Abstraction and Abstraction Refinement in the Verification Of

Total Page:16

File Type:pdf, Size:1020Kb

Abstraction and Abstraction Refinement in the Verification Of Abstraction and Abstraction Refinement in the Verification of Graph Transformation Systems Vom Fachbereich Ingenieurwissenschaften Abteilung Informatik und angewandte Kognitionswissenschaft der Unversit¨at Duisburg-Essen zur Erlangung des akademischen Grades eines Doktor der Naturwissenschaften (Dr.-rer. nat.) genehmigte Dissertation von Vitaly Kozyura aus Magadan, Russland Referent: Prof. Dr. Barbara K¨onig Korreferent: Prof. Dr. Arend Rensink Tag der m¨undlichen Pr¨ufung: 05.08.2009 Abstract Graph transformation systems (GTSs) form a natural and convenient specification language which is used for modelling concurrent and distributed systems with dynamic topologies. These can be, for example, network and Internet protocols, mobile processes with dynamic behavior and dynamic pointer structures in programming languages. All this, together with the possibility to visualize and explain system behavior using graphical methods, makes GTSs a well-suited formalism for the specification of complex dynamic distributed systems. Under these circumstances the problem of checking whether a certain property of GTSs holds – the verification problem – is considered to be a very important question. Unfortunately the verification of GTSs is in general undecidable because of the Turing- completeness of GTSs. In the last few years a technique for analysing GTSs based on approximation by Petri graphs has been developed. Petri graphs are Petri nets having additional graph structure. In this work we focus on the verification techniques based on counterexample-guided abstraction refinement (CEGAR approach). It starts with a coarse initial over-approxi- mation of a system and an obtained counterexample. If the counterexample is spurious then one starts a refinement procedure of the approximation, based on the structure of the counterexample. The CEGAR approach has proved to be very successful for the verification of systems based on their over-approximations. This thesis investigates a counterexample-guided abstraction refinement approach for systems modelled with GTSs. Starting with a given spurious counterexample, we describe here how to construct a more exact approximation (by separating merged nodes) for which this counterexamples disappears. This procedure can be performed repeatedly for any number of spurious counterexamples. Furthermore, an incremental coverability approach for Petri nets is developed, which allows one to speed-up the construction of over-approximations of GTSs. A well-known approach is to extend a modelling language with the possibility of de- scribing attributes as values of some data types. The approximation-based verification technique, including a counterexample-guided abstraction refinement, is hence also gen- eralized in this work to attributed GTSs (AGTSs), where the attributes are abstracted in the framework of abstract interpretation. In the practical part, a verification tool Augur 2 is developed, which supports the whole verification process for GTSs and AGTSs. A number of case studies (both at- tributed and non-attributed GTSs) were successfully solved with Augur 2. Acknowledgement First of all, I would like to thank my doctoral adviser, Barbara K¨onig, for being my supervisor, for encouraging and challenging me throughout the academic program. This work would not have been possible without her. I want to express my gratitude to Javier Esparza, whose works on Petri net unfolding have awakened my interests to the related areas of computer science. I thank him also for his support and advices on various aspects of my work. I also would like to thank my colleagues, Sander Bruggink, Tobias Heindel, Stefan Kiefer, Michael Luttenberger, Claus Schr¨oter, Alin Stefanescu and Dejvuth Suwimon- teerabuth, for their help and many interesting discussions on the topics of this thesis. Also I thank a lot all students have being involved in the development of the verification tool Augur. It was a very interesting and pleasant team work experience. I am very grateful to my family, to my parents for their lifelong support, and to my wife for being my friend and companion. Finally my thanks go to the reviewers of this thesis for reading the result of my efforts. Contents 1 Introduction 3 1.1 Verification of Graph Transformation Systems . ....... 3 1.2 Summary and Contribution of the Thesis . ... 5 1.3 RelatedWork.................................. 7 1.4 Publications................................... 10 1.5 Contributions.................................. 12 2 Petri Nets 13 2.1 IntroductiontoPetriNets . .. 13 2.2 CoverabilityGraphs .............................. 14 2.3 Incremental Calculation of Coverability Graphs . ......... 18 2.4 BackwardCoverabilityAlgorithm. .... 23 3 Graph Transformation Systems 26 3.1 Introduction to Graph Transformation Systems . ....... 26 3.2 Verification of Graph Transformation Systems . ....... 28 4 Attributed Petri Nets and Graph Transformation Systems 37 4.1 AlgebrasandAbstraction . 37 4.2 AttributedPetriNets ............................. 40 4.3 Attributed Graph Transformation Systems . ...... 42 4.4 Verification of Attributed Graph Transformation Systems ......... 45 5 Counterexample-Guided Abstraction Refinement 53 5.1 Abstraction Refinement of Graph Transformation Systems ......... 53 5.1.1 SpuriousRuns ............................. 54 5.1.2 Relations on Nodes for Refining Abstract Runs . ... 55 5.1.3 Elimination of Spurious Runs . 58 5.1.4 Correctness ............................... 60 5.2 Abstraction Refinement of Attributed Graph TransformationSystems . 63 6 Augur – a Tool for the Analysis of Graph Transformation Systems 69 6.1 Brief Description of Augur 1......................... 69 6.2 Software Design of Augur 2 ......................... 70 6.3 System Architecture of Augur 2 ....................... 72 6.4 FunctionalityandUsage . 77 1 7 Case Studies 83 7.1 Public-PrivateServers . .. 84 7.2 Firewall ..................................... 87 7.3 Experiments with the Incremental Coverability Approach ......... 91 7.4 Random Graph Transformation Systems - Statistical Results ....... 93 7.5 VerifyingRed-BlackTrees . .. 96 7.6 LeaderElectionProtocol. 102 7.7 Needham-SchroederProtocol . 104 8 Conclusion and Future Work 108 A Basic Category Theory for Graph Rewriting 118 B Example in GTXL format 122 C Example in new GTXL format 124 D Example in GXL format 127 E Example of an SPL program 129 F Verification Example 131 2 Chapter 1 Introduction 1.1 Verification of Graph Transformation Systems In the last decades, the development of computers and networks, the appearance and the rapid expansion of Internet technologies have led to increasing complexity and strong interconnection of computer systems. Under these circumstances, the problem of mod- elling and analyzing complex distributed systems is considered to be a very important question. Unfortunately, many of today’s methods describe distributed and mobile sys- tems with formalisms that either have an infinite state space, making many interesting questions undecidable, or a very a large state space, leading to the so-called state explo- sion problem. This makes the important problem of modelling and verification of mobile and distributed systems a very difficult one. The approach in this thesis is based on a rather natural and expressive modelling language, namely graph transformation systems (GTSs) [95]. GTSs have their origin in the late 1960’s and were developed up to now into a rich theory with many different branches. The development was originally motivated by such areas of computer science as pattern recognition, description of data types and compiler construction. Later, more modern branches of computer science, such as computer networks with different topolo- gies, mobile processes, UML diagrams and web services have also been specified and analysed with GTSs. Being a natural generalization of formal language theory, based on string rewriting and the theory of term rewriting, GTSs are also interesting from a theoretical point of view. For many structures in computer science, a static description of system states can be obtained with the help of graphs in a rather natural way. As an example, we consider computer networks, where stations can be represented as nodes of graphs and the network connections as edges. As a more specific example, we mention here pointer structures on the heap in a programming language, where objects are nodes and the values of pointers are modelled with edges. These can be, for example, memory allocation structures in the programming language C, but the same structures arise also for object-oriented languages, such as Java. Graph transformations provide also the possibility of describing the dynamical be- havior of systems. Using GTSs one can model in a natural way dynamic creation and deletion of objects, for example, computer stations entering and leaving the network or mobile processes moving between different stations. GTSs are also a very convenient modelling language for systems with evolving topologies, where not only the number of the components but also the structure of the connections between them is dynamic. This is often the case in network and Internet protocols. Also in the evaluation of dynamic pointer structures on the heap in a programming language mentioned above, the topology 3 of the structures is a subject of constant changes. The language of GTSs is also very helpful in the modelling of distributed and con- current systems. Such systems appear as a natural result of using networks, and the research on their specification and verification
Recommended publications
  • EM-Training for Weighted Aligned Hypergraph Bimorphisms
    EM-Training for Weighted Aligned Hypergraph Bimorphisms Frank Drewes Kilian Gebhardt and Heiko Vogler Department of Computing Science Department of Computer Science Umea˚ University Technische Universitat¨ Dresden S-901 87 Umea,˚ Sweden D-01062 Dresden, Germany [email protected] [email protected] [email protected] Abstract malized by the new concept of hybrid grammar. Much as in the mentioned synchronous grammars, We develop the concept of weighted a hybrid grammar synchronizes the derivations aligned hypergraph bimorphism where the of nonterminals of a string grammar, e.g., a lin- weights may, in particular, represent proba- ear context-free rewriting system (LCFRS) (Vijay- bilities. Such a bimorphism consists of an Shanker et al., 1987), and of nonterminals of a R 0-weighted regular tree grammar, two ≥ tree grammar, e.g., regular tree grammar (Brainerd, hypergraph algebras that interpret the gen- 1969) or simple definite-clause programs (sDCP) erated trees, and a family of alignments (Deransart and Małuszynski, 1985). Additionally it between the two interpretations. Seman- synchronizes terminal symbols, thereby establish- tically, this yields a set of bihypergraphs ing an explicit alignment between the positions of each consisting of two hypergraphs and the string and the nodes of the tree. We note that an explicit alignment between them; e.g., LCFRS/sDCP hybrid grammars can also generate discontinuous phrase structures and non- non-projective dependency structures. projective dependency structures are bihy- In this paper we focus on the task of training an pergraphs. We present an EM-training al- LCFRS/sDCP hybrid grammar, that is, assigning gorithm which takes a corpus of bihyper- probabilities to its rules given a corpus of discon- graphs and an aligned hypergraph bimor- tinuous phrase structures or non-projective depen- phism as input and generates a sequence dency structures.
    [Show full text]
  • Domain Theory and the Logic of Observable Properties
    Domain Theory and the Logic of Observable Properties Samson Abramsky Submitted for the degree of Doctor of Philosophy Queen Mary College University of London October 31st 1987 Abstract The mathematical framework of Stone duality is used to synthesize a number of hitherto separate developments in Theoretical Computer Science: • Domain Theory, the mathematical theory of computation introduced by Scott as a foundation for denotational semantics. • The theory of concurrency and systems behaviour developed by Milner, Hennessy et al. based on operational semantics. • Logics of programs. Stone duality provides a junction between semantics (spaces of points = denotations of computational processes) and logics (lattices of properties of processes). Moreover, the underlying logic is geometric, which can be com- putationally interpreted as the logic of observable properties—i.e. properties which can be determined to hold of a process on the basis of a finite amount of information about its execution. These ideas lead to the following programme: 1. A metalanguage is introduced, comprising • types = universes of discourse for various computational situa- tions. • terms = programs = syntactic intensions for models or points. 2. A standard denotational interpretation of the metalanguage is given, assigning domains to types and domain elements to terms. 3. The metalanguage is also given a logical interpretation, in which types are interpreted as propositional theories and terms are interpreted via a program logic, which axiomatizes the properties they satisfy. 2 4. The two interpretations are related by showing that they are Stone duals of each other. Hence, semantics and logic are guaranteed to be in harmony with each other, and in fact each determines the other up to isomorphism.
    [Show full text]
  • Algebraic Implementation of Abstract Data Types*
    Theoretical Computer Science 20 (1982) 209-263 209 North-Holland Publishing Company ALGEBRAIC IMPLEMENTATION OF ABSTRACT DATA TYPES* H. EHRIG, H.-J. KREOWSKI, B. MAHR and P. PADAWITZ Fachbereich Informatik, TV Berlin, 1000 Berlin 10, Fed. Rep. Germany Communicated by M. Nivat Received October 1981 Abstract. Starting with a review of the theory of algebraic specifications in the sense of the ADJ-group a new theory for algebraic implementations of abstract data types is presented. While main concepts of this new theory were given already at several conferences this paper provides the full theory of algebraic implementations developed in Berlin except of complexity considerations which are given in a separate paper. The new concept of algebraic implementations includes implementations for algorithms in specific programming languages and on the other hand it meets also the requirements for stepwise refinement of structured programs and software systems as introduced by Dijkstra and Wirth. On the syntactical level an algebraic implementation corresponds to a system of recursive programs while the semantical level is defined by algebraic constructions, called SYNTHESIS, RESTRICTION and IDENTIFICATION. Moreover the concept allows composition of implementations and a rigorous study of correctness. The main results of the paper are different kinds of correctness criteria which are applied to a number of illustrating examples including the implementation of sets by hash-tables. Algebraic implementations of larger systems like a histogram or a parts system are given in separate case studies which, however, are not included in this paper. 1. Introduction The concept of abstract data types was developed since about ten years starting with the debacles of large software systems in the late 60's.
    [Show full text]
  • Categories of Coalgebras with Monadic Homomorphisms Wolfram Kahl
    Categories of Coalgebras with Monadic Homomorphisms Wolfram Kahl To cite this version: Wolfram Kahl. Categories of Coalgebras with Monadic Homomorphisms. 12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.151-167, 10.1007/978-3-662-44124-4_9. hal-01408758 HAL Id: hal-01408758 https://hal.inria.fr/hal-01408758 Submitted on 5 Dec 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Categories of Coalgebras with Monadic Homomorphisms Wolfram Kahl McMaster University, Hamilton, Ontario, Canada, [email protected] Abstract. Abstract graph transformation approaches traditionally con- sider graph structures as algebras over signatures where all function sym- bols are unary. Attributed graphs, with attributes taken from (term) algebras over ar- bitrary signatures do not fit directly into this kind of transformation ap- proach, since algebras containing function symbols taking two or more arguments do not allow component-wise construction of pushouts. We show how shifting from the algebraic view to a coalgebraic view of graph structures opens up additional flexibility, and enables treat- ing term algebras over arbitrary signatures in essentially the same way as unstructured label sets.
    [Show full text]
  • Syntax and Semantics in Algebra Jean-François Nicaud, Denis Bouhineau, Jean-Michel Gélis
    Syntax and semantics in algebra Jean-François Nicaud, Denis Bouhineau, Jean-Michel Gélis To cite this version: Jean-François Nicaud, Denis Bouhineau, Jean-Michel Gélis. Syntax and semantics in algebra. Pro- ceedings of the 12th ICMI Study Conference. The University of Melbourne, 2001, Australia. 12 p. hal-00962023 HAL Id: hal-00962023 https://hal.archives-ouvertes.fr/hal-00962023 Submitted on 25 Mar 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 1 Syntax and Semantics in Algebra Jean-François Nicaud, Denis Bouhineau Jean-Michel )*lis I IN, University of Nantes, France IUFM of Versailles, France $bouhineau, nicaud%&irin.univ-nantes.fr gelis&inrp.fr This paper is the first chapter of a cognitive, didactic and computatio- nal theory of algebra that presents, in a formal .ay, .ell /no.n elements of mathematics 0numbers, functions and polynomials1 as semantic ob2ects, and expressions as syntactic constructions. The lin/ bet.een syntax and semantics is realised by morphisms. The paper highlights preferred semantics for algebra and defines formally algebraic problems. 3ey.ords4 syntax, semantics, formalisation, algebraic problem. Introduction This paper describes a theory of algebra .ith cognitive, didactic and computational features.
