Analysis and transformation of constrained Horn clauses for program verification

E De Angelis, F Fioravanti, JP Gallagher… - Theory and Practice of …, 2022 - cambridge.org
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …

Energy consumption analysis of programs based on XMOS ISA-level models

U Liqat, S Kerrison, A Serrano, K Georgiou… - Logic-Based Program …, 2014 - Springer
Energy consumption analysis of embedded programs requires the analysis of low-level
program representations. This is challenging because the gap between the high-level …

Static analysis of energy consumption for LLVM IR programs

N Grech, K Georgiou, J Pallister, S Kerrison… - Proceedings of the 18th …, 2015 - dl.acm.org
Energy models can be constructed by characterizing the energy consumed when executing
each instruction in a processor's instruction set. This can be used to determine how much …

Interval-based resource usage verification by translation into Horn clauses and an application to energy consumption

P Lopez-Garcia, L Darmawan, M Klemen… - Theory and Practice of …, 2018 - cambridge.org
Many applications require conformance with specifications that constrain the use of
resources, such as execution time, energy, bandwidth, etc. We present a configurable …

Cost analysis of smart contracts via parametric resource analysis

V Pérez, M Klemen, P López-García, JF Morales… - Static Analysis: 27th …, 2020 - Springer
The very nature of smart contracts and blockchain platforms, where program execution and
storage are replicated across a large number of nodes, makes resource consumption …

Energy transparency for deeply embedded programs

K Georgiou, S Kerrison, Z Chamski, K Eder - ACM Transactions on …, 2017 - dl.acm.org
Energy transparency is a concept that makes a program's energy consumption visible, from
hardware up to software, through the different system layers. Such transparency can enable …

Parallel logic programming: A sequel

A Dovier, A Formisano, G Gupta… - Theory and Practice of …, 2022 - cambridge.org
Multi-core and highly connected architectures have become ubiquitous, and this has
brought renewed interest in language-based approaches to the exploitation of parallelism …

Iterative mining of resource-releasing specifications

Q Wu, G Liang, Q Wang, T Xie… - 2011 26th IEEE/ACM …, 2011 - ieeexplore.ieee.org
Software systems commonly use resources such as network connections or external file
handles. Once finish using the resources, the software systems must release these …

Towards data-aware qos-driven adaptation for service orchestrations

D Ivanovic, M Carro… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Several activities in service oriented computing can benefit from knowing properties of a
given service composition ahead of time. We will focus here on properties related to …

Incremental and modular context-sensitive analysis

I Garcia-Contreras, JF Morales… - Theory and Practice of …, 2021 - cambridge.org
Context-sensitive global analysis of large code bases can be expensive, which can make its
use impractical during software development. However, there are many situations in which …