Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2023
Large-Scale Formal Proof for the Working Mathematician—Lessons Learnt from the ALEXANDRIA Project
Intelligent Computer MathematicsPages 3–15https://doi.org/10.1007/978-3-031-42753-4_1AbstractALEXANDRIA is an ERC-funded project that started in 2017, with the aim of bringing formal verification to mathematics. The past six years have seen great strides in the formalisation of mathematics and also in some relevant technologies, above all ...
- ArticleSeptember 2022
Wetzel: Formalisation of an Undecidable Problem Linked to the Continuum Hypothesis
Intelligent Computer MathematicsPages 92–106https://doi.org/10.1007/978-3-031-16681-5_6AbstractIn 1964, Paul Erdős published a paper [5] settling a question about function spaces that he had seen in a problem book. Erdős proved that the answer was yes if and only if the continuum hypothesis was false: an innocent-looking question turned out ...
- research-articleDecember 2019
From LCF to Isabelle/HOL
Formal Aspects of Computing (FAC), Volume 31, Issue 6Pages 675–698https://doi.org/10.1007/s00165-019-00492-1AbstractInteractive theorem provers have developed dramatically over the past four decades, from primitive beginnings to today’s powerful systems. Here, we focus on Isabelle/HOL and its distinctive strengths. They include automatic proof search, borrowing ...
- research-articleJanuary 2019
Counting polynomial roots in Isabelle/HOL: a formal proof of the Budan-Fourier theorem
CPP 2019: Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and ProofsPages 52–64https://doi.org/10.1145/3293880.3294092Many problems in computer algebra and numerical analysis can be reduced to counting or approximating the real roots of a polynomial within an interval. Existing verified root-counting procedures in major proof assistants are mainly based on the ...
- invited-talkJanuary 2017
Porting the HOL light analysis library: some lessons (invited talk)
CPP 2017: Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and ProofsPage 1https://doi.org/10.1145/3018610.3023366The HOL Light proof assistant is famous for its huge multivariate analysis library: nearly 300,000 lines of code and 13,000 theorems. A substantial fraction of this library has been manually ported to Isabelle/HOL. The Isabelle analysis library ...
- articleMay 2006
Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC), Volume 9, Issue 2Pages 138–161https://doi.org/10.1145/1151414.1151416Classical security protocols aim to achieve authentication and confidentiality under the assumption that the peers behave honestly. Some recent protocols are required to achieve their goals even if the peer misbehaves. Accountability is a protocol ...
- articleJanuary 2006
Verifying the SET Purchase Protocols
Journal of Automated Reasoning (JAUR), Volume 36, Issue 1-2Pages 5–37https://doi.org/10.1007/s10817-005-9018-6SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure e-commerce transactions. The Purchase part of the suite is intended to guarantee the integrity and ...
- research-articleMay 2005
Mechanizing compositional reasoning for concurrent systems: some lessons
Formal Aspects of Computing (FAC), Volume 17, Issue 1Pages 58–68https://doi.org/10.1007/s00165-004-0053-6Abstract.The paper reports on experiences of mechanizing various proposals for compositional reasoning in concurrent systems. The work uses the UNITY formalism and the Isabelle proof tool. The proposals investigated include existential/universal ...
- articleJuly 2004
Organizing Numerical Theories Using Axiomatic Type Classes
Journal of Automated Reasoning (JAUR), Volume 33, Issue 1Pages 29–49https://doi.org/10.1007/s10817-004-3997-6Mathematical reasoning may involve several arithmetic types, including those of the natural, integer, rational, real, and complex numbers. These types satisfy many of the same algebraic laws. These laws need to be made available to users, uniformly and ...
- articleSeptember 2001
Mechanizing a theory of program composition for UNITY
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 23, Issue 5Pages 626–656https://doi.org/10.1145/504709.504711Compositional reasoning must be better understood if non-trivial concurrent programs are to be verified. Chandy and Sanders [2000] have proposed a new approach to reasoning about composition, which Charpentier and Chandy [1999] have illustrated by ...
- articleJuly 2000
Mechanizing UNITY in Isabelle
ACM Transactions on Computational Logic (TOCL), Volume 1, Issue 1Pages 3–32https://doi.org/10.1145/343369.343370UNITY is an abstract formalism for proving properties of concurrent systems, which typically are expressed using guarded assignments [Chandy and Misra 1988]. UNITY has been mechanized in higher-order logic using Isabelle, a proof assistant. Safety and ...
- articleNovember 1999
A Formal Proof of Sylow‘s Theorem
Journal of Automated Reasoning (JAUR), Volume 23, Issue 3Pages 235–264https://doi.org/10.1023/A:1006269330992The theorem of Sylow is proved in Isabelle HOL. We follow the proof by Wielandt that is more general than the original and uses a nontrivial combinatorial identity. The mathematical proof is explained in some detail, leading on to the mechanization of ...
- articleAugust 1999
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC), Volume 2, Issue 3Pages 332–351https://doi.org/10.1145/322510.322530Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions concerning ...