    [Show full text]
  • Lecture Notes for MATH 770 : Foundations of Mathematics — University of Wisconsin – Madison, Fall 2005
    Lecture notes for MATH 770 : Foundations of Mathematics — University of Wisconsin – Madison, Fall 2005 Ita¨ıBEN YAACOV Ita¨ı BEN YAACOV, Institut Camille Jordan, Universite´ Claude Bernard Lyon 1, 43 boulevard du 11 novembre 1918, 69622 Villeurbanne Cedex URL: http://math.univ-lyon1.fr/~begnac/ c Ita¨ıBEN YAACOV. All rights reserved. CONTENTS Contents Chapter 1. Propositional Logic 1 1.1. Syntax 1 1.2. Semantics 3 1.3. Syntactic deduction 6 Exercises 12 Chapter 2. First order Predicate Logic 17 2.1. Syntax 17 2.2. Semantics 19 2.3. Substitutions 22 2.4. Syntactic deduction 26 Exercises 35 Chapter 3. Model Theory 39 3.1. Elementary extensions and embeddings 40 3.2. Quantifier elimination 46 Exercises 51 Chapter 4. Incompleteness 53 4.1. Recursive functions 54 4.2. Coding syntax in Arithmetic 59 4.3. Representation of recursive functions 64 4.4. Incompleteness 69 4.5. A “physical” computation model: register machines 71 Exercises 75 Chapter 5. Set theory 77 5.1. Axioms for set theory 77 5.2. Well ordered sets 80 5.3. Cardinals 86 Exercises 94 –sourcefile– iii Rev: –revision–, July 22, 2008 CONTENTS 1.1. SYNTAX CHAPTER 1 Propositional Logic Basic ingredients: • Propositional variables, which will be denoted by capital letters P,Q,R,..., or sometimes P0, P1, P2,.... These stand for basic statements, such as “the sun is hot”, “the moon is made of cheese”, or “everybody likes math”. The set of propositional variables will be called vocabulary. It may be infinite. • Logical connectives: ¬ (unary connective), →, ∧, ∨ (binary connectives), and possibly others. Each logical connective is defined by its truth table: A B A → B A ∧ B A ∨ B A ¬A T T T T T T F T F F F T F T F T T F T F F T F F Thus: • The connective ¬ means “not”: ¬A means “not A”.
    [Show full text]
  • Abstract Data Types
    1 Abstract data types The history of programming languages may be characterized as the genesis of increasingly powerful abstractions to aid the development of reliable programs. Abstract data types 8 1-1 abstraction and types • algebraic specification • modules versus classes • types as constraints • Additional keywords and phrases: control abstractions, data abstractions, compiler support, description systems, behavioral specification, imple- mentation specification Slide 1-1: Abstract data types In this chapter we will look at the notion of abstract data types, which may be regarded as an essential constituent of object-oriented modeling. In particular, we will study the notion of data abstraction from a foundational perspective, that is based on a mathematical description of types. We start this chapter by discussing the notion of types as constraints. Then, we look at the (first order) algebraic specification of abstract data types, and we explore the trade- offs between the traditional implementation of abstract data types by employing 1 2 Abstract data types modules and the object-oriented approach employing classes. We conclude this chapter by exploring the distinction between classes and types, as a preparation for the treatment of (higher order) polymorphic type theories for object types and inheritance in the next chapter. 1.1 Abstraction and types The concern for abstraction may be regarded as the driving force behind the development of programming languages (of which there are astoundingly many). In the following we will discuss the role of abstraction in programming, and especially the importance of types. We then briefly look at what mathematical means we have available to describe types from a foundational perspective and what we may (and may not) expect from types in object-oriented programming.
