You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Java programming language provides safety and security guarantees such as type safety and its security architecture. They distinguish it from other mainstream programming languages like C and C++. In this work, we develop a machine-checked model of concurrent Java and the Java memory model and investigate the impact of concurrency on these guarantees. From the formal model, we automatically obtain an executable verified compiler to bytecode and a validated virtual machine.
This book constitutes the refereed proceedings of the 12th International Conference on Theorem Proving in Higher Order Logics, TPHOLs '99, held in Nice, France, in September 1999. The 20 revised full papers presented together with three invited contributions were carefully reviewed and selected from 35 papers submitted. All current aspects of higher order theorem proving, formal verification, and specification are discussed. Among the theorem provers evaluated are COQ, HOL, Isabelle, Isabelle/ZF, and OpenMath.
This book constitutes the thoroughly refereed proceedings of the Third International Conference on Interactive Theorem Proving, ITP 2012, held in Princeton, NJ, USA, in August 2012. The 21 revised full papers presented together with 4 rough diamond papers, 3 invited talks, and one invited tutorial were carefully reviewed and selected from 40 submissions. Among the topics covered are formalization of mathematics; program abstraction and logics; data structures and synthesis; security; (non-)termination and automata; program verification; theorem prover development; reasoning about program execution; and prover infrastructure and modeling styles.
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop of the TYPES Working Group, TYPES 2002, held in Berg en Dal, The Netherlands in April 2002. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement. All current issues in type theory and type systems and their applications to programming, systems design, and proof theory are addressed. Among the systems dealt with are Coq and Isar/HOL.
This is the first introduction to the SPARK 2014 language and the tools to verify programs for safety- and security-critical applications.
This book constitutes the refereed proceedings of the 11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, LPAR 2004, held in Montevideo, Uruguay in March 2005. The 33 revised full papers presented together with abstracts of 4 invited papers were carefully reviewed and selected from 77 submissions. The papers address all current issues in logic programming, automated reasoning, and AI logics in particular description logics, fuzzy logic, linear logic, multi-modal logic, proof theory, formal verification, protocol verification, constraint logic programming, programming calculi, theorem proving, etc.
Handbook of the History of Logic brings to the development of logic the best in modern techniques of historical and interpretative scholarship. Computational logic was born in the twentieth century and evolved in close symbiosis with the advent of the first electronic computers and the growing importance of computer science, informatics and artificial intelligence. With more than ten thousand people working in research and development of logic and logic-related methods, with several dozen international conferences and several times as many workshops addressing the growing richness and diversity of the field, and with the foundational role and importance these methods now assume in mathematic...
This book constitutes the refereed proceedings of the Second International Conference on Interactive Theorem proving, ITP 2011, held in Berg en Dal, The Netherlands, in August 2011. The 25 revised full papers presented were carefully reviewed and selected from 50 submissions. Among the topics covered are counterexample generation, verification, validation, term rewriting, theorem proving, computability theory, translations from one formalism to another, and cooperation between tools. Several verification case studies were presented, with applications to computational geometry, unification, real analysis, etc.
This book presents some of the most advanced leading-edge technology for the fourth Industrial Revolution -- known as “Industry 4.0.” The book provides a comprehensive understanding of the interconnections of AI, IoT, big data and cloud computing as integral to the technologies that revolutionize the way companies produce and distribute products and the way local governments deliver their services. The book emphasizes that at every phase of the supply chain, manufactures are found to be interweaving AI, robotics, IoT, big data/machine learning, and cloud computing into their production facilities and throughout their distribution networks. Equally important, the authors show how their research can be applied to computer vision, cyber security, database and compiler theory, natural language processing, healthcare, education and agriculture. Presents the fundamentals of AI, IoT, and cloud computing and how they can be incorporated in Industry 4.0 applications Motivates readers to address challenges in the areas of speech communication and signal processing Provides numerous examples, case studies, technical descriptions, and approaches of AI/ML
A veritable one-stop-shop for anyone looking to get up to speed on what is going down in the field of automated deduction right now. This book contains the refereed proceedings of the 21st International Conference on Automated Deduction, CADE-21, held in Bremen, Germany, in July 2007. The 28 revised full papers and 6 system descriptions presented were selected from 64 submissions. All current aspects of automated deduction are addressed, ranging from theoretical and methodological issues to presentation and evaluation of theorem provers and logical reasoning systems.