the following propositional formula: [ ( P Q) (P Q) R ] [ Q R ] (a) (2 points) using tableaux (b) (2 points) using Gentzen system (as provided
More informationStability Analysis of the Muscl Method on General Unstructured Grids for Applications to Compressible Fluid Flow
Stability Analysis of the Muscl Method on General Unstructured Grids for Applications to Compressible Fluid Flow F. Haider 1, B. Courbet 1, J.P. Croisille 2 1 Département de Simulation Numérique des Ecoulements
More informationMath 205B - Topology. Dr. Baez. January 19, Christopher Walker. p(x) = (cos(2πx), sin(2πx))
Math 205B - Topology Dr. Baez January 19, 2007 Christopher Walker Theorem 53.1. The map p : R S 1 given by the equation is a covering map p(x) = (cos(2πx), sin(2πx)) Proof. First p is continuous since
More informationLecture 1: An Introduction to Online Algorithms
Algoritmos e Incerteza (PUC-Rio INF979, 017.1) Lecture 1: An Introduction to Online Algorithms Mar 1, 017 Lecturer: Marco Molinaro Scribe: Joao Pedro T. Brandao Online algorithms differ from traditional
More informationRance Cleaveland The Concurrency Factory is an integrated toolset for specication, simulation,
The Concurrency Factory Software Development Environment Rance Cleaveland (rance@csc.ncsu.edu) Philip M. Lewis (pml@cs.sunysb.edu) y Scott A. Smolka (sas@cs.sunysb.edu) y Oleg Sokolsky (oleg@ccc.com) y
More informationShannon Switching Game
EECS 495: Combinatorial Optimization Lecture 1 Shannon s Switching Game Shannon Switching Game In the Shannon switching game, two players, Join and Cut, alternate choosing edges on a graph G. Join s objective
More informationA NEW PROOF-ASSISTANT THAT REVISITS HOMOTOPY TYPE THEORY THE THEORETICAL FOUNDATIONS OF COQ USING NICOLAS TABAREAU
COQHOTT A NEW PROOF-ASSISTANT THAT REVISITS THE THEORETICAL FOUNDATIONS OF COQ USING HOMOTOPY TYPE THEORY NICOLAS TABAREAU The CoqHoTT project Design and implement a brand-new proof assistant by revisiting
More informationLambda Calculus. CS 550 Programming Languages Jeremy Johnson
Lambda Calculus CS 550 Programming Languages Jeremy Johnson 1 Lambda Calculus The semantics of a pure functional programming language can be mathematically described by a substitution process that mimics
More informationA NEW PROOF-ASSISTANT THAT REVISITS HOMOTOPY TYPE THEORY THE THEORETICAL FOUNDATIONS OF COQ USING NICOLAS TABAREAU
COQHOTT A NEW PROOF-ASSISTANT THAT REVISITS THE THEORETICAL FOUNDATIONS OF COQ USING HOMOTOPY TYPE THEORY NICOLAS TABAREAU The CoqHoTT project Design and implement a brand-new proof assistant by revisiting
More informationSpecification, Verification, and Interactive Proof
Specification, Verification, and Interactive Proof SRI International May 23, 2016 PVS PVS - Prototype Verification System PVS is a verification system combining language expressiveness with automated tools.
More informationINF672 Protocol Safety and Verification. Karthik Bhargavan Xavier Rival Thomas Clausen
INF672 Protocol Safety and Verication Karthik Bhargavan Xavier Rival Thomas Clausen 1 Course Outline Lecture 1 [Today, Sep 15] Introduction, Motivating Examples Lectures 2-4 [Sep 22,29, Oct 6] Network
More information7/28/2011 SECOND HOURLY PRACTICE V Maths 21a, O.Knill, Summer 2011
7/28/2011 SECOND HOURLY PRACTICE V Maths 21a, O.Knill, Summer 2011 Name: Start by printing your name in the above box. Try to answer each question on the same page as the question is asked. If needed,
More informationFormal Proofs of Tarjan s Algorithm in Why3, Coq, and Isabelle
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 Formal Proofs of Tarjan s Algorithm in Why3,
More informationCongruence Closure in Intensional Type Theory
Congruence Closure in Intensional Type Theory Daniel Selsam 1 Leonardo de Moura 2 1 Stanford University 2 Microsoft Research June 30, 2016 Goal Intensional type theory (ITT) Coq, Lean, Agda, Epigram, Idris
More informationOn the Time Complexity of Bucket. Javier Larrosa. January 23, Abstract. In this short note, we prove the time complexity of full-bucket and
On the Time Complexity of Bucket Elimination Algorithms Javier Larrosa Information and Computer Science University of California at Irvine, USA January 23, 2001 Abstract In this short note, we prove the
More informationType Theory meets Effects. Greg Morrisett
Type Theory meets Effects Greg Morrisett A Famous Phrase: Well typed programs won t go wrong. 1. Describe abstract machine: M ::= 2. Give transition relation: M 1 M 2
More informationComputing intersections in a set of line segments: the Bentley-Ottmann algorithm
Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.
More informationSlides 11: Verification and Validation Models
Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.
