TD Smith - 2017 IEEE International Conference on Big Data …, 2017 - ieeexplore.ieee.org
Bitcoin's underlying blockchain database is a novel approach to recordkeeping that has the potential to decentralize big data. Bitcoin's success has inspired a multitude of spinoff …
Inductive invariants can be robustly synthesized using a learning model where the teacher is a program verifier who instructs the learner through concrete program configurations …
Formal verification provides a rigorous and systematic approach to ensure the correctness and reliability of software systems. Yet, constructing specifications for the full proof relies on …
We introduce ICE, a robust learning paradigm for synthesizing invariants, that learns using examples, counter-examples, and implications, and show that it admits honest teachers and …
I Dillig, T Dillig, B Li, K McMillan - Acm Sigplan Notices, 2013 - dl.acm.org
This paper presents a new method for generating inductive loop invariants that are expressible as boolean combinations of linear integer constraints. The key idea underlying …
Object-relational mapping libraries are a popular way for applications to interact with databases because they provide transparent access to the database using the same …
We describe a Guess-and-Check algorithm for computing algebraic equation invariants of the form∧ ifi (x 1,…, xn)= 0, where each fi is a polynomial over the variables x 1,…, xn of the …
We present a data-driven technique to solve Constrained Horn Clauses (CHCs) that encode verification conditions of programs containing unconstrained loops and recursions. Our CHC …
We present a novel approach for generalizing the IC3 algorithm for invariant checking from finite-state to infinite-state transition systems, expressed over some background theories …