Xs are for Trajectory Evaluation, Booleans are for Theorem Proving

نویسندگان

  • Mark Aagaard
  • Thomas F. Melham
  • John W. O'Leary
چکیده

This paper describes a semantic connection between the symbolic trajectory evaluation model-checking algorithm and relational verification in higher-order logic. We prove a theorem that translates correctness results from trajectory evaluation over a four-valued lattice into a shallow embedding of temporal operators over Boolean streams. This translation connects the specialized world of trajectory evaluation to a general-purpose logic and provides the semantic basis for connecting additional decision procedures and model checkers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Results of the Verification of a Complex Pipelined Machine Model

ion and Compositional Techniques From Asymmetry to Full Symmetry: New Techniques for Symmetry Reduction in Model Checking . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 E.Allen Emerson, Richard J. Trefler Automatic Error Correction of Large Circuits Using Boolean Decomposition and Abstraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

A Mathematically Precise Two-level Formal Hardware Veriication Methodology

Theorem-proving and symbolic trajectory evaluation are both described as methods for the formal veriication of hardware. They are both used to achieve a common goal|correctly designed hardware|and both are intended to be an alternative to conventional methods based on non-exhaustive simulation. However, they have diierent strengths and weaknesses. The main signiicance of this paper is the descr...

متن کامل

Drilling Trajectory Prediction Model for Push-the-bit Rotary Steerable Bottom Hole Assembly

The study of rotary steering drilling technology is currently one of the hot topics in the drilling engineering field. It requires accurate well trajectory control instructions when rotary steerable tools are applied to achieve the well trajectory control goal. A drilling trajectory prediction model will benefit this progress. According to the continuous beam theory, a mechanical model of push-...

متن کامل

Integration of SMT-solvers in B and Event-B development environments

Software development in B and Event-B generates proof obligations that have to be discharged using theorem provers. The cost of such developments depends directly on the degree of automation and e ciency of theorem proving techniques for the logics in which these lemmas are expressed. This paper presents and formalizes an approach to transform a class of proof obligations essentially similar to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999