Inductive Representation, Proofs and Refinement of Pointer Structures

Total Page:16

File Type:pdf, Size:1020Kb

Inductive Representation, Proofs and Refinement of Pointer Structures THÈSETHÈSE En vue de l’obtention du DOCTORAT DE L’UNIVERSITÉ DE TOULOUSE Délivré par : l’Université Toulouse 3 Paul Sabatier (UT3 Paul Sabatier) Présentée et soutenue le 20 juin 2013 par : Mathieu Giorgino Inductive Representation, Proofs and Refinement of Pointer Structures (Représentation Inductive, Preuves et Raffinement de Structures de Pointeurs) JURY Rachid Echahed Chargé de Recherche CNRS LIG, Grenoble Louis Féraud Professeur des Universités IRIT, Toulouse Ralph Matthes Chargé de Recherche CNRS IRIT, Toulouse Pierre-Etienne Moreau Professeur des Universités INRIA, Nancy Marc Pantel Maître de Conférence IRIT-ENSEEIHT, Toulouse Martin Strecker Maître de Conférence IRIT, Toulouse Arnaud J. Venet Chargé de Recherche NASA Ames, Mountain View École doctorale et spécialité : MITT : Domaine STIC : Sureté de logiciel et calcul de haute performance Unité de Recherche : IRIT Directeurs de Thèse : Ralph Matthes et Martin Strecker Rapporteurs : Pierre-Etienne Moreau et Rachid Echahed Remerciements Je tiens tout d’abord à remercier tous les membres de mon jury au sens large (invités ou non), à commencer par mes rapporteurs Rachid Echahed et Pierre-Etienne Moreau qui ont accepté de prendre le temps de lire et évaluer ce que j’avais pu écrire. Je remercie aussi Marc Pantel pour les cours qu’il a pu me donner et sans qui cette thèse n’aurait pas pu commencer. Merci également à Louis Féraud d’avoir accepté de faire partie de ce jury et à Arnaud Venet pour sa cordialité et son humanité. Évidement cette thèse n’aurait jamais pu être accomplie sans mes deux directeurs Ralph Matthes et Martin Strecker. Je remercie Ralph pour tous les bons conseils qu’il m’a donné, tirés de son expérience raisonnée et de sa rigueur. J’ai beaucoup apprécié son impartialité teinté d’humanité appliquée aussi bien dans ses travaux scientifiques que dans ses tâches administratives. Un très grand merci à Martin qui m’a suivi tout au long de ses dernières années – en stage puis en thèse – et qui m’a même pratiquement pris par la main pour me montrer ce fabuleux métier qu’est la recherche (et cela même malgré les contraintes qu’il comporte). Merci à lui pour son grand coeur, son enclin à partager ses connaissances scientifiques et sa tendance naturelle à vouloir aider. Je m’excuse auprès d’eux d’avoir été si long à finir. Je tiens aussi à remercier l’équipe Isabelle de l’université technique de Munich, et en particulier Tobias Nipkow pour m’avoir accueilli pendant 2 mois. Ce fut une expérience réellement enrichissante aussi bien culturellement que scientifiquement. Merci plus par- ticulièrement à Florian Haftman qui a pris de son temps pour me guider dans la TUM, m’installer dans son bureau, s’intéresser à mon travail et me montrer les coulisses d’Isabelle. Merci aussi à Lukas Bulwahn et Jasmin Blanchette. Toutes ces années à l’IRIT auraient vraiment été ennuyeuses et fades sans mes deux collègues de bureau Celia et Christelle. Merci à Christelle pour nous avoir accueilli dans son bureau, ainsi que pour avoir partagé un peu de sa vie familiale et de ses expériences. Merci à Celia pour tous ses conseils, qu’ils aient été administratifs ou techniques, sa grande gentillesse et ses histoires toujours intéressantes, quoi qu’elle en dise ou quoi que j’ai eu l’air d’en penser ;-). Merci aussi à Mathias pour les discussions scientifiques que nous avons eu depuis son arrivé dans le bureau. Merci à tous les membres de l’équipe ACADIE qui m’ont accueilli et supporté pendant ces années, c’est à dire son chef bienveillant (et parfois pressant) Mamoun Filali, les permanents et mes collègues doctorants. Merci en particulier à Bertrand pour ses visites de bureau et ses discussions scientifiques à tendences philosophiques et parfois déprimantes ;-). Merci aussi à Selma pour sa gentillesse et sa bonne humeur. Je m’excuse auprès d’elle et de Nadehza pour avoir peut-être monopolisé Martin trop longtemps. Merci aux collègues de l’IRIT avec qui j’ai partagé de nombreux moments et d’intéressantes discussions, que ce soit pendant les