    [Show full text]
  • Algebraic Semantics Abstract Type Whose Values Are Lists of Algebraic Semantics Involves the Algebraic Integers: Specification of Data and Language Constructs
    Algebraic Semantics Abstract type whose values are lists of Algebraic semantics involves the algebraic integers: specification of data and language constructs. Sorts = { Integer, Boolean, List }. Function symbols with their signatures: Foundations based on abstract algebras. zero : Integer Basic idea one : Integer • Name the sorts of objects and the operations plus ( _ , _ ) : Integer, Integer ! Integer on the objects. minus ( _ , _ ) : Integer, Integer ! Integer • Use algebraic axioms to describe their characteristic properties. true : Boolean false : Boolean An algebraic specification contains two parts: emptyList : List signature and equations. cons ( _ , _ ) : Integer, List ! List A signature # of an algebraic specification head ( _ ) : List ! Integer is a pair <Sorts, Operations> where tail ( _ ) : List ! List • Sorts is a set containing names of sorts. empty? ( _ ) : List ! Boolean • Operations is a family of function symbols length ( _ ) : List ! Integer indexed by the functionalities of the operations represented by the function symbols. Chapter 12 1 Chapter 12 2 Family of operations decomposes: Module Representation OprBoolean = { true, false } OprInteger,Integer!Integer = { plus, minus } • Decompose definitions into relatively small OprList!Integer = { head, length } components. Equations constrain the operations to indicate • Import the signature and equations of one the appropriate behavior for the operations. module into another. head (cons (m, s)) = m, empty? (emptyList) = true • Define sorts and functions to be either exported or hidden. empty? (cons (m, s)) = false. Each stands for a closed assertion: • Modules can be parameterized to define generic abstract data types. "m:Integer, "s:List [head (cons (m, s)) = m]. empty? (emptyList) = true "m:Integer, "s:List [empty? (cons (m, s))= false].
    [Show full text]
  • The Agda Universal Algebra Library Part 2: Structure Homomorphisms, Terms, Classes of Algebras, Subalgebras, and Homomorphic Images
    The Agda Universal Algebra Library Part 2: Structure Homomorphisms, terms, classes of algebras, subalgebras, and homomorphic images William DeMeo a S Department of Algebra, Charles University in Prague Abstract The Agda Universal Algebra Library (UALib) is a library of types and programs (theorems and proofs) we developed to formalize the foundations of universal algebra in dependent type theory using the Agda programming language and proof assistant. The UALib includes a substantial collection of definitions, theorems, and proofs from universal algebra, equational logic, and model theory, and as such provides many examples that exhibit the power of inductive and dependent types for representing and reasoning about mathematical structures and equational theories. In this paper, we describe the the types and proofs of the UALib that concern homomorphisms, terms, and subalgebras. 2012 ACM Subject Classification Theory of computation → Logic and verification; Computing meth- odologies → Representation of mathematical objects; Theory of computation → Type theory Keywords and phrases Agda, constructive mathematics, dependent types, equational logic, extension- ality, formalization of mathematics, model theory, type theory, universal algebra Related Version hosted on arXiv Part 1, Part 3: http://arxiv.org/a/demeo_w_1 Supplementary Material Documentation: ualib.org Software: https://gitlab.com/ualib/ualib.gitlab.io.git Contents 1 Introduction 2 1.1 Motivation ....................................... 2 1.2 Attributions and Contributions ...........................
    [Show full text]
  • Lectures on Universal Algebra
    Lectures on Universal Algebra Matt Valeriote McMaster University November 8, 1999 1 Algebras In this ¯rst section we will consider some common features of familiar alge- braic structures such as groups, rings, lattices, and boolean algebras to arrive at a de¯nition of a general algebraic structure. Recall that a group G consists of a nonempty set G, along with a binary ¡1 operation ¢ : G ! G, a unary operation : G ! G, and a constant 1G such that ² x ¢ (y ¢ z) = (x ¢ y) ¢ z for all x, y, z 2 G, ¡1 ¡1 ² x ¢ x = 1G and x ¢ x = 1G for all x 2 G, ² 1G ¢ x = x and x ¢ 1G = x for all x 2 G. A group is abelian if it additionally satis¯es: x ¢ y = y ¢ x for all x, y 2 G. A ring R is a nonempty set R along with binary operations +, ¢, a unary operation ¡, and constants 0R and 1R which satisfy ² R, along with +, ¡, and 0R is an abelian group. ² x ¢ (y ¢ z) = (x ¢ y) ¢ z for all x, y, z 2 G. ² x ¢ (y + z) = (x ¢ y) + (x ¢ z) and (y + z) ¢ x = (y ¢ x) + (z ¢ x) for all x, y, z 2 G. 1 ² 1G ¢ x = x and x ¢ 1G = x for all x 2 G. Lattices are algebras of a di®erent nature, they are essentially an algebraic encoding of partially ordered sets which have the property that any pair of elements of the ordered set has a least upper bound and a greatest lower bound. A lattice L consists of a nonempty set L, equipped with two binary operations ^ and _ which satisfy: ² x ^ x = x and x _ x = x for all x 2 L, ² x ^ y = y ^ x and x _ y = y _ x for all x, y 2 L, ² x ^ (y _ x) = x and x _ (y ^ x) = x for all x, y 2 L.