More informationTowards certification of TLA + proof obligations with SMT solvers
Towards certification of TLA + proof obligations with SMT solvers Stephan Merz and Hernán Vanzetto INRIA Nancy Grand-Est & LORIA Nancy, France Abstract TLA + is a formal specification language that is
More informationTowards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007
Towards a Wireless Lexicon Philip Levis Computer Systems Lab Stanford University 20.viii.2007 Low Power Wireless Low cost, numerous devices Wireless sensornets Personal area networks (PANs) Ad-hoc networks
More informationTHREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions.
THREE LECTURES ON BASIC TOPOLOGY PHILIP FOTH 1. Basic notions. Let X be a set. To make a topological space out of X, one must specify a collection T of subsets of X, which are said to be open subsets of
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 24: Online Algorithms
princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 24: Online Algorithms Lecturer: Matt Weinberg Scribe:Matt Weinberg Lecture notes sourced from Avrim Blum s lecture notes here: http://www.cs.cmu.edu/
More informationComputer-supported Modeling and Reasoning. First-Order Logic. 1 More on Isabelle. 1.1 Isabelle System Architecture
Dipl-Inf Achim D Brucker Dr Burkhart Wolff Computer-supported Modeling and easoning http://wwwinfsecethzch/ education/permanent/csmr/ (rev 16814) Submission date: First-Order Logic In this lecture you
More information1.7 The Heine-Borel Covering Theorem; open sets, compact sets
1.7 The Heine-Borel Covering Theorem; open sets, compact sets This section gives another application of the interval halving method, this time to a particularly famous theorem of analysis, the Heine Borel
More informationLecture 9: More Lambda Calculus / Types
Lecture 9: More Lambda Calculus / Types CSC 131 Spring, 2019 Kim Bruce Pure Lambda Calculus Terms of pure lambda calculus - M ::= v (M M) λv. M - Impure versions add constants, but not necessary! - Turing-complete
More information- M ::= v (M M) λv. M - Impure versions add constants, but not necessary! - Turing-complete. - true = λ u. λ v. u. - false = λ u. λ v.
Pure Lambda Calculus Lecture 9: More Lambda Calculus / Types CSC 131 Spring, 2019 Kim Bruce Terms of pure lambda calculus - M ::= v (M M) λv. M - Impure versions add constants, but not necessary! - Turing-complete
More informationFramework for replica selection in fault-tolerant distributed systems
Framework for replica selection in fault-tolerant distributed systems Daniel Popescu Computer Science Department University of Southern California Los Angeles, CA 90089-0781 {dpopescu}@usc.edu Abstract.
More informationTheorem Proving Principles, Techniques, Applications Recursion
NICTA Advanced Course Theorem Proving Principles, Techniques, Applications Recursion 1 CONTENT Intro & motivation, getting started with Isabelle Foundations & Principles Lambda Calculus Higher Order Logic,
More informationthe assembly level, since part of the structure of the program is lost at compile time the control structure is rather terse (branching to program poi
Abstract Interpretation-Based Certication of Assembly Code Xavier Rival Ecole Normale Superieure 45, rue d'ulm, 75230, Paris cedex 5, France rival@di.ens.fr Abstract. We present a method for analyzing
More informationTheorem proving. PVS theorem prover. Hoare style verification PVS. More on embeddings. What if. Abhik Roychoudhury CS 6214
Theorem proving PVS theorem prover Abhik Roychoudhury National University of Singapore Both specification and implementation can be formalized in a suitable logic. Proof rules for proving statements in
More informationThe clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) We will be interested in s.t. ( )~1. To gain some intuition note ( )
The clique number of a random graph in (,1 2) Let () # -subgraphs in = 2 =:() We will be interested in s.t. ()~1. To gain some intuition note ()~ 2 =2 and so ~2log. Now let us work rigorously. () (+1)
More informationd f(g(t), h(t)) = x dt + f ( y dt = 0. Notice that we can rewrite the relationship on the left hand side of the equality using the dot product: ( f
Gradients and the Directional Derivative In 14.3, we discussed the partial derivatives f f and, which tell us the rate of change of the x y height of the surface defined by f in the x direction and the
More informationA Certified Reduction Strategy for Homological Image Processing
A Certified Reduction Strategy for Homological Image Processing M. Poza, C. Domínguez, J. Heras, and J. Rubio Department of Mathematics and Computer Science, University of La Rioja 19 September 2014 PROLE
More informationSpecifying the Ethereum Virtual Machine for Theorem Provers
1/28 Specifying the Ethereum Virtual Machine for Theorem Provers Yoichi Hirai Ethereum Foundation Cambridge, Sep. 13, 2017 (FC 2017 + some updates) 2/28 Outline Problem Motivation EVM as a Machine Wanted
More informationAn experiment with variable binding, denotational semantics, and logical relations in Coq. Adam Chlipala University of California, Berkeley
A Certified TypePreserving Compiler from Lambda Calculus to Assembly Language An experiment with variable binding, denotational semantics, and logical relations in Coq Adam Chlipala University of California,
More informationThe clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) 2 ( ) ( )
1 The clique number of a random graph in (,1 2) Let () # -subgraphs in = 2 =:() We will be interested in s.t. ()~1. To gain some intuition note ()~ 2 =2 and so ~2log. Now let us work rigorously. () (+1)
More informationWhy3 where programs meet provers
Why3 where programs meet provers Jean-Christophe Filliâtre CNRS KeY Symposium 2017 Rastatt, Germany October 5, 2017 history started in 2001, as an intermediate language in the process of verifying C and
More information