repas au RU, les pauses à la cafét’, la fête de l’IRIT ou les sorties en dehors de l’université. Je cite par ordre de rencontre Anthony, Mathieu, les deux Sylvain, les deux François, Olivier, Guillaume, Victor, Dana, Samir, Philippe, Andra, Magdalina, Vali, Marie, Laure, Rodolphe, Dorian et Florian. L’administration, bien que déjà complexe serait certainement pire si il n’y avait pas une bonne équipe administrative. Merci en particulier à Arnaude Cariou, Sabyne Lartigue et au service mission. Merci aussi au service technique, et notamment Brigitte Marchiset et Jean- Pierre Baritaud. Merci encore à Martine Labruyère pour sa gentillesse et sa compréhension. i ii Remerciements Viennent ensuite tous ceux qui me sont proches et chers: ma famille et mes amis. Que dire tout d’abord à mes parents Christian et Annie, à qui je dois tout, sinon un immense merci. Merci pour l’éducation qu’ils m’ont donné, merci pour leur présence, merci pour leur soutien (qu’il soit matériel ou pas), merci encore. Merci ensuite à ma soeur Magali pour sa gentillesse et ses bons petits plats et à Nicolas qui la rend heureuse. Pour continuer, merci aussi à toute ma famille et en particulier à mes grands parents Yvette, Jean et Angel (je pense aussi à Madeleine), et à mes oncles, tantes et cousins. Enfin je remercie mes amis. Merci tout d’abord à Delphin qui m’accompagne dans toutes aventures, ski (encore ?), badminton (à reprendre ?), déménagements, technologies, voyages et jeux de sociétés... Merci aussi à Viorica pour les cinés et les soirées mémorables passées ensembles avec Delphin. Merci à Ana-Maria et Ovidiu pour leurs ballades toujours excellentes et bien organisées. Merci à Benoît (Papi) pour l’organisation des quelques voyages dont nous avons profité avec Delphin. Merci de même à Grégory pour les soirées tardives “Little Big Planet” ;-). Un grand merci aussi à Fara pour les bons moments passés ensembles. Merci également à Martin, à Benoît, à PX, à Pierre et à Eva. J’ai aussi une pensée pour ceux qui sont loin et que je ne contacte pas assez souvent. Notamment Franck et Elise (je vais venir, promis !), Simon et Isabelle, Jean-Christophe, Valentin et Mohammed. Pour finir, un immense merci à Monia pour cette merveilleuse année passée. Et j’espère aussi aux nombreuses années qui nous attendent. ii Contents Remerciements . i Contents . iii List of Figures . vii List of Definitions and Theorems . viii Introduction xi The Contributions in Short . xiv Thesis Layout . xiv I Foundations 1 1 An Example: Cyclic Lists 3 1.1 Cyclic Lists: Informally . 3 1.2 Specification with an Inductive Datatype . 4 1.2.1 Basics on Inductive Lists and Pairs . 4 1.2.2 Definitions of the Cyclic List Specifications . 5 1.2.3 Properties of the Cyclic List Specifications . 7 1.2.4 Accomplishments . 9 1.3 Example Refinement . 10 1.3.1 Datatypes . 10 1.3.2 Guidelines . 11 1.3.3 Function Refinements . 12 1.3.4 Inheritance of the Specification Properties . 18 2 Scientific Context 21 2.1 Isabelle/HOL . 21 2.1.1 Logic and Notations . 22 2.1.2 Standard Packages . 25 2.1.3 Imperative_HOL ............................. 34 2.2 Graph Transformations and Representations . 41 2.2.1 A Mathematical View (Raw Pointers) . 42 2.2.2 Graph Rewriting Systems . 43 2.2.3 Inductive Extensible Adjacency List . 48 2.2.4 Trees and Paths . 49 2.2.5 Infinite Trees through Coinduction . 50 2.2.6 In Short . 52 2.3 Program Correctness . 52 2.3.1 Hoare Logic . 53 2.3.2 Separation Logic . 55 2.3.3 Program Verification . 56 2.3.4 Refinement . 59 2.3.5 Safe Code Generation . 60 2.3.6 In Short . 60 iii iv CONTENTS II Contributions 63 3 Memory Model 65 3.1 Why Imperative_HOL ?............................. 66 3.2 Rough Edges of Imperative_HOL ....................... 67 3.2.1 Instantiation of Class countable .................... 67 3.2.2 Local Reasoning . 67 3.2.3 Reference Update . 69 3.2.4 Some Other Missing Features . 69 3.3 Representation of Datatypes in the Heap . 69 3.3.1 Examples of (non-)Countable Datatypes . 70 3.3.2 Proof that Datatypes are countable ................... 71 3.3.3 Related Work . 73 3.4 Proof tools . 74 3.5 Objects in Imperative_HOL (Removal of the Ref Class) . 75 3.5.1 Example: References in Imperative_HOL . 