Sciweavers

CADE
2003
Springer
14 years 12 months ago
The Model Evolution Calculus
The DPLL procedure is the basis of some of the most successful propositional satisfiability solvers to date. Although originally devised as a proofprocedure for first-order logic, ...
Peter Baumgartner, Cesare Tinelli
CADE
2004
Springer
14 years 12 months ago
Model Checking Using Tabled Rewriting
LRR [3] is a rewriting system developed at the Computer Science Department of University of Houston. LRR has two subsystems: Smaran (for tabled rewriting), and TGR (for untabled re...
Zhiyao Liang
CADE
2004
Springer
14 years 12 months ago
A Superposition View on Nelson-Oppen
Thomas Hillenbrand
CADE
2004
Springer
14 years 12 months ago
Uniform variable splitting
ended abstract motivates and presents techniques for identifying variable independence in free variable calculi for classical logic without equality. Two variables are called indep...
Roger Antonsen
CADE
2004
Springer
14 years 12 months ago
Decision Procedures for Recursive Data Structures with Integer Constraints
This paper is concerned with the integration of recursive data structures with Presburger arithmetic. The integrated theory includes a length function on data structures, thus prov...
Ting Zhang, Henny B. Sipma, Zohar Manna
CADE
2004
Springer
14 years 12 months ago
Dr.Doodle: A Diagrammatic Theorem Prover
This paper presents the Dr.Doodle system, an interactive theorem prover that uses diagrammatic representations. The assumption underlying this project is that, for some domains (pr...
Daniel Winterstein, Alan Bundy, Corin A. Gurr
CADE
2004
Springer
14 years 12 months ago
The CADE ATP System Competition
The CADE ATP System Competition (CASC) is an annual evaluation of fully automatic, first-order Automated Theorem Proving systems. CASC-18 was the seventh competition in the CASC se...
Geoff Sutcliffe, Christian B. Suttner
CADE
2004
Springer
14 years 12 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl