Sciweavers

82 search results - page 6 / 17
» Inductive Proofs of Computational Secrecy
Sort
View
112
Voted
ECAI
1994
Springer
15 years 7 months ago
Reusing Proofs
1 We develop a learning component for a theorem prover designed for verifying statements by mathematical induction. If the prover has found a proof, it is analyzed yielding a so-ca...
Thomas Kolbe, Christoph Walther
147
Voted
CORR
2010
Springer
174views Education» more  CORR 2010»
15 years 3 months ago
Cut Elimination for a Logic with Induction and Co-induction
Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent calculus...
Alwen Tiu, Alberto Momigliano
126
Voted
TLCA
2009
Springer
15 years 10 months ago
Lexicographic Path Induction
Abstract. Programming languages theory is full of problems that reduce to proving the consistency of a logic, such as the normalization of typed lambda-calculi, the decidability of...
Jeffrey Sarnat, Carsten Schürmann
128
Voted
KBSE
1997
IEEE
15 years 8 months ago
Moving Proofs-As-Programs into Practice
Proofs in the Nuprl system, an implementation of a constructive type theory, yield “correct-by-construction” programs. In this paper a new methodology is presented for extract...
James L. Caldwell
132
Voted
LOGCOM
2007
126views more  LOGCOM 2007»
15 years 3 months ago
A Structural Proof of the Soundness of Rely/guarantee Rules
Various forms of rely/guarantee conditions have been used to record and reason about interference in ways that provide compositional development methods for concurrent programs. Th...
Joey W. Coleman, Cliff B. Jones