메뉴 건너뛰기




Volumn 2277 LNCS, Issue , 2002, Pages 24-40

Executing higher order logic

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LOGIC; GROUP THEORY; PROLOG (PROGRAMMING LANGUAGE);

EID: 84874828803     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45842-5_2     Document Type: Conference Paper
Times cited : (70)

References (20)
  • 1
    • 84957804395 scopus 로고    scopus 로고
    • Lifted-FL: A pragmatic implementation of combined model checking and theorem proving
    • Y. Bertot, G. Dowek, A. Hirschowitz, C. Paulin, and L. Théry, editors, volume 1690 of Lect. Notes in Comp. Sci. Springer-Verlag
    • M. D. Aagaard, R. B. Jones, and C.-J. H. Seger. Lifted-FL: A Pragmatic Implementation of Combined Model Checking and Theorem Proving. In Y. Bertot, G. Dowek, A. Hirschowitz, C. Paulin, and L. Théry, editors, Theorem Proving in Higher Order Logics, 12th International Conference (TPHOLs'99), volume 1690 of Lect. Notes in Comp. Sci., pages 323-340. Springer-Verlag, 1999.
    • (1999) Theorem Proving in Higher Order Logics, 12th International Conference (TPHOLs'99) , pp. 323-340
    • Aagaard, M.D.1    Jones, R.B.2    Seger, C.-J.H.3
  • 2
    • 84949657682 scopus 로고    scopus 로고
    • Executing formal specifications by translation to higher order logic programming
    • E. L. Gunter and A. Felty, editors, volume 1275 of Lect. Notes in Comp. Sci.,. Springer-Verlag
    • J. H. Andrews. Executing formal specifications by translation to higher order logic programming. In E. L. Gunter and A. Felty, editors, 10th International Conference on Theorem Proving in Higher Order Logics, volume 1275 of Lect. Notes in Comp. Sci., pages 17-32. Springer-Verlag, 1997.
    • (1997) 10th International Conference on Theorem Proving in Higher Order Logics , pp. 17-32
    • Andrews, J.H.1
  • 5
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • volume 1740 of Lect. Notes in Comp. Sci. Springer-Verlag
    • D. Basin. Lazy infinite-state analysis of security protocols. In Secure Networking - CQRE [Secure] '99, volume 1740 of Lect. Notes in Comp. Sci., pages 30-42. Springer-Verlag, 1999.
    • (1999) Secure Networking - CQRE [Secure] '99 , pp. 30-42
    • Basin, D.1
  • 6
    • 0003447333 scopus 로고
    • Typol: A formalism to implement natural semantics
    • T. Despeyroux. Typol: a formalism to implement natural semantics. Technical Report 94, INRIA, 1988.
    • (1988) Technical Report 94 INRIA
    • Despeyroux, T.1
  • 8
    • 84874858850 scopus 로고    scopus 로고
    • July. Personal communication
    • W. Goerigk, July 2000. Personal communication.
    • (2000)
    • Goerigk, W.1
  • 12
    • 0013235727 scopus 로고
    • The automatic generation of mode declarations for Prolog programs
    • University of Edinburgh, August
    • C. S. Mellish. The automatic generation of mode declarations for Prolog programs. Technical Report 163, Department of Artificial Intelligence, University of Edinburgh, August 1981.
    • (1981) Technical Report 163, Department of Artificial Intelligence
    • Mellish, C.S.1
  • 13
    • 0034836793 scopus 로고    scopus 로고
    • More Church-Rosser proofs (in Isabelle/HOL)
    • T. Nipkow. More Church-Rosser proofs (in Isabelle/HOL). Journal of Automated Reasoning, 26, 2001.
    • (2001) Journal of Automated Reasoning , vol.26
    • Nipkow, T.1
  • 14
    • 0005042682 scopus 로고    scopus 로고
    • Machine-checking the Java specification: Proving type-safety
    • J. Alves-Foss, editor, volume 1523 of Lect. Notes in Comp. Sci. Springer-Verlag
    • D. v. Oheimb and T. Nipkow. Machine-checking the Java specification: Proving type-safety. In J. Alves-Foss, editor, Formal Syntax and Semantics of Java, volume 1523 of Lect. Notes in Comp. Sci., pages 119-156. Springer-Verlag, 1999.
    • (1999) Formal Syntax and Semantics of Java , pp. 119-156
    • Oheimb, D.V.1    Nipkow, T.2
  • 17
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6:85-128, 1998.
    • (1998) J. Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 18
    • 0002474842 scopus 로고
    • Logic programming in the LF logical framework
    • G. Huet and G. Plotkin, editors. Cambridge University Press
    • F. Pfenning. Logic programming in the LF Logical Framework. In G. Huet and G. Plotkin, editors, Logical Frameworks, pages 66-78. Cambridge University Press, 1991.
    • (1991) Logical Frameworks , pp. 66-78
    • Pfenning, F.1
  • 19
    • 84943298385 scopus 로고
    • Executing HOL specifications: Towards an evaluation semantics for classical higher order logic
    • L. J. M. Claesen and M. J. C. Gordon, editors, Leuven, Belgium, September, Elsevier
    • P. S. Rajan. Executing HOL specifications: Towards an evaluation semantics for classical higher order logic. In L. J. M. Claesen and M. J. C. Gordon, editors, Higher order Logic Theorem Proving and its Applications, Leuven, Belgium, September 1992. Elsevier.
    • (1992) Higher Order Logic Theorem Proving and Its Applications
    • Rajan, P.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.