Professional Documents
Culture Documents
Download textbook Artificial Intelligence And Symbolic Computation 12Th International Conference Aisc 2014 Seville Spain December 11 13 2014 Proceedings 1St Edition Gonzalo A Aranda Corral ebook all chapter pdf
Download textbook Artificial Intelligence And Symbolic Computation 12Th International Conference Aisc 2014 Seville Spain December 11 13 2014 Proceedings 1St Edition Gonzalo A Aranda Corral ebook all chapter pdf
https://textbookfull.com/product/hybrid-artificial-intelligence-
systems-9th-international-conference-hais-2014-salamanca-spain-
june-11-13-2014-proceedings-1st-edition-marios-polycarpou/
https://textbookfull.com/product/reversible-computation-6th-
international-conference-rc-2014-kyoto-japan-
july-10-11-2014-proceedings-1st-edition-shigeru-yamashita/
Business Process Management 12th International
Conference BPM 2014 Haifa Israel September 7 11 2014
Proceedings 1st Edition Shazia Sadiq
https://textbookfull.com/product/business-process-
management-12th-international-conference-bpm-2014-haifa-israel-
september-7-11-2014-proceedings-1st-edition-shazia-sadiq/
https://textbookfull.com/product/applied-cryptography-and-
network-security-12th-international-conference-
acns-2014-lausanne-switzerland-june-10-13-2014-proceedings-1st-
edition-ioana-boureanu/
https://textbookfull.com/product/formal-concept-analysis-12th-
international-conference-icfca-2014-cluj-napoca-romania-
june-10-13-2014-proceedings-1st-edition-cynthia-vera-glodeanu/
https://textbookfull.com/product/algorithms-and-computation-8th-
international-workshop-walcom-2014-chennai-india-
february-13-15-2014-proceedings-1st-edition-kurt-mehlhorn-auth/
Gonzalo A. Aranda-Corral
Jacques Calmet
Francisco J. Martín-Mateos (Eds.)
LNAI 8884
Artificial Intelligence
and Symbolic Computation
12th International Conference, AISC 2014
Seville, Spain, December 11–13, 2014
Proceedings
123
Lecture Notes in Artificial Intelligence 8884
Artificial Intelligence
and Symbolic Computation
12th International Conference, AISC 2014
Seville, Spain, December 11-13, 2014
Proceedings
13
Volume Editors
Gonzalo A. Aranda-Corral
University of Huelva
Department of Information Technologies
Crta. Huelva - Palos de la Frontera, s/n
21810 Palos de la Frontera, Spain
E-mail: aranda@us.es
Jacques Calmet
Karlsruhe Institute of Technology
Institute for Theoretical Informatics
Am Fasanengarten 5
76131 Karlsruhe, Germany
E-mail: calmet@ira.uka.de
Francisco J. Martín-Mateos
University of Seville
Department of Computer Science and Artificial Intelligence
Av. Reina Mercedes, s/n
41012 Seville, Spain
E-mail: fjesus@us.es
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection
with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and
executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication
or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location,
in ist current version, and permission for use must always be obtained from Springer. Permissions for use
may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution
under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of publication,
neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or
omissions that may be made. The publisher makes no warranty, express or implied, with respect to the
material contained herein.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
AISC 2014, the 12th International Conference on Artificial Intelligence and Sym-
bolic Computation, was held at the University of Seville, Seville, December 11-13,
2014. The Department of Computer Science and Artificial Intelligence, Univer-
sity of Seville, was responsible for the organization and local arrangements of
the conference.
