Statically verified refinements for multiparty protocols

F Zhou, F Ferreira, R Hu, R Neykova… - Proceedings of the ACM …, 2020 - dl.acm.org
With distributed computing becoming ubiquitous in the modern era, safe distributed
programming is an open challenge. To address this, multiparty session types (MPST) …

Robust resource bounds with static analysis and bayesian inference

L Pham, FA Saad, J Hoffmann - … of the ACM on Programming Languages, 2024 - dl.acm.org
There are two approaches to automatically deriving symbolic worst-case resource bounds
for programs: static analysis of the source code and data-driven analysis of cost …

Refinement Type Refutations

R Webbers, K von Gleissenthall, R Jhala - Proceedings of the ACM on …, 2024 - dl.acm.org
Refinement types combine SMT decidable constraints with a compositional, syntax-directed
type system to provide a convenient way to statically and automatically check properties of …

Mechanizing refinement types

MH Borkowski, N Vazou, R Jhala - Proceedings of the ACM on …, 2024 - dl.acm.org
Practical checkers based on refinement types use the combination of implicit semantic
subtyping and parametric polymorphism to simplify the specification and automate the …

Mechanizing Refinement Types (extended)

M Borkowski, N Vazou, R Jhala - arXiv preprint arXiv:2207.05617, 2022 - arxiv.org
Practical checkers based on refinement types use the combination of implicit semantic sub-
typing and parametric polymorphism to simplify the specification and automate the …

Static resource analysis at scale

E Çiçek, M Bouaziz, S Cho, D Distefano - Static Analysis: 27th International …, 2020 - Springer
Programs inevitably contain bugs. Fortunately, recent research and engineering efforts
across the industry and academia made significant advances in static analysis techniques …

Continuous verification of machine learning: a declarative programming approach

E Komendantskaya, W Kokke, D Kienitz - Proceedings of the 22nd …, 2020 - dl.acm.org
In this invited talk, we discuss state of the art in neural network verification. We propose the
term continuous verification to characterise the family of methods that explore continuous …

Verifying the Performance of Network Control Algorithms

V Arun - 2023 - dspace.mit.edu
As networked systems become critical infrastructure, their design must reflect their new
societal role. Today, we build systems with hundreds of heuristics but often do not …

Grammatical evolution mapping for semantically-constrained genetic programming

A Fonseca, P Santos, G Espada, S Silva - Genetic Programming Theory …, 2022 - Springer
Abstract Search-Based Software Engineering problems frequently have semantic
constraints that can be used to deterministically restrict what type of programs can be …

[PDF][PDF] Refining Multiparty Session Types

F Zhou - 2024 - fangyi.io
A distributed system consists of various components working in coordination, usually
following a specified protocol. Multiparty session types (MPST) are a typing discipline for …