    [Show full text]
  • Domain Theory Corrected and Expanded Version Samson Abramsky1 and Achim Jung2
    Domain Theory Corrected and expanded version Samson Abramsky1 and Achim Jung2 This text is based on the chapter Domain Theory in the Handbook of Logic in Com- puter Science, volume 3, edited by S. Abramsky, Dov M. Gabbay, and T. S. E. Maibaum, published by Clarendon Press, Oxford in 1994. While the numbering of all theorems and definitions has been kept the same, we have included comments and corrections which we have received over the years. For ease of reading, small typo- graphical errors have simply been corrected. Where we felt the original text gave a misleading impression, we have included additional explanations, clearly marked as such. If you wish to refer to this text, then please cite the published original version where possible, or otherwise this on-line version which we try to keep available from the page http://www.cs.bham.ac.uk/˜axj/papers.html We will be grateful to receive further comments or suggestions. Please send them to [email protected] So far, we have received comments and/or corrections from Liang-Ting Chen, Francesco Consentino, Joseph D. Darcy, Mohamed El-Zawawy, Miroslav Haviar, Weng Kin Ho, Klaus Keimel, Olaf Klinke, Xuhui Li, Homeira Pajoohesh, Dieter Spreen, and Dominic van der Zypen. 1Computing Laboratory, University of Oxford, Wolfson Building, Parks Road, Oxford, OX1 3QD, Eng- land. 2School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15 2TT, England. Contents 1 Introduction and Overview 5 1.1 Origins ................................. 5 1.2 Ourapproach .............................. 7 1.3 Overview ................................ 7 2 Domains individually 10 2.1 Convergence .............................
    [Show full text]
  • Arxiv:1611.02908V1 [Cs.LO] 9 Nov 2016 1
    Coming to Terms with Quantified Reasoning Laura Kovács Simon Robillard Andrei Voronkov TU Wien, Austria Chalmers Univ. of Technology, Sweden University of Manchester, UK [email protected] [email protected] Chalmers Univ. of Technology, Sweden [email protected] Abstract program analysis. Terms may be used to formalize the semantics The theory of finite term algebras provides a natural framework to of programming languages (Goguen et al. 1977; Clark 1978; Cour- describe the semantics of functional languages. The ability to effi- celle 1983); they can also themselves be the object of computation. ciently reason about term algebras is essential to automate program The latter is especially obvious in the case of functional program- analysis and verification for functional or imperative programs over ming languages, where algebraic data structures are manipulated. algebraic data types such as lists and trees. However, as the theory Consider for example the following declaration, in the functional of finite term algebras is not finitely axiomatizable, reasoning about language ML: quantified properties over term algebras is challenging. datatype nat = zero | succ of nat; In this paper we address full first-order reasoning about prop- erties of programs manipulating term algebras, and describe two Although the functional programmer calls this a data type declara- approaches for doing so by using first-order theorem proving. Our tion, the logician really sees the declaration of an (initial) algebra first method is a conservative extension of the theory of term alge- whose signature is composed of two symbols: the constant zero bras using a finite number of statements, while our second method and the unary function succ.
    [Show full text]