Conference Direction
Conference chairs
Gonzalo A. Aranda-Corral University of Huelva
Francisco J. Martı́n-Mateos University of Seville
Program Committee
Rajendra Akerkar Western Norway Research Institute, Norway
Gonzalo A. Aranda-Corral University of Huelva, Spain
Serge Autexier DFKI Bremen, Germany
José Antonio Alonso-Jiménez University of Seville, Spain
Bernhard Beckert Karlsruhe Institute of Technology, Germany
Belaid Benhamou University of Aix-Marseille, France
Rudolf Berghammer Christian-Albrechts-Universität zu Kiel,
Germany
Joaquı́n Borrego-Dı́az University of Seville, Spain
Francisco Botana University of Vigo, Spain
Jacques Calmet Karlsruhe Institute of Technology, Germany
Jacques Carette McMaster University, Canada
John A. Campbell University College London, UK
Ivo Düntsch Brock University, Ontario, Canada
Marc Giusti Ecole Polytechnique, Palaiseau, France
Martin Charles Golumbic University of Haifa, Israel
Reiner Hähnle University of Darmstadt, Germany
Tetsuo Ida University of Tsukuba, Japan
David J. Jeffrey The University of Western Ontario, Canada
Deepak Kapur University of New Mexico, USA
Ilias S. Kotsireas Wilfrid Laurier University, Canada
Luis M. Laita Royal Academy of Sciences, Madrid, Spain
Francisco J. Martı́n-Mateos University of Seville, Spain
Javier Montero Complutense University of Madrid, Spain
VIII Organization
Local Arrangements
Pedro Almagro-Blanco Marı́a José Hidalgo-Doblado
José Antonio Alonso-Jiménez Jaime de Miguel
Joaquı́n Borrego-Dı́az Antonio Paredes-Moreno
Antonia Chávez-González M. Carmen Pérez-Cardona
Juan Galán-Páez José-Luis Ruiz-Reina
Additional Reviewers
Ramón Béjar Bruce Reznick
James Davenport Marie Francoise Roy
Antonio E. Flores Montoya José Javier Segura
Vladimir Klebanov Mattias Ulbrich
Pavel Pech Jing Yang
Daniel Plaumann
Table of Contents
Invited Presentations
Proving and Computing: Applying Automated Reasoning to the
Verification of Symbolic Computation Systems (Invited Talk) . . . . . . . . . . 1
José-Luis Ruiz-Reina
Contributed Papers
Models for Logics and Conditional Constraints in Automated Proofs of
Termination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Salvador Lucas and José Meseguer
José-Luis Ruiz-Reina
1 Introduction
Formal verification of the correctness properties of computing systems is one of
the main applications of mechanized reasoning. This is applied in any situation
where correctness is so important that one has to verify the system beyond the
classical approach of testing. For example, safety critical systems or those where
failures may produce high economic losses (these include hardware, micropro-
cessors, microcode and software systems or, more precisely, models of them).
In these cases, to increase confidence in the system, a theorem stating its main
properties is mechanically proved using a theorem prover.
Symbolic computation systems are software systems, so this idea can be ap-
plied to formally verify the correctness of the algorithms implemented in them.
G.A. Aranda-Corral et al. (Eds.): AISC 2014, LNAI 8884, pp. 1–6, 2014.
c Springer International Publishing Switzerland 2014
2 J.-L. Ruiz-Reina
Since in this case they are usually based on a rich mathematical theory, formal
verification require not only to formalize the properties of the algorithms, but
also of the underlying theory. Another important aspect to take into account is
that the models implemented have to be executable and, if possible, efficient.
ACL2 [7,8] is a theorem prover that uses a first-order logic to reason about
properties of programs written in an applicative programming language. It has
been successfully applied in a number of industrial–strength verification projects
[7]. In this talk, we argue that it can be also applied to the verification of symbolic
computation systems. We emphasize two aspects. First, how we deal with the
apparent lack of expressiveness of a first–order logic (at least compared to higher-
order logics). Second, how we can execute the algorithms modeled (efficiently, if
possible) in a setting where we also formally reason about them.
We illustrate the main issues one has to deal with when facing this task, by
means of three examples. First, Buchberger algorithm for computing a Gröbner
basis of a given polynomial ideal. Second, an algorithm, based on directed acyclic
graphs, for computing most general unifiers of two given first-order terms. Finally
the Eilenberg-Zilber theorem, a central theorem in algebraic topology.
results, is often the case that the prover fails to find a proof in its first attempt.
