2012
DOI: 10.1007/978-3-642-32759-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Correctness of Pointer Manipulating Algorithms Illustrated by a Verified BDD Construction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…A second option is to add to an existing functional specification language certain imperative traits as monads, then modify the extraction function from the specification language to the target language so as to translate monadic operations into imperative calls, as has been done for Isabelle/HOL [6]; this approach has been used to verify a BDD package [10]. Special proof idioms have to be used for monadic programs, in addition to the general difficulty of programming in monadic style (see §2.1).…”
Section: Related Workmentioning
confidence: 99%
“…A second option is to add to an existing functional specification language certain imperative traits as monads, then modify the extraction function from the specification language to the target language so as to translate monadic operations into imperative calls, as has been done for Isabelle/HOL [6]; this approach has been used to verify a BDD package [10]. Special proof idioms have to be used for monadic programs, in addition to the general difficulty of programming in monadic style (see §2.1).…”
Section: Related Workmentioning
confidence: 99%