Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Validating Traces of Distributed Programs Against TLA+ Specifications
Software Engineering and Formal MethodsPages 126–143https://doi.org/10.1007/978-3-031-77382-2_8AbstractTLA+ is a formal language for specifying systems, including distributed algorithms, that is supported by powerful verification tools. In this work we present a framework for checking if traces of distributed programs are compatible with high-level ...
- research-articleDecember 2023
Combining representation formalisms for reasoning upon mathematical knowledge
K-CAP '23: Proceedings of the 12th Knowledge Capture Conference 2023Pages 180–187https://doi.org/10.1145/3587259.3627549Knowledge in mathematics (definitions, theorems, proofs, etc.) is usually expressed in a way that combines natural language and mathematical expressions (e.g. equations). Using an ontology formalism such as OWL DL is well-suited for formalizing the ...
- ArticleNovember 2023
Extending PlusCal for Modeling Distributed Algorithms
AbstractPlusCal is a language for describing algorithms at a high level of abstraction. The PlusCal translator generates a TLA+ specification that can be verified using the TLA+ model checkers or proof assistant. We describe Distributed PlusCal, an ...
- research-articleOctober 2021
Static analysis of pattern-free properties
PPDP '21: Proceedings of the 23rd International Symposium on Principles and Practice of Declarative ProgrammingArticle No.: 9, Pages 1–13https://doi.org/10.1145/3479394.3479404Rewriting is a widely established formalism with major applications in computer science. It is indeed a staple of many formal verification applications as it is especially well suited to describe program semantics and transformations. In particular, ...
- ArticleSeptember 2020
Pattern Eliminating Transformations
Logic-Based Program Synthesis and TransformationPages 74–92https://doi.org/10.1007/978-3-030-68446-4_4AbstractProgram transformation is a common practice in computer science, and its many applications can have a range of different objectives. For example, a program written in an original high level language could be either translated into machine code for ...
-
- research-articleOctober 2019
Generic Encodings of Constructor Rewriting Systems
PPDP '19: Proceedings of the 21st International Symposium on Principles and Practice of Declarative ProgrammingArticle No.: 8, Pages 1–12https://doi.org/10.1145/3354166.3354173Rewriting is a formalism widely used in computer science and mathematical logic. The classical formalism has been extended, in the context of functional languages, with an order over the rules and, in the context of rewrite based languages, with the ...
- ArticleSeptember 2015
Towards an Automatic Tool for Multi-scale Model Derivation Illustrated with a Micro-mirror Array
- Walid Belkhir,
- Nicolas Ratier,
- Duy Duc Nguyen,
- Bin Yang,
- Michel Lenczner,
- Frederic Zamkotsian,
- Horatiu Cirstea
SYNASC '15: Proceedings of the 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)Pages 47–54https://doi.org/10.1109/SYNASC.2015.17This paper reports recent advances in the development of a symbolic asymptotic modeling software package, called MEMSALab, which will be used for automatic generation of asymptotic models for arrays of micro and nanosystems. More precisely, a model is a ...
- research-articleJuly 2011
Symbolic analysis of network security policies using rewrite systems
PPDP '11: Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programmingPages 77–88https://doi.org/10.1145/2003476.2003489First designed to enable private networks to be opened up to the outside world in a secure way, the growing complexity of organizations make firewalls indispensable to control information flow within a company. The central role they hold in the security ...
- ArticleMay 2011
Formal specification and validation of security policies
FPS'11: Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of SecurityPages 148–163https://doi.org/10.1007/978-3-642-27901-0_12We propose a formal framework for the specification and validation of security policies. To model a secured system, the evolution of security information in the system is described by transitions triggered by authorization requests and the policy is ...
- articleMay 2010
Anti-patterns for rule-based languages
Journal of Symbolic Computation (JOSC), Volume 45, Issue 5Pages 523–550https://doi.org/10.1016/j.jsc.2010.01.007Negation is intrinsic to human thinking and most of the time when searching for something, we base our patterns on both positive and negative conditions. This should be naturally reflected in software that provide pattern-based searches. We would like ...