Thus, we can say that ACL2 is interactive in the sense that the role of the user is
essential for a successful use of the prover: usually, she has to provide a number
of definition and lemmas (what is called the logical world) that the system will
use as simplification (rewrite) rules. The proper definitions and lemmas needed
for the proof are obtained first from a preconceived hand proof, but also from
inspection of failed proof attempts.
such an efficient algorithm is reported. The key idea is to use a data structure
based on directed acyclic graphs (dags), which allows structure sharing. This
implementation can be executed in ACL2 at a speed comparable to a similar C
implementation, but in addition its correctness properties are formally verified.
Two main issues where encountered in this formalization project:
References
Volker Sorge
G.A. Aranda-Corral et al. (Eds.): AISC 2014, LNAI 8884, pp. 7–8, 2014.
c Springer International Publishing Switzerland 2014
8 V. Sorge
References
1. Al-Hassani, O., Mahesar, Q.A., Coen, C.S., Sorge, V.: A Term Rewriting System for
Kuratowski’s Closure-Complement Problem. In: Proceedings of RTA 2012. Leibniz
International Proceedings in Informatics, vol. 15. Schloss Dagstuhl (2012)
2. Colton, S., Meier, A., Sorge, V., McCasland, R.: Automatic Generation of Classifi-
cation Theorems for Finite Algebras. In: Basin, D., Rusinowitch, M. (eds.) IJCAR
2004. LNCS (LNAI), vol. 3097, pp. 400–414. Springer, Heidelberg (2004)
3. Distler, A., Shah, M., Sorge, V.: Enumeration of AG-Groupoids. In: Davenport,
J.H., Farmer, W.M., Urban, J., Rabe, F. (eds.) Calculemus/MKM 2011. LNCS,
vol. 6824, pp. 1–14. Springer, Heidelberg (2011)
4. Meier, A., Pollet, M., Sorge, V.: Comparing Approaches to the Exploration of the
Domain of Residue Classes. Journal of Symbolic Computation 34(4), 287–306 (2002)
5. Meier, A., Sorge, V., Colton, S.: Employing Theory Formation to Guide Proof Plan-
ning. In: Calmet, J., Benhamou, B., Caprotti, O., Hénocque, L., Sorge, V. (eds.)
AISC-Calculemus 2002. LNCS (LNAI), vol. 2385, pp. 275–289. Springer, Heidelberg
(2002)
6. Sorge, V., Meier, A., McCasland, R., Colton, S.: Automatic Construction and Ver-
ification of Isotopy Invariants. Journal of Automated Reasoning 40(2-3), 221–243
(2008)
7. Sorge, V., Meier, A., McCasland, R., Colton, S.: Classification Results in Quasi-
group and Loop Theory via a Combination of Automated Reasoning Tools. Comm.
Mathematicae Universitatis Carolinae 49(2-3), 319–340 (2008)
Models for Logics and Conditional Constraints
in Automated Proofs of Termination
1 Introduction
The operational semantics of sophisticated rule-based programming languages
such as CafeOBJ [7], Maude [3], or Haskell [8] is often formalized in a proof-
theoretic style by means of a computational logic, and the corresponding lan-
guage interpreters better understood as inference machines [15]. The notion of
operational termination [11] was introduced to give an account of the termina-
tion behavior of programs of such languages [12]. An interpreter for a logic L
(for instance the logic for Conditional Term Rewriting Systems (CTRSs) with
inference system in Figure 1) is an inference machine that, given a theory S
(e.g., the CTRS R in Example 1) and a goal formula ϕ (e.g., a one-step rewrit-
ing s → t for terms s and t) tries to incrementally build a proof tree for ϕ by
using (instances of) the inference rules B1 ,...,B
A
n
∈ I(L) of the inference system
I(L) of L. Then, S is operationally terminating if for any ϕ the interpreter ei-
ther finds a proof, or fails in all possible attempts (always in finite time). In this
setting, practical methods for proving operational termination involve two main
issues (see [13] and also [17] for CTRSs): (1) the simulation of the (one-step)
rewrite relations → and →∗ associated to a CTRS R and defined by means of the
inference system in Figure 1; and (2) the use of (automatically generated) well-
founded relations to abstract rewrite computations and guarantee the absence
Developed during a sabbatical year at UIUC. Supported by projects NSF CNS
13-19109, MINECO TIN2010-21062-C02-02 and TIN 2013-45732-C4-1-P, and GV
BEST/2014/026 and PROMETEO/2011/052.