76 3.5.2 Consequences on Code Generation . 77 3.5.3 Defining Accessors and Field Update to Remove Indirections . 80 3.6 Objects in Isabelle/HOL . 85 3.6.1 Inheritance and Subtyping in Isabelle/HOL . 85 3.6.2 Traits in Isabelle/HOL . 86 4 Inductive Representations of Pointer Structures 87 4.1 Introduction . 88 4.2 A First Example on Singly-Linked Lists . 89 4.2.1 Datatypes . 89 4.2.2 Refinement Relation . 90 4.2.3 Functions . 91 4.2.4 Simulation Proof . 92 4.2.5 Entailment of Further Properties . 94 4.2.6 Conclusion . 96 4.3 Formal Refinement of Cyclic Lists . 96 4.3.1 Datatypes . 96 4.3.2 Functions . 97 4.3.3 Conclusion . 105 4.4 Possibly-Cyclic Lists . 105 4.4.1 Definitions . 106 4.4.2 Termination . 107 4.4.3 Correctness . 108 4.4.4 Refinement . 109 4.4.5 Conclusion . 110 4.5 Methodology . 111 4.5.1 A Classification of Algorithms w. r. t. Graphs . 111 4.5.2 The Inductive Structure . 115 4.5.3 The Missing Edges . 118 4.5.4 Other Modules . 119 iv CONTENTS v III Case-studies 121 5 The Schorr-Waite Algorithm 123 5.1 Introduction .
Recommended publications
  • A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
    A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems Benyamin Y. Y. Aziz, M.Sc. School of Computing, Dublin City University A thesis presented in fulfillment of the requirements for the degree of Doctor of Philosophy Supervisor: Dr Geoff Hamilton September 2003 “Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible” St. Francis of Assisi To Yowell, Olivia and Clotilde Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of the degree of Doctor of Philosophy (Ph.D.) is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: I.D. No.: Date: Acknowledgements I would like to thank all those people who were true sources of inspiration, knowledge, guidance and help to myself throughout the period of my doctoral research. In particular, I would like to thank my supervisor, Dr. Geoff Hamilton, without whom this work would not have seen the light. I would also like to thank Dr. David Gray, with whom I had many informative conversations, and my colleagues, Thomas Hack and Fr´ed´ericOehl, for their advice and guidance. Finally, I would like to mention that the work of this thesis was partially funded by project IMPROVE (Enterprise Ireland Strategic Grant ST/2000/94). Benyamin Aziz Abstract We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the π-calculus and its cryptographic extension, the spi calculus.
    [Show full text]
  • Static Analyses for Stratego Programs
    Static analyses for Stratego programs BSc project report June 30, 2011 Author name Vlad A. Vergu Author student number 1195549 Faculty Technical Informatics - ST track Company Delft Technical University Department Software Engineering Commission Ir. Bernard Sodoyer Dr. Eelco Visser 2 I Preface For the successful completion of their Bachelor of Science, students at the faculty of Computer Science of the Technical University of Delft are required to carry out a software engineering project. The present report is the conclusion of this Bachelor of Science project for the student Vlad A. Vergu. The project has been carried out within the Software Language Design and Engineering Group of the Computer Science faculty, under the direct supervision of Dr. Eelco Visser of the aforementioned department and Ir. Bernard Sodoyer. I would like to thank Dr. Eelco Visser for his past and ongoing involvment and support in my educational process and in particular for the many opportunities for interesting and challenging projects. I further want to thank Ir. Bernard Sodoyer for his support with this project and his patience with my sometimes unconvential way of working. Vlad Vergu Delft; June 30, 2011 II Summary Model driven software development is gaining momentum in the software engi- neering world. One approach to model driven software development is the design and development of domain-specific languages allowing programmers and users to spend more time on their core business and less on addressing non problem- specific issues. Language workbenches and support languages and compilers are necessary for supporting development of these domain-specific languages. One such workbench is the Spoofax Language Workbench.