- ArticleNovember 2009
TomML: A Rule Language for Structured Data
RuleML '09: Proceedings of the 2009 International Symposium on Rule Interchange and ApplicationsPages 262–271https://doi.org/10.1007/978-3-642-04985-9_24We present the <Emphasis Type="SmallCaps">Tom</Emphasis> language that extends <Emphasis Type="SmallCaps">Java</Emphasis> with the purpose of providing high level constructs inspired by the rewriting community. <Emphasis Type="SmallCaps">Tom</Emphasis> ...
- articleMarch 2009
Rewrite Based Specification of Access Control Policies
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 234Pages 37–54https://doi.org/10.1016/j.entcs.2009.02.071Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to specify the access requests that should be granted or denied. These access control mechanisms should ...
- articleJune 2008
Rewriting calculi, higher-order reductions and patterns: Introduction
Mathematical Structures in Computer Science (MSCS), Volume 18, Issue 3Pages 427–429https://doi.org/10.1017/S0960129508006737The integration of first-order and higher-order paradigms has been one of the main challenges in the design of both declarative programming languages and proof environments. It has led to the development of new computation models and new logical ...
- articleApril 2008
Towards a Sharing Strategy for the Graph Rewriting Calculus
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 204Pages 111–127https://doi.org/10.1016/j.entcs.2008.03.057The graph rewriting calculus is an extension of the @r-calculus, handling graph like structures rather than simple terms. The calculus over terms is naturally generalized by using unification constraints in addition to the standard @r-calculus matching ...
- articleJuly 2007
Distributive ρ-calculus
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 176, Issue 4Pages 95–111https://doi.org/10.1016/j.entcs.2007.06.010The rewriting calculus has been introduced as a general formalism that uniformly integrates rewriting and @l-calculus. In this calculus all the basic ingredients of rewriting such as rewrite rules, rule applications and results are first-class objects. ...
- articleJuly 2007
From Functional Programs to Interaction Nets via the Rewriting Calculus
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 174, Issue 10Pages 39–56https://doi.org/10.1016/j.entcs.2007.02.046We use the @r-calculus as an intermediate language to compile functional languages with pattern-matching features, and give an interaction net encoding of the @r-terms arising from the compilation. This encoding gives rise to new strategies of ...
- ArticleJune 2007
Confluence of pattern-based calculi
RTA'07: Proceedings of the 18th international conference on Term rewriting and applicationsPages 78–92Different pattern calculi integrate the functional mechanisms from the λ-calculus and the matching capabilities from rewriting. Several approaches are used to obtain the confluence but in practice the proof methods share the same structure and each ...
- articleJune 2007
A rewriting calculus for cyclic higher-order term graphs
Mathematical Structures in Computer Science (MSCS), Volume 17, Issue 3Pages 363–406https://doi.org/10.1017/S0960129507006093The Rewriting Calculus (ρ-calculus, for short) was introduced at the end of the 1990s and fully integrates term-rewriting and λ-calculus. The rewrite rules, acting as elaborated abstractions, their application and the structured results obtained are ...
- articleJune 2007
A ρ-calculus of explicit constraint application
Higher-Order and Symbolic Computation (HOSC), Volume 20, Issue 1-2Pages 37–72https://doi.org/10.1007/s10990-007-9004-2Theoretical presentations of the rewriting or ý-calculus often treat the matching constraint computations as an atomic operation although matching constraints are explicitly expressed. Actual implementations have to take a more realistic view: ...
- articleDecember 2006
Expressing combinatory reduction systems derivations in the rewriting calculus
Higher-Order and Symbolic Computation (HOSC), Volume 19, Issue 4Pages 345–376https://doi.org/10.1007/s10990-006-0479-zThe last few years have seen the development of the rewriting calculus (also called rho-calculus or -calculus) that uniformly integrates first-order term rewriting and the -calculus. The combination of these two latter formalisms has been already ...