the proceedings contain 19 papers. the special focus in this conference is on program Analysis and transformation, Constraint Handling Rules, Termination Analysis, Security and program Testing and Verification. the to...
ISBN:
(纸本)9783319178219
the proceedings contain 19 papers. the special focus in this conference is on program Analysis and transformation, Constraint Handling Rules, Termination Analysis, Security and program Testing and Verification. the topics include: Analyzing array manipulating programs by programtransformation;analysing and compiling coroutines with abstract conjunctive partial deduction;confluence modulo equivalence in constraint handling rules;exhaustive execution of CHR through source-to-source transformation;a formal semantics for the cognitive architecture ACT-R;chranimation: an animation tool for constraint handling rules;extending the 2D dependency pair framework for conditional term rewriting systems;partial evaluation for java malware detection;access control and obligations in the category-based metamodel;concolic execution and test case generation in prolog;liveness properties in cafeOBJ - a case study for meta-level specifications;a hybrid method for the verification and synthesis of parameterized self-stabilizing protocols;drill and join:;functional kleene closures;on completeness of logicprograms;polynomial approximation to well-founded semantics for logicprograms with generalized atoms;declarative compilation for constraint logicprogramming and pre-indexed terms for prolog.
We present a new declarative compilation of logicprograms with constraints into variable-free relational theories which are then executed by rewriting. this translation provides an algebraic formulation of the abstra...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
We present a new declarative compilation of logicprograms with constraints into variable-free relational theories which are then executed by rewriting. this translation provides an algebraic formulation of the abstract syntax of logicprograms. Management of logic variables, unification, and renaming apart is completely elided in favor of algebraic manipulation of variable-free relation expressions. We prove the translation is sound, and the rewriting system complete with respect to traditional SLD semantics.
program correctness (in imperative and functional programming) splits in logicprogramming into correctness and completeness. Completeness means that a program produces all the answers required by its specification. L...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
program correctness (in imperative and functional programming) splits in logicprogramming into correctness and completeness. Completeness means that a program produces all the answers required by its specification. Little work has been devoted to reasoning about completeness. this paper presents a few sufficient conditions for completeness of definite programs. We also study preserving completeness under some cases of pruning of SLD-trees (e.g. due to using the cut). We treat logicprogramming as a declarative paradigm, abstracting from any operational semantics as far as possible. We argue that the proposed methods are simple enough to be applied, possibly at an informal level, in practical Prolog programming. We point out importance of approximate specifications.
In this paper we propose a novel semi-supervised active machine-learning method, based on two recursive higher-order functions that can inductively synthesize a functional computer program. based on properties formula...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
In this paper we propose a novel semi-supervised active machine-learning method, based on two recursive higher-order functions that can inductively synthesize a functional computer program. based on properties formulated using abstract algebra terms, the method uses two combined strategies: to reduce the dimensionality of the Boolean algebra where a target function lies and to combine known operations belonging to the algebra, using them as a basis to build a programthat emulates the target function. the method queries for data on specific points of the problem input space and build a programthat exactly fits the data. Applications of this method include all sorts of systems based on bitwise operations. Any functional computer program can be emulated using this approach. Combinatorial circuit design, model acquisition from sensor data, reverse engineering of existing computer programs are all fields where the proposed method can be useful.
We provide an approach to formally analyze the computational behavior of coroutines in logicprograms and to compile these computations into new programs, not requiring any support for coroutines. the problem was alre...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
We provide an approach to formally analyze the computational behavior of coroutines in logicprograms and to compile these computations into new programs, not requiring any support for coroutines. the problem was already studied near to 30 years ago, in an analysis and transformation technique called Compiling Control. However, this technique had a strong ad hoc flavor: the completeness of the analysis was not well understood and its symbolic evaluation was also very ad hoc. We show how Abstract Conjunctive Partial Deduction, introduced by Leuschel in 2004, provides an appropriate setting to redefine Compiling Control. Leuschel's framework is more general than the original formulation, it is provably correct, and it can easily be applied for simple examples. We also show that the Abstract Conjunctive Partial Deduction framework needs some further extension to be able to deal with more complex examples.
this paper presents a hybrid method for verification and synthesis of parameterized self-stabilizing protocols where algorithmic design and mechanical verification techniques/tools are used hand-in-hand. the core idea...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
this paper presents a hybrid method for verification and synthesis of parameterized self-stabilizing protocols where algorithmic design and mechanical verification techniques/tools are used hand-in-hand. the core idea behind the proposed method includes the automated synthesis of self-stabilizing protocols in a limited scope (i.e., fixed number of processes) and the use of theorem proving methods for the generalization of the solutions produced by the synthesizer. Specifically, we use the Prototype Verification System (PVS) to mechanically verify an algorithm for the synthesis of weakly self-stabilizing protocols. then, we reuse the proof of correctness of the synthesis algorithm to establish the correctness of the generalized versions of synthesized protocols for an arbitrary number of processes. We demonstrate the proposed approach in the context of an agreement and a coloring protocol on the ring topology.
this book constitutes the thoroughly refereed post-conference proceedings of the 24th international symposium on logic-based program synthesis and transformation, lopstr 2014, held in Canterbury, UK, in September 2014...
详细信息
ISBN:
(数字)9783319178226
ISBN:
(纸本)9783319178219
this book constitutes the thoroughly refereed post-conference proceedings of the 24th international symposium on logic-based program synthesis and transformation, lopstr 2014, held in Canterbury, UK, in September 2014. the 18 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 34 submissions. the aim of the lopstr series is to stimulate and promote international research and collaboration on logic-basedprogram development. the papers are organized along a set of thematic tracks: program analysis and transformation, constraint handling rules, termination analysis, security, program testing and verification, programsynthesis, program derivation, semantic issues in logicprogramming and programtransformation and optimization.
We explore a transformational approach to the problem of verifying simple array-manipulating programs. Traditionally, verification of such programs requires intricate analysis machinery to reason with universally quan...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
We explore a transformational approach to the problem of verifying simple array-manipulating programs. Traditionally, verification of such programs requires intricate analysis machinery to reason with universally quantified statements about symbolic array segments, such as "every data item stored in the segment A[i] to A[j] is equal to the corresponding item stored in the segment B[i] to B[j]." We define a simple abstract machine which allows for set-valued variables and we show how to translate programs with array operations to array-free code for this machine. For the purpose of program analysis, the translated program remains faithful to the semantics of array manipulation. based on our implementation in LLVM, we evaluate the approach with respect to its ability to extract useful invariants and the cost in terms of code size.
the well-founded semantics of normal logicprograms has two main utilities, one being an efficiently computable semantics with a unique intended model, and the other serving as polynomial time constraint propagation f...
详细信息
ISBN:
(纸本)9783319178226;9783319178219
the well-founded semantics of normal logicprograms has two main utilities, one being an efficiently computable semantics with a unique intended model, and the other serving as polynomial time constraint propagation for the computation of answer sets of the same program. When logicprograms are generalized to support constraints of various kinds, the semantics is no longer tractable, which makes the second utility doubtful. this paper considers the possibility of tractable but incomplete methods, which in general may miss information in the computed result, but never generates wrong conclusions. For this goal, we first formulate a well-founded semantics for logicprograms with generalized atoms, which generalizes logicprograms with arbitrary aggregates/constraints/dl-atoms. As a case study, we show that the method of removing non-monotone dl-atoms for the well-founded semantics by Eiter et al. actually falls into this category. We also present a case study for logicprograms with standard aggregates.
暂无评论