G.A. Aranda-Corral et al. (Eds.): AISC 2014, LNAI 8884, pp. 9–20, 2014.
c Springer International Publishing Switzerland 2014
10 S. Lucas and J. Meseguer
si → ti
(Refl) t →∗ t (Cong) f (s1 , . . . , si , . . . , sk ) → f (s1 , . . . , ti , . . . , sk )
for all k-ary symbols f and 1 ≤ i ≤ k
s→u u →∗ t s1 →∗ t1 . . . sn →∗ tn
∗
(Tran) s→ t (Repl) →r
for each rule → r ⇐ s1 → t1 · · · sn → tn
Fig. 1. Inference rules for the CTRS logic (all variables are universally quantified)
of infinite ones. Here, (1) amounts at dealing with abstractions for sentences like
∀x(B1 ∧ · · · ∧ Bn ⇒ A) which simulate the use of the aforementioned inference
rules; and (2) often involves the comparison of expressions s and t using , pro-
vided that a number of semantic conditions (e.g., rewriting steps si →∗R ti for
some terms si and ti ) hold. Abstractions can be formalized as semantic models
M = (D, FD , ΠD ) of L (see Section 2), where D is a domain and FD and ΠD are
interpretations of the function symbols F and predicates Π of L, respectively.
For instance, relations → and →∗ (which are predicates in the corresponding
logic) are typically interpreted as orderings on D, often a numeric domain like N
or [0, +∞). In this paper we introduce the idea of using conditional expressions
to restrict such domains in logical models (Section 3). This is often useful.
Example 2. In the logic of CTRSs, with binary predicates → and →∗ , the theory
for a CTRS R = (F , R) is obtained from the inference rules in Figure 1 after
specializing them as (Cong)f,i for each f ∈ F and i, 1 ≤ i ≤ ar(f ) and (Repl )ρ
for all ρ : → r ⇐ c ∈ R. Then, inference rules B1 ,...,B
A
n
become implications
B1 ∧· · ·∧Bn ⇒ A. For instance, for (Tran), (Cong )not , (Repl )(1) , and (Repl )(15) :
∀s, t, u (s → u ∧ u →∗ t ⇒ s →∗ t) (19)
∀s, t (s → t ⇒ not(s) → not(t)) (20)
∀x (or(0, x) → x) (21)
∀x, y (not(x) →∗ 1 ⇒ implies(x, y) → 1) (22)
For analysis and verification purposes we often need to abstract L into a numeric
setting (e.g., arithmetics, linear algebra, or algebraic geometry) where appropri-
ate techniques are available to prove properties of interest. This amounts at
giving a (numeric) model of L that satisfies S.
An F -algebra is a pair A = (D, FD ), where D is a set and FD is a set of
mappings fA : Dk → D for each f ∈ F where k = ar(f ). A Σ-model is a triple
M = (D, FD , ΠD ) where (D, FD ) is an F -algebra, and for each k-ary P ∈ Π,
PM ∈ ΠD is a k-ary relation PM ⊆ Dk . Given a valuation mapping α : X → D,
the evaluation mapping [ ]A M
α : T (F , X ) → D (also [ ]α if A is part of M) is the
M
unique homomorphism extending α. Finally, [ ]α : FormΣ → Bool is given by:
1. [P (t1 , . . . , tk )]M M M
α = true if and only if ([t1 ]α , . . . , [tk ]α ) ∈ PA ;
M M M
2. [ϕ ∧ ψ]α = true if and only if [ϕ]α = true and [ψ]α = true;
3. [ϕ ⇒ ψ]M M
α = true if and only if [ϕ]α = false or [ψ]α = true;
M
[0, +∞)n for some n ≥ 1. Furthermore, considered orderings often make the
corresponding ordered sets total (like [0, +∞) ordered by ≥R ), or nontotal but
with subsets B ⊆ D bounded by some value xB ∈ D (like [0, +∞)n ordered
by the pointwise extension of the usual ordering ≥R over the reals, which is a
complete lattice). More general domains can be often useful, though.
