HOL Light: A tutorial introduction

J Harrison - International Conference on Formal Methods in …, 1996 - Springer
HOL Light is a new version of the HOL theorem prover. While retaining the reliability and
programmability of earlier versions, it is more elegant, lightweight, powerful and automatic; it …

[图书][B] Computer-aided reasoning: ACL2 case studies

M Kaufmann, P Manolios, JS Moore - 2013 - books.google.com
Computer-Aided Reasoning: ACL2 Case Studies illustrates how the computer-aided
reasoning system ACL2 can be used in productive and innovative ways to design, build, and …

QED at large: A survey of engineering of formally verified software

T Ringer, K Palmskog, I Sergey… - … and Trends® in …, 2019 - nowpublishers.com
Abstract Development of formal proofs of correctness of programs can increase actual and
perceived reliability and facilitate better understanding of program specifications and their …

[图书][B] Theorem proving with the real numbers

J Harrison - 2012 - books.google.com
This book discusses the use of the real numbers in theorem proving. Typ ically, theorem
provers only support a few'discrete'datatypes such as the natural numbers. However the …

Folding domain-specific languages: deep and shallow embeddings (functional pearl)

J Gibbons, N Wu - Proceedings of the 19th ACM SIGPLAN international …, 2014 - dl.acm.org
A domain-specific language can be implemented by embedding within a general-purpose
host language. This embedding may be deep or shallow, depending on whether terms in the …

History of interactive theorem proving

J Harrison, J Urban, F Wiedijk - Handbook of the History of Logic, 2014 - Elsevier
By interactive theorem proving, we mean some arrangement where the machine and a
human user work together interactively to produce a formal proof. There is a wide spectrum …

Automated analysis of security-design models

D Basin, M Clavel, J Doser, M Egea - Information and Software Technology, 2009 - Elsevier
We have previously proposed SecureUML, an expressive UML-based language for
constructing security-design models, which are models that combine design specifications …

Hoare logic for Java in Isabelle/HOL

D Von Oheimb - Concurrency and Computation: Practice and …, 2001 - Wiley Online Library
This article presents a Hoare‐style calculus for a substantial subset of Java Card, which we
call Java ^ℓight. In particular, the language includes side‐effecting expressions, mutual …

[图书][B] Higher order logic and hardware verification

TF Melham - 2009 - dl.acm.org
Dr. Melham shows here how formal logic can be used to specify the behavior of hardware
designs and reason about their correctness. A primary theme of the book is the use of …

Compiling to categories

C Elliott - Proceedings of the ACM on Programming Languages, 2017 - dl.acm.org
It is well-known that the simply typed lambda-calculus is modeled by any cartesian closed
category (CCC). This correspondence suggests giving typed functional programs a variety of …