    [Show full text]
  • A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
    A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems Benyamin Y. Y. Aziz, M.Sc. School of Computing, Dublin City University A thesis presented in fulfillment of the requirements for the degree of Doctor of Philosophy Supervisor: Dr Geoff Hamilton September 2003 “Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible” St. Francis of Assisi To Yowell, Olivia and Clotilde Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of the degree of Doctor of Philosophy (Ph.D.) is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: I.D. No.: Date: Acknowledgements I would like to thank all those people who were true sources of inspiration, knowledge, guidance and help to myself throughout the period of my doctoral research. In particular, I would like to thank my supervisor, Dr. Geoff Hamilton, without whom this work would not have seen the light. I would also like to thank Dr. David Gray, with whom I had many informative conversations, and my colleagues, Thomas Hack and Fr´ed´ericOehl, for their advice and guidance. Finally, I would like to mention that the work of this thesis was partially funded by project IMPROVE (Enterprise Ireland Strategic Grant ST/2000/94). Benyamin Aziz Abstract We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the π-calculus and its cryptographic extension, the spi calculus.
    [Show full text]
  • Galois a Language for Proofs Using Galois Connections and Fork Algebras
    Galois A Language for Proofs Using Galois Connections and Fork Algebras Paulo F. Silva Joost Visser Jose´ N. Oliveira CCTC, University of Minho, Braga Software Improvement Group CCTC, University of Minho, Braga Portugal The Netherlands Portugal paufi[email protected] [email protected] [email protected] Abstract DSLs in associated tool support for theorem proving and proof Galois is a domain specific language supported by the Galculator assistance. This tool, called Galculator (= Galois connection + interactive proof-assistant prototype. Galculator uses an equational calculator) [Silva and Oliveira 2008a], takes Galois connections approach based on Galois connections with indirect equality as as primitives and exploits their algebraic properties in proofs. Basi- an additional inference rule. Galois allows for the specification of cally, a Galois connection is a pair of functions with “good” preser- different theories in a point-free style by using fork algebras, an vation properties which connect two domains. Often, problems in extension of relation algebras with expressive power of first-order one of the domains are easier to solve than problems in the other logic. The language offers sub-languages to derive proof rules from domain. Using a Galois connection it is possible to map a “hard” Galois connections, to express proof tactics, and to organize axioms problem to an equivalent but easier one in the other domain, to and theorems into modular definitions. find its solution, and then map it back to the result in the origi- In this paper, we describe how the algebraic theory underlying nal domain (this is known as “shunting”). Galois connections are the proof-method drives the design of the Galois language.
    [Show full text]
  • Security and Privacy Implications of Third-Party Access to Online Social Networks
    Die approbierte Originalversion dieser Dissertation ist in der Hauptbibliothek der Technischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Security and Privacy Implications of Third-Party Access to Online Social Networks PhD THESIS submitted in partial fulfillment of the requirements of Doctor of Technical Sciences within the Vienna PhD School of Informatics by Markus Huber, M.Sc. Registration Number 0306665 to the Faculty of Informatics at the Vienna University of Technology Advisor: Privatdoz. Dipl.-Ing. Mag.rer.soc.oec. Dr.techn. Edgar Weippl Second advisor: o.Univ.Prof. Dipl.Ing. Dr. A Min Tjoa External reviewers: Assoc. Prof. Dr. Engin Kirda. Northeastern University, USA. Prof. Dr. Stefan Katzenbeisser. Technische Universität Darmstadt, Germany. Wien, 27.08.2013 (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Declaration of Authorship Markus Huber, M.Sc. Burggasse 102/8, AT-1070 Vienna, Austria I hereby declare that I have written this Doctoral Thesis independently, that I have com- pletely specified the utilized sources and resources and that I have definitely marked all parts of the work - including tables, maps and figures - which belong to other works or to the internet, literally or extracted, by referencing the source as borrowed. (Vienna, 27/08/2013) (Signature of Author) i Acknowledgements I am grateful to my supervisor Edgar R. Weippl for his excellent mentoring over the course of my postgraduate studies and for giving me the freedom to pursue my own research ideas.