Example 5. (Continuing Example 4) Although (23) and (24) always hold
(under the intended interpretation of ‘=’ as the equality), satisfiability of other
sentences may depend on the considered domain of values: if D = [0, 1], then
(25) and (26) hold; if D = N, then only (25) holds. The use of D = [0, 1] can be
made explicit in (25) and (26) by adding further constraints:
∀x ∈ R ( x ≥ 0 ∧ 1 ≥ x ⇒ max(0, x) = x) (27)
∀x, y ∈ R ( x ≥ 0 ∧ 1 ≥ x ∧ y ≥ 0 ∧ 1 ≥ y ∧ 1 − x = 1 ⇒ max(1 − x, y) = 1) (28)
Thus, we need to deal with conditional constraints for using such more general
domains. Also to handle max expressions [6,16].
Example 6. We can expand the definition of max in (27) and (28) into:
∀x ∈ R ( x ≥ 0 ∧ 1 ≥ x ∧ 0 ≥ x ⇒ 0 = x) (29)
∀x ∈ R ( x ≥ 0 ∧ 1 ≥ x ∧ x ≥ 0 ⇒ x = x) (30)
∀x, y ∈ R ( x ≥ 0 ∧ 1 ≥ x ∧ y ≥ 0 ∧ 1 ≥ y ∧ 1 − x = 1 ∧ 1 − x ≥ y ⇒ 1 − x = 1) (31)
∀x, y ∈ R ( x ≥ 0 ∧ 1 ≥ x ∧ y ≥ 0 ∧ 1 ≥ y ∧ 1 − x = 1 ∧ y > 1 − x ⇒ y = 1) (32)
where (30) clearly holds true and we do not longer care about it.
and hence [implies(implies(x, implies(x, 0)), 0)] =[0,1] [1] holds only if x = 1 =
[1]. Combining (36) and (37), we conclude that, for all substitutions σ, if
σ(implies(implies(x, implies(x, 0)), 0)) →∗R σ(1) holds, then [F(x)]M = 1 >1 0 =
[F(0)]M , as desired. This proves operational termination of R in Example 1.
In the following section we discuss an interesting application of convex poly-
topic domains to improve the well-known matrix interpretations [5,2].
we have [a], [a ], [b], [c], [d], [e] ∈ D(A, b), as required by (38). It can be proved
that (D(A, b), FD(A,b) , ΠD(A,b) ), where →, →∗ ∈ Π are both interpreted (in
16 S. Lucas and J. Meseguer
The crucial point is that the conditional part of the implications does not hold
because no x ∈ D(A, b) satisfies (1, 0)T ≥ x and (0, 1)T ≥ x (see Example 11).
Example 11. Sentences (43) and (44) can be proved using Theorem 1. This
proves operational termination of R in Example 10.
Models for Logics and Conditional Constraints in Automated Proofs 17
6 Related Work
in such comparisons and the conclusions we may reach depend on the considered
approach for proving termination (see [17, Sections 5.2 and 5.4], for instance).
In our setting, orderings are introduced as interpretations of computational re-
lations (e.g., → and →∗ ), and we do not require anything special about them
beyond their ability to provide a model of the theory at hand. For instance, where
the interpretation method requires monotonicity, we just expect the relation to
provide a model of rules (Cong ), which encode the monotonicity of the rewrite
relation. The advantage is that we do not need reformulations of the framework
when other logics are considered; in contrast, the interpretation method requires
explicit adaptations. For instance, in Context-Sensitive Rewriting [9] rewritings
are propagated to selected arguments of function symbols only. Thus, (Cong)
may have no specialization for some arguments i of some symbols f . Whereas
this requires specific adaptations of the interpretation method (see, e.g., [21]),
we can apply our methods without any change. Furthermore, although our prac-
tical examples involve CTRSs, our development does not really depend on that
and applies to arbitrary declarative languages.
With regard to existing approaches to deal with conditional constraints in
proofs of termination, the following result formalizes the transformational ap-
proach to deal with polynomial conditional constraints in [6,16].
Proposition 1. [16, Proposition 3] Let prem and conc be two polynomials with
natural coefficients, where conc is not a constant. Let p1 , . . . , pm+1 , q1 , . . . , qm+1
be arbitrary polynomials with natural coefficients. If
This result holds if prem and conc have non-negative real coefficients, and
variables range over nonnegative real numbers. When linear polynomials are
used this technique is subsumed by Farkas’ lemma.
