Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Horn Clause Solvers for Program Verification - MaRDI portal

Horn Clause Solvers for Program Verification

From MaRDI portal
Publication:2947164

DOI10.1007/978-3-319-23534-9_2zbMath1465.68044OpenAlexW2293809538MaRDI QIDQ2947164

Nikolaj Bjørner, Arie Gurfinkel, K. L. McMillan, Andrey Rybalchenko

Publication date: 22 September 2015

Published in: Fields of Logic and Computation II (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-23534-9_2



Related Items

Verifying Catamorphism-Based Contracts using Constrained Horn Clauses, Counterexample-Guided Prophecy for Model Checking Modulo the Theory of Arrays, A Datalog hammer for supervisor verification conditions modulo simple linear arithmetic, Symbol elimination and applications to parametric entailment problems, On the copy complexity of width 3 Horn constraint systems, Constraint-based relational verification, Decision tree learning in CEGIS-based termination analysis, Progress in certifying hardware model checking results, A tree-based approach to data flow proofs, Toward neural-network-guided program synthesis and verification, Symbolic automatic relations and their applications to SMT and CHC solving, Exact and parameterized algorithms for read-once refutations in Horn constraint systems, Loop verification with invariants and contracts, Solving Horn Clauses on Inductive Data Types Without Induction, Automatic synthesis of logical models for order-sorted first-order theories, Leveraging Horn clause solving for compositional verification of PLC software, Analyzing read-once cutting plane proofs in Horn systems, Computing Abstract Distances in Logic Programs, Analysis and Transformation of Constrained Horn Clauses for Program Verification, Parameterized recursive refinement types for automated program verification, Towards a dereversibilizer: fewer asserts, statically, Efficient modular SMT-based model checking of pointer programs, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Deciding the Bernays-Schoenfinkel fragment over bounded difference constraints by simple clause learning over theories, Introduction to the special issue on computational logic for verification, Predicate Pairing for program verification, Tree dimension in verification of constrained Horn clauses, Fold/Unfold Transformations for Fixpoint Logic, Proof Relevant Corecursive Resolution, Incremental and Modular Context-sensitive Analysis, Counterexample-guided prophecy for model checking modulo the theory of arrays, ICE-based refinement type discovery for higher-order functional programs, Abstraction refinement and antichains for trace inclusion of infinite state systems, Efficient Reasoning for Inconsistent Horn Formulae, On the lengths of tree-like and dag-like cutting plane refutations of Horn constraint systems. Horn constraint systems and cutting plane refutations, Removing algebraic data types from constrained Horn clauses using difference predicates, Subsumption demodulation in first-order theorem proving, Reasoning in the theory of heap: satisfiability and interpolation


Uses Software


Cites Work