    [Show full text]
  • Bulletin of the German Historical Institute Bulletin of the German Historical Institute Washington DC
    Fall 2020 Bulletin of the German Historical Institute Bulletin of the German Historical Institute Washington DC Editor: Richard F. Wetzell Assistant Editor: Insa Kummer The Bulletin appears twice a year and is available free of charge. Current and back issues are available online at: www.ghi-dc.org/bulletin To sign up for a subscription or to report an address change please send an email to [email protected]. For editorial comments or inquiries, please contact the editor at [email protected] or at the address below. For further information about the GHI, please visit our web site www.ghi-dc.org. For general inquiries, please send an email to [email protected]. German Historical Institute 1607 New Hampshire Ave NW Washington DC 20009-2562 USA Phone: (202) 387-3355 Fax: (202) 483-3430 © German Historical Institute 2020 All rights reserved ISSN 1048-9134 Bulletin of the German Historical Institute 67 | Fall 2020 3 Preface FORUM: NEW RESEARCH IN TRANSATLANTIC HISTORY Edited by Axel Jansen and Claudia Roesch 7 Introduction: New Trends in Transatlantic History Axel Jansen and Claudia Roesch 17 “The Indians must yield”: Antebellum Free Land, the Homestead Act, and the Displacement of Native Peoples Julius Wilm 41 Trading in the Shadow of Neutrality: German-Speaking Europe’s Commerce with Union and Confederacy during the American Civil War Patrick Gaul 71 A Tumultuous Relationship: Nicholas Murray Butler and Germany in the Era of the Two World Wars Elisabeth Piller 101 “Taken on faith”: Expertise in Aerial Warfare and the Democratic “West” in the
    [Show full text]
  • Deriving Dynamic-Programming Algorithms Based on Preservation of Monotonicity
    MATHEMATICAL ENGINEERING TECHNICAL REPORTS Calculus of Minimals: Deriving Dynamic-Programming Algorithms based on Preservation of Monotonicity Akimasa MORIHATA and Kiminori MATSUZAKI and Zhenjiang HU and Masato TAKEICHI METR 2007{61 December 2007 DEPARTMENT OF MATHEMATICAL INFORMATICS GRADUATE SCHOOL OF INFORMATION SCIENCE AND TECHNOLOGY THE UNIVERSITY OF TOKYO BUNKYO-KU, TOKYO 113-8656, JAPAN WWW page: http://www.keisu.t.u-tokyo.ac.jp/research/techrep/index.html The METR technical reports are published as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have o®ered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder. Calculus of Minimals: Deriving Dynamic-Programming Algorithms based on Preservation of Monotonicity Akimasa Morihata Kiminori Matsuzaki Zhenjiang Hu Masato Takeichi fmorihata,[email protected] fhu,[email protected] The University of Tokyo Abstract Constructing e±cient algorithms is di±cult and often considered to be a privilege of a few special- ists. Program calculation is a methodology for easy construction of e±cient algorithms, where e±cient algorithms are systematically derived from naive but obviously correct algorithms by calculational laws. This paper shows an ongoing e®ort to give a clear and e®ective methodology to deal with combinatorial optimization problems based on program calculation.