Proposition 2. Let C ∈ R≥0 [Y ] and P ∈ R≥0 [Y1 , . . . , Ym ] be linear applications
m
with C nonconstant, i.e., C = γY with γ > 0 and P = i=1 πi Yi . Let pi , qi ∈
R≥0 [X1 , . . . , Xn ] be linear polynomials for all i, 1 ≤ i ≤ m + 1, i.e., pi =
n n
pi0 + j=1 pij Xj and qi = qi0 + j=1 qij Xj . Let A = (pij − qij )m,n , b =
(q10 − p10 , . . . qm0 − pm0 )T , c = (pm+1,1 − qm+1,1 , . . . , pm+1,n − qm+1,n )T and β =
qm+1,0 −pm+1,0 . If for all X1 , . . . , Xm ≥ 0, C(pm+1 )−C(qm+1 )−P (p1 , . . . , pm )+
P (q1 , . . . , qm ) ≥ 0, then there is λ ∈ Rm
0 such that c ≥ A λ and β ≤ λ b.
T T
7 Conclusion
We have provided a generic, logic-oriented approach to abstraction in proofs of
termination of programs in declarative languages, which is based on defining ap-
propriate models for logics. We have used numeric domains defined as restrictions
of ‘big’ numeric sets by means of predicates that can be handled as conditional
constraints. We have introduced convex domains and used them to extend the
powerful matrix interpretation method for proving termination of TRSs in two
directions: the use of convex domains and the application to other logics (e.g.,
CTRSs). We have shown the usefulness of these general purpose ideas by ap-
plying them to prove operational termination of CTRSs: R in Example 1 could
not be handled within the recently introduced 2D DP framework for proving
operational termination of CTRSs [13] or its extensions [14]; but the weakness
was not in the framework itself, but in the available algebraic interpretations: we
can prove R operationally terminating now due to the use of a convex domain
like [0, 1]. And powerful tools like AProVE do not find a proof of operational
termination of R in Example 10 by using transformations. In contrast, we found
a simple proof with convex matrix interpretations and the techniques in [13].
We have shown that existing, powerful techniques to deal with numeric con-
straints provide an appropriate framework for implementing the previous tech-
niques. We have implemented most of these techniques as part of our tool
mu-term [1]. In particular, the use of Farkas’ Lemma for dealing with linear con-
ditional constraints obtained from linear polynomial interpretations and matrix
interpretations plays a central role in the implementation of the 2D DP frame-
work for operational termination of CTRSs [13] which is presented in [14]. In [10,
Example 13], we advocate the use of negative coefficients in proofs of termina-
tion of CSR using polynomial interpretations. The implementation, though, was
tricky (see [10, Sections 6.1.3 and 7]). This paper is a step forward because: (1)
our treatment is valid for arbitrary polynomials. We do not need to provide spe-
cial results as [10, Observation 1] to deal with polynomials of some specific form
(quadratic, cubic, ...); (2) we avoid the introduction of disjunctive constraints
which lead to an exponential blowup and to an expensive constraint solving pro-
cess; and (3) we admit negative numbers everywhere. They are treated as any
other number and there is no need to ‘assert’ which of the coefficients could be
negative in order to handle them apart (see [10, Section 7] and [10, Example 20]).
However, much work is necessary to make fully general use of these techniques
in practical applications. We plan to address these issues in the near future.
20 S. Lucas and J. Meseguer
References
1. Alarcón, B., Gutiérrez, R., Lucas, S., Navarro-Marset, R.: Proving Termination
Properties with mu-term. In: Johnson, M., Pavlovic, D. (eds.) AMAST 2010.
