HOL Light: A tutorial introduction
J Harrison - International Conference on Formal Methods in …, 1996 - Springer
HOL Light is a new version of the HOL theorem prover. While retaining the reliability and
programmability of earlier versions, it is more elegant, lightweight, powerful and automatic; it …
programmability of earlier versions, it is more elegant, lightweight, powerful and automatic; it …
[图书][B] Computer-aided reasoning: ACL2 case studies
M Kaufmann, P Manolios, JS Moore - 2013 - books.google.com
Computer-Aided Reasoning: ACL2 Case Studies illustrates how the computer-aided
reasoning system ACL2 can be used in productive and innovative ways to design, build, and …
reasoning system ACL2 can be used in productive and innovative ways to design, build, and …
QED at large: A survey of engineering of formally verified software
Abstract Development of formal proofs of correctness of programs can increase actual and
perceived reliability and facilitate better understanding of program specifications and their …
perceived reliability and facilitate better understanding of program specifications and their …
[图书][B] Theorem proving with the real numbers
J Harrison - 2012 - books.google.com
This book discusses the use of the real numbers in theorem proving. Typ ically, theorem
provers only support a few'discrete'datatypes such as the natural numbers. However the …
provers only support a few'discrete'datatypes such as the natural numbers. However the …
Folding domain-specific languages: deep and shallow embeddings (functional pearl)
A domain-specific language can be implemented by embedding within a general-purpose
host language. This embedding may be deep or shallow, depending on whether terms in the …
host language. This embedding may be deep or shallow, depending on whether terms in the …
History of interactive theorem proving
J Harrison, J Urban, F Wiedijk - Handbook of the History of Logic, 2014 - Elsevier
By interactive theorem proving, we mean some arrangement where the machine and a
human user work together interactively to produce a formal proof. There is a wide spectrum …
human user work together interactively to produce a formal proof. There is a wide spectrum …
Automated analysis of security-design models
We have previously proposed SecureUML, an expressive UML-based language for
constructing security-design models, which are models that combine design specifications …
constructing security-design models, which are models that combine design specifications …
Hoare logic for Java in Isabelle/HOL
D Von Oheimb - Concurrency and Computation: Practice and …, 2001 - Wiley Online Library
This article presents a Hoare‐style calculus for a substantial subset of Java Card, which we
call Java ^ℓight. In particular, the language includes side‐effecting expressions, mutual …
call Java ^ℓight. In particular, the language includes side‐effecting expressions, mutual …
[图书][B] Higher order logic and hardware verification
TF Melham - 2009 - dl.acm.org
Dr. Melham shows here how formal logic can be used to specify the behavior of hardware
designs and reason about their correctness. A primary theme of the book is the use of …
designs and reason about their correctness. A primary theme of the book is the use of …
Compiling to categories
C Elliott - Proceedings of the ACM on Programming Languages, 2017 - dl.acm.org
It is well-known that the simply typed lambda-calculus is modeled by any cartesian closed
category (CCC). This correspondence suggests giving typed functional programs a variety of …
category (CCC). This correspondence suggests giving typed functional programs a variety of …