    [Show full text]
  • Zur Praktischen Anwendbarkeit Mathematisch Rigoroser Methoden Zum Sicherstellen Der Korrektheit Von Sequentiellen Computerprogrammen
    Zur praktischen Anwendbarkeit mathematisch rigoroser Methoden zum Sicherstellen der Korrektheit von sequentiellen Computerprogrammen an den Fachbereich Informatik der Technischen Hochschule Darmstadt zum Erlangen des akademischen Grades Doktor-Ingenieur (Dr.-Ing.) eingereichte Dissertation von Robert Laurence Baber geboren in Los Angeles, California, U.S.A. Master of Science in Electrical Engineering und Master of Science in Industrial Management, Massachusetts Institute of Technology Erstreferent: Prof. Dr.-Ing. Hans-Jürgen Hoffmann Korreferent: Prof. Dr. David Lorge Parnas eingereicht am: 1994 August 4 Prüfungstermin: 1994 September 30 Erschienen in Darmstadt, 1994 D 17ÜÜÜ GGGKolumnentitelzeile 14,4p hoch. Kolumnentitel 10p, Seitenzahl 12p GGG ÜÜÜ ÜÜÜ GGGAbstandszeile, 13,98p hoch GGG ÜÜÜ ÜÜÜ GGG ???Erste Zeile im Textbereich ??? GGG ÜÜÜ ÜÜÜ GGGSchrift 12p, Zeilenabstand 14,4p GGG ÜÜÜ ÜÜÜ GGG GGG ÜÜÜ ÜÜÜ GGG GGG ÜÜÜ ÜÜÜ GGG GGG ÜÜÜ Satzspiegel Baber: Praktische Anwendbarkeit ... Höhe des Textbereichs = 24,100 cm = 683,16p = 47,44 Zeilen á 14,4p = 48,797 Zeilen á 14p ÜÜÜ GGG GGG ÜÜÜ ÜÜÜ GGG GGG ÜÜÜ ÜÜÜ GGG GGG ÜÜÜ ÜÜÜ GGG yyy ??? gggLetzte Zeile im Textbereich ggg ??? yyy GGG ÜÜÜ Geleitworte Die Qualität technischer Produkte muß gesichert und geprüft sein, bevor sie an einen Kunden ausgeliefert werden. Das gilt auch für Programme! Bei der Programmentwicklung fehlte lange Zeit ein Ansatz, diese Forderung zu erfüllen. Es wurde drauflos programmiert und geglaubt oder gehofft, daß kein Fehler vorliegt, der die Qualität mindert oder das Programm eigentlich unbrauchbar macht. In der Praxis ist es weitgehend immer noch so. Die in den letzten beiden Jahrzehnten gewonnenen wissenschaftlichen Erkenntnisse zur Qualitätssicherung beim Entwurf und der Implementierung sowie dann auch der stichhaltigen, nachvollziehbaren Überprüfung haben sich kaum bei Praktikern eingeführt; es sei zu mathematisch, zu aufwendig, zu schwierig waren (und sind) häufig gehörte Meinungsäußerungen von Programmierern, Software-Entwicklern und Projektverantwortlichen.
    [Show full text]
  • Fish Creek Voices
    FISH CREEK VOICES An Oral History of A Door County Village edited by FISH CREEK VOICES An Oral History of A Door County Village FISH CREEK VOICES An Oral History of A Door County Village edited by Wm CAXTON LTD Sister Bay, Wisconsin Published by Wm Caxton Ltd Box 709 - Smith Drive & Hwy 57 Sister Bay, WI 54234 (414) 854-2955 Copyright 1990 by Edward Schreiber. All rights reserved. No part of this book may be reproduced in any form or by any means without permission in writing from the publisher, except by a reviewer, who may quote brief passages in a review. Printed in the United States of America. 10 987654321 Library of Congress Cataloging-in-Publication Data Fish creek voices : oral an history of a Door County village / Edward & Lois Schreiber. p. cm. ISBN 0-940473-15-1 (alk. paper) : $20.00 - ISBN 0-940473-16-X (pbk. : alk. paper) $9.95 1. Fish Creek (Wis.)-Social life and customs. 2. Fish Creek (Wis.)-Biography. 3. Oral history. I. Schreiber, Edward, 1914- . II. Schreiber, Lois, 1910-1990 F589.F616F57 1990 977.5’63—dc20 90-38035 CIP ISBN# 0-940473-15-1 (hardcover) ISBN# 0-940473-16-X (paperback) This book is set in a version of Times Roman type chosen for its readability and attractiveness; it is printed on acid-neutral paper bound in sewn signatures and is intended to provide a very long useful life. This book is dedicated to the memory of my wife Lois Schreiber, who helped in many ways to organize the information and suggest the form of the material included here.