LNCS, vol. 6486, pp. 201–208. Springer, Heidelberg (2011)
2. Alarcón, B., Lucas, S., Navarro-Marset, R.: Using Matrix Interpretations over the
Reals in Proofs of Termination. In: Proc. of PROLE 2009, pp. 255–264 (2009)
3. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martı́-Oliet, N., Meseguer, J., Talcott,
C. (eds.): All About Maude - A High-Performance Logical Framework. LNCS,
vol. 4350. Springer, Heidelberg (2007)
4. Contejean, E., Marché, C., Tomás, A.-P., Urbain, X.: Mechanically proving termi-
nation using polynomial interpretations. J. of Aut. Reas. 34(4), 325–363 (2006)
5. Endrullis, J., Waldmann, J., Zantema, H.: Matrix Interpretations for Proving
Termination of Term Rewriting. J. of Aut. Reas. 40(2-3), 195–220 (2008)
6. Fuhs, C., Giesl, J., Middeldorp, A., Schneider-Kamp, P., Thiemann, R., Zankl,
H.: Maximal Termination. In: Voronkov, A. (ed.) RTA 2008. LNCS, vol. 5117,
pp. 110–125. Springer, Heidelberg (2008)
7. Futatsugi, K., Diaconescu, R.: CafeOBJ Report. AMAST Series. World Scientific
(1998)
8. Hudak, P., Peyton-Jones, S.J., Wadler, P.: Report on the Functional Programming
Language Haskell: a non–strict, purely functional language. Sigplan Notices 27(5),
1–164 (1992)
9. Lucas, S.: Context-sensitive computations in functional and functional logic
programs. Journal of Functional and Logic Programming 1998(1), 1–61 (1998)
10. Lucas, S.: Polynomials over the reals in proofs of termination: from theory to
practice. RAIRO Theoretical Informatics and Applications 39(3), 547–586 (2005)
11. Lucas, S., Marché, C., Meseguer, J.: Operational termination of conditional term
rewriting systems. Information Processing Letters 95, 446–453 (2005)
12. Lucas, S., Meseguer, J.: Proving Operational Termination of Declarative Programs
in General Logics. In: Proc. of PPDP 2014, pp. 111–122. ACM Digital Library
(2014)
13. Lucas, S., Meseguer, J.: 2D Dependency Pairs for Proving Operational Termination
of CTRSs. In: Proc. of WRLA 2014. LNCS, vol. 8663 (to appear, 2014)
14. Lucas, S., Meseguer, J., Gutiérrez, R.: Extending the 2D DP Framework for CTRSs.
In: Selected papers of LOPSTR 2014. LNCS (to appear, 2015)
15. Meseguer, J.: General Logics. In: Ebbinghaus, H.-D., et al. (eds.) Logic Colloquium
1987, pp. 275–329. North-Holland (1989)
16. Nguyen, M.T., de Schreye, D., Giesl, J., Schneider-Kamp, P.: Polytool: Polynomial
interpretations as a basis for termination of logic programs. Theory and Practice
of Logic Programming 11(1), 33–63 (2011)
17. Ohlebusch, E.: Advanced Topics in Term Rewriting. Springer (April 2002)
18. Prestel, A., Delzell, C.N.: Positive Polynomials. In: From Hilbert’s 17th Problem
to Real Algebra. Springer, Berlin (2001)
19. Podelski, A., Rybalchenko, A.: A Complete Method for the Synthesis of Linear
Ranking Functions. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937,
pp. 239–251. Springer, Heidelberg (2004)
20. Schrijver, A.: Theory of linear and integer programming. John Wiley & Sons (1986)
21. Zantema, H.: Termination of Context-Sensitive Rewriting. In: Comon, H. (ed.)
RTA 1997. LNCS, vol. 1232, pp. 172–186. Springer, Heidelberg (1997)
Another random document with
no related content on Scribd:
violent contraste entre l’idéal qui est écrit sur les drapeaux et
l’horrible action. Ce qui est convier chacun à un sévère examen de
conscience, le laissant juge, ou laissant Dieu juge, ce qui est une
autre manière de dire. Car où est notre pouvoir de choisir les
coupables, quand la faute est de presque tous ? Qui n’a pas cédé à
l’ivresse de plaire, de flatter, de menacer ? Faute de tous, et punition
de tous par le jeu des effets, sévère, mais sans reproche. Et c’est ce
que le Pape veut appeler la justice de Dieu. Doctrine non
développée, mais en elle-même forte.
XLIII
LA TRINITÉ