Sciweavers

82 search results - page 6 / 17
» Inductive Proofs of Computational Secrecy
Sort
View
ECAI
1994
Springer
14 years 1 months ago
Reusing Proofs
1 We develop a learning component for a theorem prover designed for verifying statements by mathematical induction. If the prover has found a proof, it is analyzed yielding a so-ca...
Thomas Kolbe, Christoph Walther
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 10 months ago
Cut Elimination for a Logic with Induction and Co-induction
Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent calculus...
Alwen Tiu, Alberto Momigliano
TLCA
2009
Springer
14 years 4 months ago
Lexicographic Path Induction
Abstract. Programming languages theory is full of problems that reduce to proving the consistency of a logic, such as the normalization of typed lambda-calculi, the decidability of...
Jeffrey Sarnat, Carsten Schürmann
KBSE
1997
IEEE
14 years 2 months ago
Moving Proofs-As-Programs into Practice
Proofs in the Nuprl system, an implementation of a constructive type theory, yield “correct-by-construction” programs. In this paper a new methodology is presented for extract...
James L. Caldwell
LOGCOM
2007
126views more  LOGCOM 2007»
13 years 9 months ago
A Structural Proof of the Soundness of Rely/guarantee Rules
Various forms of rely/guarantee conditions have been used to record and reason about interference in ways that provide compositional development methods for concurrent programs. Th...
Joey W. Coleman, Cliff B. Jones