    [Show full text]
  • The Third Homomorphism Theorem on Trees Downward & Upward Lead to Divide-And-Conquer
    The Third Homomorphism Theorem on Trees Downward & Upward Lead to Divide-and-Conquer Akimasa Morihata Kiminori Matsuzaki Zhenjiang Hu Masato Takeichi University of Tokyo University of Tokyo National Institute of University of Tokyo JSPS Research Fellow Informatics [email protected] [email protected] [email protected] [email protected] Abstract 1. Introduction Parallel programs on lists have been intensively studied. It is What are little boys made of? well known that associativity provides a good characterization for Snips and snails, and puppy-dogs’ tails divide-and-conquer parallel programs. In particular, the third ho- That’s what little boys are made of! momorphism theorem is not only useful for systematic development What are little girls made of? of parallel programs on lists, but it is also suitable for automatic Sugar and spice and all things nice parallelization. The theorem states that if two sequential programs That’s what little girls are made of! iterate the same list leftward and rightward, respectively, and com- (an old nursery rhyme) pute the same value, then there exists a divide-and-conquer parallel program that computes the same value as the sequential programs. What are parallel programs on lists made of? Consider summing While there have been many studies on lists, few have been up the elements in a list [a1; a2; a3; a4; a5; a6; a7; a8] as an exam- done for characterizing and developing of parallel programs on ple. It is easy to derive sequential algorithms; both the rightward trees.
    [Show full text]
  • Trustees, Administration, Faculty
    Section Six Trustees, Administration, Faculty 628 Trustees, Administration, Faculty OFFICERS Peggy L. Cherng (2012) Co-Chairman Panda Restaurant Group David L. Lee, Chairman Robert B. Chess (2006) Ronald K. Linde, Vice Chairman Chairman Nektar Therapeutics Thomas F. Rosenbaum, President David Dreier (2013) Edward M. Stolper, Provost Lounette M. Dyer (1998) Joshua S. Friedman (2012) Matthew Brewer Co-founder, Co-Chairman and Controller Co-Chief Executive Officer Dean W. Currie Canyon Partners, LLC Vice President for Business and William T. Gross (1994) Finance Founder and Chief Executive Officer Charles Elachi Idealab Vice President and Director, Jet Narenda K. Gupta (2011) Propulsion Laboratory Co-Founder and Managing Director Diana Jergovic Nexus Venture Partners Vice President for Maria D. Hummer-Tuttle (2012) Strategic Implementation President Brian K. Lee Hummer Tuttle Foundation Vice President for Robert T. Jenkins (2005) Development and Institute G. Bradford Jones (2014) Relations Founding Partner Sharon E. Patterson Redpoint Ventures Associate Vice President for Peter D. Kaufman (2008) Finance and Treasurer Chairman and Chief Executive Officer Scott Richland Glenair, Inc. Chief Investment Officer Louise Kirkbride (1995) Joseph E. Shepherd Board Member Vice President for Student State of California Contractors Affairs State License Board Victoria D. Stratman Walter G. Kortschak (2012) General Counsel Senior Advisor and Former Managing Mary L. Webster Partner Secretary Summit Partners, L.P. Jon B. Kutler (2005) Chairman and Chief Executive Officer BOARD OF TRUSTEES Admiralty Partners, Inc. David Li Lee (2000) Trustees Managing General Partner (with date of first election) Clarity Partners, L.P. York Liao (1997) Sean Bailey (2015) Managing Director President Winbridge Company Ltd.
    [Show full text]
  • Intersection Types and Higher-Order Model Checking
    Intersection Types and Higher-Order Model Checking Steven J. Ramsay Merton College University of Oxford A dissertation submitted for the degree of Doctor of Philosophy in Computer Science Trinity Term 2013 Abstract Higher-order recursion schemes are systems of equations that are used to define finite and infinite labelled trees. Since, as Ong has shown, the trees defined have a decidable monadic second order theory, recursion schemes have drawn the attention of research in program verification, where they sit naturally as a higher-order, functional analogue of Boolean programs. Driven by applications, fragments have been studied, algorithms developed and extensions proposed; the emerging theme is called higher- order model checking. Kobayashi has pioneered an approach to higher-order model checking using intersection types, from which many recent advances have followed. The key is a characterisation of model checking as a problem of intersection type assignment. This dissertation contributes to both the theory and practice of the intersection type approach. A new, fixed-parameter polynomial-time decision procedure is described for the alternating trivial automaton fragment of higher-order model checking. The algorithm uses a novel, type-directed form of abstraction refinement, in which behaviours of the scheme are distinguished according to the intersection types that they inhabit. Furthermore, by using types to reason about acceptance and rejection simultaneously, the algorithm is able to converge on a solution from two sides. An implementation, Preface, and an extensive body of evidence demonstrate empirically that the algorithm scales well to schemes of several thousand rules. A comparison with other tools on benchmarks derived from current practice and the related literature puts it well beyond the state-of-the-art.
    [Show full text]